Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 2

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  optical security
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
We present a novel encryption method for multiple images in a discrete multiple-parameter fractional Fourier transform scheme, using complex encoding, theta modulation and spectral fusion. All pairs of original images are encoded separately into a complex signal. The spectrum of each complex signal can then be scattered into various positions in the spectral plane and multiplexed into one spectral image with a combination of theta modulation and spectral fusion. After Fourier transforming back to the spatial domain, the multiplexed signal is encrypted in the discrete multiple-parameter fractional Fourier transform domain. Information about the original images can only be successfully decrypted given the possession of all correct keys. The parameters of chaotic pixel scrambling for the proposed method enlarge the key space. Moreover, the proposed method solves the crosstalk problem of multiple images and improves the multiplexing capacity. Numerical simulations demonstrate the effectiveness of the proposed method.
EN
We propose and study a new technique for securing fibre data communication. The paper presents a method for optical encryption of information transmitted with a traditional fibre link. The encryption method uses a spatial light modulator which converts light pulses representing original data into pseudo-random patterns. A linear combination of light pulses with pseudo-random patterns provides a required encryption performance. The main element of the encryptor is the spatial light modulator which comprises a matrix of cells selectively transmitting or blocking the light beam depending on the pseudo-random configuration of cells. The encrypted information is transmitted through the optical fibre. The decryption process relies on a computational solving of linear program or greedy pursuit. We present a brief description of the method, theoretical analysis and results of numerical simulation. A physical model concept of the method is also presented.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.