Roadmap on optical security

Autores
Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto Daniel; Barrera Ramírez, John Fredy; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W.H.; Mosk, Allard P.; Markman, Adam
Año de publicación
2016
Idioma
inglés
Tipo de recurso
artículo
Estado
versión publicada
Descripción
Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.
Centro de Investigaciones Ópticas
Consejo Nacional de Investigaciones Científicas y Técnicas
Materia
Física
Encryption
Speckle
Security
Nivel de accesibilidad
acceso abierto
Condiciones de uso
http://creativecommons.org/licenses/by-nc-sa/4.0/
Repositorio
SEDICI (UNLP)
Institución
Universidad Nacional de La Plata
OAI Identificador
oai:sedici.unlp.edu.ar:10915/96923

id SEDICI_b2e51149525f76931189134132b04422
oai_identifier_str oai:sedici.unlp.edu.ar:10915/96923
network_acronym_str SEDICI
repository_id_str 1329
network_name_str SEDICI (UNLP)
spelling Roadmap on optical securityJavidi, BahramCarnicer, ArturYamaguchi, MasahiroNomura, TakanoriPérez-Cabré, ElisabetMillán, María S.Nishchal, Naveen K.Torroba, Roberto DanielBarrera Ramírez, John FredyHe, WenqiPeng, XiangStern, AdrianRivenson, YairAlfalou, A.Brosseau, C.Guo, ChangliangSheridan, John T.Situ, GuohaiNaruse, MakotoMatsumoto, TsutomuJuvells, IgnasiTajahuerce, EnriqueLancis, JesúsChen, WenChen, XudongPinkse, Pepijn W.H.Mosk, Allard P.Markman, AdamFísicaEncryptionSpeckleSecurityInformation security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.Centro de Investigaciones ÓpticasConsejo Nacional de Investigaciones Científicas y Técnicas2016-08info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionArticulohttp://purl.org/coar/resource_type/c_6501info:ar-repo/semantics/articuloapplication/pdfhttp://sedici.unlp.edu.ar/handle/10915/96923enginfo:eu-repo/semantics/altIdentifier/url/https://ri.conicet.gov.ar/11336/54408info:eu-repo/semantics/altIdentifier/url/http://iopscience.iop.org/article/10.1088/2040-8978/18/8/083001/metainfo:eu-repo/semantics/altIdentifier/issn/2040-8986info:eu-repo/semantics/altIdentifier/doi/10.1088/2040-8978/18/8/083001info:eu-repo/semantics/altIdentifier/hdl/11336/54408info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-sa/4.0/Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-10-15T11:12:05Zoai:sedici.unlp.edu.ar:10915/96923Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-10-15 11:12:05.552SEDICI (UNLP) - Universidad Nacional de La Platafalse
dc.title.none.fl_str_mv Roadmap on optical security
title Roadmap on optical security
spellingShingle Roadmap on optical security
Javidi, Bahram
Física
Encryption
Speckle
Security
title_short Roadmap on optical security
title_full Roadmap on optical security
title_fullStr Roadmap on optical security
title_full_unstemmed Roadmap on optical security
title_sort Roadmap on optical security
dc.creator.none.fl_str_mv Javidi, Bahram
Carnicer, Artur
Yamaguchi, Masahiro
Nomura, Takanori
Pérez-Cabré, Elisabet
Millán, María S.
Nishchal, Naveen K.
Torroba, Roberto Daniel
Barrera Ramírez, John Fredy
He, Wenqi
Peng, Xiang
Stern, Adrian
Rivenson, Yair
Alfalou, A.
Brosseau, C.
Guo, Changliang
Sheridan, John T.
Situ, Guohai
Naruse, Makoto
Matsumoto, Tsutomu
Juvells, Ignasi
Tajahuerce, Enrique
Lancis, Jesús
Chen, Wen
Chen, Xudong
Pinkse, Pepijn W.H.
Mosk, Allard P.
Markman, Adam
author Javidi, Bahram
author_facet Javidi, Bahram
Carnicer, Artur
Yamaguchi, Masahiro
Nomura, Takanori
Pérez-Cabré, Elisabet
Millán, María S.
Nishchal, Naveen K.
Torroba, Roberto Daniel
Barrera Ramírez, John Fredy
He, Wenqi
Peng, Xiang
Stern, Adrian
Rivenson, Yair
Alfalou, A.
Brosseau, C.
Guo, Changliang
Sheridan, John T.
Situ, Guohai
Naruse, Makoto
Matsumoto, Tsutomu
Juvells, Ignasi
Tajahuerce, Enrique
Lancis, Jesús
Chen, Wen
Chen, Xudong
Pinkse, Pepijn W.H.
Mosk, Allard P.
Markman, Adam
author_role author
author2 Carnicer, Artur
Yamaguchi, Masahiro
Nomura, Takanori
Pérez-Cabré, Elisabet
Millán, María S.
Nishchal, Naveen K.
Torroba, Roberto Daniel
Barrera Ramírez, John Fredy
He, Wenqi
Peng, Xiang
Stern, Adrian
Rivenson, Yair
Alfalou, A.
Brosseau, C.
Guo, Changliang
Sheridan, John T.
Situ, Guohai
Naruse, Makoto
Matsumoto, Tsutomu
Juvells, Ignasi
Tajahuerce, Enrique
Lancis, Jesús
Chen, Wen
Chen, Xudong
Pinkse, Pepijn W.H.
Mosk, Allard P.
Markman, Adam
author2_role author
author
author
author
author
author
author
author
author
author
author
author
author
author
author
author
author
author
author
author
author
author
author
author
author
author
author
dc.subject.none.fl_str_mv Física
Encryption
Speckle
Security
topic Física
Encryption
Speckle
Security
dc.description.none.fl_txt_mv Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.
Centro de Investigaciones Ópticas
Consejo Nacional de Investigaciones Científicas y Técnicas
description Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.
publishDate 2016
dc.date.none.fl_str_mv 2016-08
dc.type.none.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Articulo
http://purl.org/coar/resource_type/c_6501
info:ar-repo/semantics/articulo
format article
status_str publishedVersion
dc.identifier.none.fl_str_mv http://sedici.unlp.edu.ar/handle/10915/96923
url http://sedici.unlp.edu.ar/handle/10915/96923
dc.language.none.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv info:eu-repo/semantics/altIdentifier/url/https://ri.conicet.gov.ar/11336/54408
info:eu-repo/semantics/altIdentifier/url/http://iopscience.iop.org/article/10.1088/2040-8978/18/8/083001/meta
info:eu-repo/semantics/altIdentifier/issn/2040-8986
info:eu-repo/semantics/altIdentifier/doi/10.1088/2040-8978/18/8/083001
info:eu-repo/semantics/altIdentifier/hdl/11336/54408
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
http://creativecommons.org/licenses/by-nc-sa/4.0/
Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)
eu_rights_str_mv openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-sa/4.0/
Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)
dc.format.none.fl_str_mv application/pdf
dc.source.none.fl_str_mv reponame:SEDICI (UNLP)
instname:Universidad Nacional de La Plata
instacron:UNLP
reponame_str SEDICI (UNLP)
collection SEDICI (UNLP)
instname_str Universidad Nacional de La Plata
instacron_str UNLP
institution UNLP
repository.name.fl_str_mv SEDICI (UNLP) - Universidad Nacional de La Plata
repository.mail.fl_str_mv alira@sedici.unlp.edu.ar
_version_ 1846064178377261056
score 13.22299