Some existing image encryption schemes use simple low-dimensional chaotic systems, which makes the algorithms insecure and vulnerable to brute force attacks and cracking. Some algorithms have issues such as weak corre...Some existing image encryption schemes use simple low-dimensional chaotic systems, which makes the algorithms insecure and vulnerable to brute force attacks and cracking. Some algorithms have issues such as weak correlation with plaintext images, poor image reconstruction quality, and low efficiency in transmission and storage. To solve these issues,this paper proposes an optical image encryption algorithm based on a new four-dimensional memristive hyperchaotic system(4D MHS) and compressed sensing(CS). Firstly, this paper proposes a new 4D MHS, which has larger key space, richer dynamic behavior, and more complex hyperchaotic characteristics. The introduction of CS can reduce the image size and the transmission burden of hardware devices. The introduction of double random phase encoding(DRPE) enables this algorithm has the ability of parallel data processing and multi-dimensional coding space, and the hyperchaotic characteristics of 4D MHS make up for the nonlinear deficiency of DRPE. Secondly, a construction method of the deterministic chaotic measurement matrix(DCMM) is proposed. Using DCMM can not only save a lot of transmission bandwidth and storage space, but also ensure good quality of reconstructed images. Thirdly, the confusion method and diffusion method proposed are related to plaintext images, which require both four hyperchaotic sequences of 4D MHS and row and column keys based on plaintext images. The generation process of hyperchaotic sequences is closely related to the hash value of plaintext images. Therefore, this algorithm has high sensitivity to plaintext images. The experimental testing and comparative analysis results show that proposed algorithm has good security and effectiveness.展开更多
An optical encryption(OE) scheme based on the spread spectrum ghost imaging(SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadam...An optical encryption(OE) scheme based on the spread spectrum ghost imaging(SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadamard matrix of order N is used as the secure key, and shared with the authorized user, Bob, through a private channel. Each corresponding row vector of the order-N Hadamard matrix is then used as the direct sequence code to modulate a speckle pattern for the ghost imaging system, and an image is encrypted with the help of the SSGI. The measurement results from the bucket detector, named as ciphertext, are then transmitted to Bob through a public channel. The illuminating speckle patterns are also shared with Bob by the public channel. With the correct secure key, Bob could reconstruct the image with the aid of the SSGI system, whereas the unauthorized user, Eve, could not obtain any useful information of the encrypted image. The numerical simulations and experimental results show that the proposed scheme is feasible with a higher security and a smaller key. For the 32 × 32 pixels image, the number of bits sent from Alice to Bob by using SSGIOE(M = 1024, N = 2048) scheme is only 0.0107 times over a computational ghost imaging optical encryption scheme.When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any information of the encrypted image. The extreme circumstance for the proposed SSGI-OE scheme is also discussed, where the eavesdropper begins to extract the information when ER is up to 15%.展开更多
Optical cryptanalysis is essential to the further investigation of more secure optical cryptosystems.Learning-based at-tack of optical encryption eliminates the need for the retrieval of random phase keys of optical e...Optical cryptanalysis is essential to the further investigation of more secure optical cryptosystems.Learning-based at-tack of optical encryption eliminates the need for the retrieval of random phase keys of optical encryption systems but it is limited for practical applications since it requires a large set of plaintext-ciphertext pairs for the cryptosystem to be at-tacked.Here,we propose a two-step deep learning strategy for ciphertext-only attack(COA)on the classical double ran-dom phase encryption(DRPE).Specifically,we construct a virtual DRPE system to gather the training data.Besides,we divide the inverse problem in COA into two more specific inverse problems and employ two deep neural networks(DNNs)to respectively learn the removal of speckle noise in the autocorrelation domain and the de-correlation operation to retrieve the plaintext image.With these two trained DNNs at hand,we show that the plaintext can be predicted in real-time from an unknown ciphertext alone.The proposed learning-based COA method dispenses with not only the retrieval of random phase keys but also the invasive data acquisition of plaintext-ciphertext pairs in the DPRE system.Numerical simulations and optical experiments demonstrate the feasibility and effectiveness of the proposed learning-based COA method.展开更多
A new distribution scheme of decryption keys used in optical verification systems is proposed. The encryption procedure is digitally implemented with the use of an iteration algorithm in computer. Three target images ...A new distribution scheme of decryption keys used in optical verification systems is proposed. The encryption procedure is digitally implemented with the use of an iteration algorithm in computer. Three target images corresponding to three wavelengths are encoded into three sets of phase-only masks (POMs) by a special distributing method. These three sets of POMs are assigned to three authorized users as the personal identification. A lensless optical system is used as the verification system. In the verification procedure, every two of the three authorized users can pass the verification procedure cooperatively, but only one user cannot do. Numerical simulation shows that the proposed distribution scheme of decryption keys not only can improve the security level of verification system, but also can bring convenience and flexibility for authorized users.展开更多
The principle of ptychography is applied in known plain text attack on the double random phase encoding (DRPE) system. We find that with several pairs of plain texts and cipher texts, the model of attack on DRPE can...The principle of ptychography is applied in known plain text attack on the double random phase encoding (DRPE) system. We find that with several pairs of plain texts and cipher texts, the model of attack on DRPE can be converted to the model of ptyehographical imaging. Owing to the inherent merits of the ptyehographical imaging, the DRPE system can be breached totally in a fast and nearly perfect way, which is unavailable for currently existing attack methods. Further, since the decryption keys can be seen as an object to be imaged from the perspective of imaging, the ptychographical technique may be a kind of new direction to further analysis of the security of other encryption systems based on double random keys.展开更多
Due to the rapid growth of telemedicine and healthcare services,color medical image security applications have been expanded precipitously.In this paper,an asymmetric PTFrFT(Phase Truncated Fractional Fourier Transfor...Due to the rapid growth of telemedicine and healthcare services,color medical image security applications have been expanded precipitously.In this paper,an asymmetric PTFrFT(Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested.Two different phases in the fractional Fourier and output planes are provided as deciphering keys.Accordingly,the ciphering keys will not be employed for the deciphering procedure.Thus,the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH(Optical Scanning Holography)and DRPE(Double Random Phase Encoding)algorithms.One of the principal impacts of the introduced asymmetric cryptosystem is that it eliminates the onedimensionality aspects of the related symmetric cryptosystems due to its remarkable feature of phase nonlinear truncation components.More comparisons on various colormedical images are examined and analyzed to substantiate the cryptosystem efficacy.The achieved experimental outcomes ensure that the introduced cryptosystem is robust and secure.It has terrific cryptography performance compared to conventional cryptography algorithms,even in the presence of noise and severe channel attacks.展开更多
The two types of nonlinear optical cryptosystems(NOCs)that are respectively based on amplitude-phase retrieval algorithm(APRA)and phase retrieval algorithm(PRA)have attracted a lot of attention due to their unique mec...The two types of nonlinear optical cryptosystems(NOCs)that are respectively based on amplitude-phase retrieval algorithm(APRA)and phase retrieval algorithm(PRA)have attracted a lot of attention due to their unique mechanism of encryption process and remarkable ability to resist common attacks.In this paper,the securities of the two types of NOCs are evaluated by using a deep-learning(DL)method,where an end-to-end densely connected convolutional network(DenseNet)model for cryptanalysis is developed.The proposed DL-based method is able to retrieve unknown plaintexts from the given ciphertexts by using the trained DenseNet model without prior knowledge of any public or private key.The results of numerical experiments with the DenseNet model clearly demonstrate the validity and good performance of the proposed the DL-based attack on NOCs.展开更多
The optical coherence structures of random optical fields can determine beam propagation behavior,light–matter interactions,etc.Their performance makes a light beam robust against turbulence,scattering,and distortion...The optical coherence structures of random optical fields can determine beam propagation behavior,light–matter interactions,etc.Their performance makes a light beam robust against turbulence,scattering,and distortion.Recently,we proposed optical coherence encryption and robust far-field optical imaging techniques.All related applications place a high demand on precision in the experimental measurements of complex optical coherence structures,including their real and imaginary parts.Past studies on these measurements have mainly adopted theoretical mathematical approximations,limited to Gaussian statistic involving speckle statistic(time-consuming),or used complicated and delicate optical systems in the laboratory.In this study,we provide:a robust,convenient,and fast protocol to measure the optical coherence structures of random optical fields via generalized Arago(or Poisson)spot experiments with rigorous mathematical solutions.Our proposal only requires to capture the intensity thrice,and is applicable to any optical coherence structures,regardless of their type or optical statistics.The theoretical and experimental results demonstrated that the real and imaginary parts of the structures could be simultaneously recovered with high precision.We believe that such a protocol can be widely employed in phase measurement,optical imaging,and image transfer.展开更多
In this paper, we propose an encryption scheme based on phase-shifting digital interferometry. According to the original system framework, we add a random amplitude mask and replace the Fourier transform by the Fresne...In this paper, we propose an encryption scheme based on phase-shifting digital interferometry. According to the original system framework, we add a random amplitude mask and replace the Fourier transform by the Fresnel transform. We develop a mathematical model and give a discrete formula based on the scheme, which makes it easy to implement the scheme in computer programming. The experimental results show that the improved system has a better performance in security than the original encryption method. Moreover, it demonstrates a good capability of anti-noise and anti-shear robustness.展开更多
In the last few years,videos became the most common form of information transmitted over the internet,and a lot of the traffic is confidential and must be protected and delivered safely to its intended users.This intr...In the last few years,videos became the most common form of information transmitted over the internet,and a lot of the traffic is confidential and must be protected and delivered safely to its intended users.This introduces the challenges of presenting encryption systems that can encode videos securely and efficiently at the same time.This paper presents an efficient opto-video encryption system using Logistic Adjusted Sine map(LASM)in the Fractional Fourier Transform(FrFT).In the presented opto-video LASM-based FrFT scheme,the encoded video is split into distinct frames and transformed into optical signals utilizing an optical supply.Each of the developed optical video frames is ciphered by utilizing the LASM in optical FrFT system using two-phase modulation forms on the video frame,the first in the time-domain and the second in the FrFT domain.In the end,the ciphervideo frame is spotted utilizing a CCD digital camera and transformed into a digital structure that can be managed using a computer.We test the proposed opto-video LASM-based FrFT scheme using various security tools.The outcomes demonstrate that the presented scheme can effectively encrypt and decrypt video signals.In addition,it encrypts videos with a high level of encryption qualitywithout sacrificing its resistance to noise immunity.Finally,the test outcomes demonstrate that the presented scheme is immune to known attacks.展开更多
A new method coherent DWDM system has been proposed. Standard method uses 90 wavelengths with channel capacity 100 G, so total capacity amounts to 9 Terabit, optical power is P. New “channel super” (CS) consists of ...A new method coherent DWDM system has been proposed. Standard method uses 90 wavelengths with channel capacity 100 G, so total capacity amounts to 9 Terabit, optical power is P. New “channel super” (CS) consists of 15 wavelengths, number of CS is 6, so total number of wavelengths is 90 too, total capacity is 6 Terabit, but optical power is 4/15P. Over ULH and EULH markets, standard approach will be forced to reduce the total capacity to 2.4 Terabit with optical power 4/15P as in proposed method. But the new can reach 6 Terabit with the same optical power 4/15P.展开更多
Cascaded holography coupled with the secret-sharing scheme has recently gained considerable attention due to its enhanced information processing and encryption capabilities.Here,we propose a new holographic iterative ...Cascaded holography coupled with the secret-sharing scheme has recently gained considerable attention due to its enhanced information processing and encryption capabilities.Here,we propose a new holographic iterative algorithm and present the implementation of cascaded liquid crystal(LC)holography for optical encryption.Each LC layer acts as the secret key and can generate a distinct holographic image.By cascading two LC elements,a new holographic image is formed.Additionally,we showcase the dynamic optical encryption achieved by electrically switching LCs with combined electric keys.This work may offer promising applications in optical cryptography,all-optical computing,and data storage.展开更多
Optical logic gates call for materials with giant optical nonlinearity to break the current performance bottleneck.Metal–organic frameworks(MOFs)provide an intriguing route to achieve superior optical nonlinearity be...Optical logic gates call for materials with giant optical nonlinearity to break the current performance bottleneck.Metal–organic frameworks(MOFs)provide an intriguing route to achieve superior optical nonlinearity benefitting from structural diversity and design flexibility.However,the potential of MOFs for optoelectronics has been largely overlooked and their applications in optical logic have not been exploited.Here,through temporally manipulating the nonlinear optical absorption process in porphyrin-based MOFs,we have successfully developed AND and XOR logic gates with an ultrafast speed approaching 1 THz and an on–off ratio above 90%.On this basis,all-optical information encryption is further demonstrated using transmittance as primary codes,which shows vast prospects in avoiding the disclosure of security information.To the best of our knowledge,this is the first exploration of MOFs for applications in ultrafast optical logic devices and information encryption.展开更多
Lasing emissions with multiple and tunable modes are promising in coding field as a novel cryptographic primitive.With the advantages of simple fabrication,full-color and high-quality-factor whispering gallery mode la...Lasing emissions with multiple and tunable modes are promising in coding field as a novel cryptographic primitive.With the advantages of simple fabrication,full-color and high-quality-factor whispering gallery mode lasing inside a circular cross-section,polymer microfibers are attractive for photonic devices.However,polymer lasing microfibers for information encryption have never been reported.Herein,we propose a design of printable lasing microfiber encryption chip by in-situ tuning the effective refractive index of the microresonator arrays via a facile approach.Through inkjet printing high-refractive-index nanoparticles on the designated position of lasing microfiber arrays,the effective refractive index of the microcavities is regulated,and the ratio of wavenumber spacing between transverse electric and transverse magnetic mode to the free spectral range can be modulated,particularly with neglectable influence by the size factor.Thus,the programmable region selective encoding process can be conducted simply by a printing program within several minutes.Besides,the encoded microfiber arrays are encapsulated into polydimethylsiloxane to reduce the scattering loss and environmental interference,and a printable encryption chip is realized.This work is expected to provide a platform for the printable encrypted devices.展开更多
For a conventional cascaded metasurface,the combination channel and each single channel are mutually dependent because the phase modulation of a cascaded metasurface is the sum of each single one.Here we propose a cas...For a conventional cascaded metasurface,the combination channel and each single channel are mutually dependent because the phase modulation of a cascaded metasurface is the sum of each single one.Here we propose a cascaded metasurface that can independently encode information into multiple channels.Based on the orientation degeneracy of anisotropic metasurfaces,each single metasurface can produce a quick-response(QR)image in the near field,governed by the Malus law,while the combined channel can produce a holographic image in the far field,governed by geometric phase.The independent and physically separated trichannel design makes information encryption safer.展开更多
Optical technologies have been widely used in information security owing to its parallel and high-speed processing capability.However,the most critical problem with current optical encryption techniques is that the cy...Optical technologies have been widely used in information security owing to its parallel and high-speed processing capability.However,the most critical problem with current optical encryption techniques is that the cyphertext is linearly related with the plaintext,leading to the possibility that one can crack the system by solving a set of linear equations with only two cyphertext from the same encryption machine.Many efforts have been taken in the last decade to resolve the linearity issue,but none of these offers a true nonlinear solution.Inspired by the recent advance in spatial nonlinear optics,here we demonstrate a true nonlinear optical encryption technique.We show that,owing to the self-phase modulation effect of the photorefractive crystal,the proposed nonlinear optical image encryption technique is robust against the known plaintext attack based on phase retrieval.This opens up a new avenue for optical encryption in the spatial nonlinear domain.展开更多
In light of the powerful light manipulation ability of holographic metasurfaces,optical imaging with wavelength multiplexing and polarization multiplexing is performed in this paper.The metasurface is composed of iden...In light of the powerful light manipulation ability of holographic metasurfaces,optical imaging with wavelength multiplexing and polarization multiplexing is performed in this paper.The metasurface is composed of identical rectangular nanoholes etched in silver film.Three imaging effects,including the in-plane color imaging,three-dimensional wavelength-encrypted imaging,and polarization-multiplexing wavelength-encrypted imaging,are realized.The designed metasurface has compact structure,and the obtained image has lower noise.The simulation and experiment results give the verification.Multiple images,including spatial multiplexing,wavelength multiplexing,and polarization multiplexing,exhibit immense potentialities of metasurfaces,and this work is helpful for expanding the applications of metasurfaces.展开更多
Organic-inorganic hybrid two-dimensional(2D)ruddlesden-popper(RP)perovskites with fantastic optoelectronic properties and good stability have attracted tremendous attention for the potential applications in photovolta...Organic-inorganic hybrid two-dimensional(2D)ruddlesden-popper(RP)perovskites with fantastic optoelectronic properties and good stability have attracted tremendous attention for the potential applications in photovoltaics and electroluminescence.Recently,a new allinorganic Cs2PbI2Cl22D perovskite has been proposed with excellent excitonic absorption and improved ambient and thermal stability.Herein,an interesting light-induced phase transition and photochromism in the Cs2PbI2Cl2were reported.Under low fluence light pumping,the room temperature photoluminescence(PL)of Cs2PbI2Cl2is dominated by a weak violet excitonic emission peaked at 412 nm.Surprisingly,the emission color gradually changes from violet to bright red while increasing the laser pumping fluence.This photochromic effect is determined to be caused by forming CsPbI3phase within the Cs2PbI2Cl2crystals,which is efficiently driven by thermal energy.Due to protection by the Cs2PbI2Cl2matrix,the embedded CsPbI3nanocrystals show improved stability than standard pure CsPbI3.Therefore,the Cs2PbI2Cl2perovskite with photochromic feature may find applications in optical encryption,as preliminarily shown in this work.展开更多
We propose a new approach to the generation of an alphabet for secret key exchange relying on small variations in the cavity length of an ultralong fiber laser.This new concept is supported by experimental results sho...We propose a new approach to the generation of an alphabet for secret key exchange relying on small variations in the cavity length of an ultralong fiber laser.This new concept is supported by experimental results showing how the radiofrequency spectrum of the laser can be exploited as a carrier to exchange information.The test bench for our proof of principle is a 50-km-long fiber laser linking two users,Alice and Bob,where each user can randomly add an extra 1-km-long segment of fiber.The choice of laser length is driven by two independent random binary values,which makes such length become itself a random variable.The security of key exchange is ensured whenever the two independent random choices lead to the same laser length and,hence,to the same free spectral range.展开更多
文摘Some existing image encryption schemes use simple low-dimensional chaotic systems, which makes the algorithms insecure and vulnerable to brute force attacks and cracking. Some algorithms have issues such as weak correlation with plaintext images, poor image reconstruction quality, and low efficiency in transmission and storage. To solve these issues,this paper proposes an optical image encryption algorithm based on a new four-dimensional memristive hyperchaotic system(4D MHS) and compressed sensing(CS). Firstly, this paper proposes a new 4D MHS, which has larger key space, richer dynamic behavior, and more complex hyperchaotic characteristics. The introduction of CS can reduce the image size and the transmission burden of hardware devices. The introduction of double random phase encoding(DRPE) enables this algorithm has the ability of parallel data processing and multi-dimensional coding space, and the hyperchaotic characteristics of 4D MHS make up for the nonlinear deficiency of DRPE. Secondly, a construction method of the deterministic chaotic measurement matrix(DCMM) is proposed. Using DCMM can not only save a lot of transmission bandwidth and storage space, but also ensure good quality of reconstructed images. Thirdly, the confusion method and diffusion method proposed are related to plaintext images, which require both four hyperchaotic sequences of 4D MHS and row and column keys based on plaintext images. The generation process of hyperchaotic sequences is closely related to the hash value of plaintext images. Therefore, this algorithm has high sensitivity to plaintext images. The experimental testing and comparative analysis results show that proposed algorithm has good security and effectiveness.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61871234 and 62001249)the Postgraduate Research&Practice Innovation Program of Jiangsu Province(Grant No.KYCX200729)+3 种基金the Natural Science Research Project of Higher Education of Jiangsu Province(Grant No.20KJB510030)the Qing Lan Project of Jiangsu Province(Su Teacher’s Letter[2022]No.29)the Research project of NanJing Tech University Pujiang Institute(Grant No.njpj2022-1-25)the Priority Academic Program Development of Jiangsu Higher Education Institutions.
文摘An optical encryption(OE) scheme based on the spread spectrum ghost imaging(SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadamard matrix of order N is used as the secure key, and shared with the authorized user, Bob, through a private channel. Each corresponding row vector of the order-N Hadamard matrix is then used as the direct sequence code to modulate a speckle pattern for the ghost imaging system, and an image is encrypted with the help of the SSGI. The measurement results from the bucket detector, named as ciphertext, are then transmitted to Bob through a public channel. The illuminating speckle patterns are also shared with Bob by the public channel. With the correct secure key, Bob could reconstruct the image with the aid of the SSGI system, whereas the unauthorized user, Eve, could not obtain any useful information of the encrypted image. The numerical simulations and experimental results show that the proposed scheme is feasible with a higher security and a smaller key. For the 32 × 32 pixels image, the number of bits sent from Alice to Bob by using SSGIOE(M = 1024, N = 2048) scheme is only 0.0107 times over a computational ghost imaging optical encryption scheme.When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any information of the encrypted image. The extreme circumstance for the proposed SSGI-OE scheme is also discussed, where the eavesdropper begins to extract the information when ER is up to 15%.
基金financial supports from the National Natural Science Foundation of China(NSFC)(62061136005,61705141,61805152,61875129,61701321)Sino-German Research Collaboration Group(GZ 1391)+2 种基金the Mobility program(M-0044)sponsored by the Sino-German CenterChinese Academy of Sciences(QYZDB-SSW-JSC002)Science and Technology Innovation Commission of Shenzhen(JCYJ20170817095047279)。
文摘Optical cryptanalysis is essential to the further investigation of more secure optical cryptosystems.Learning-based at-tack of optical encryption eliminates the need for the retrieval of random phase keys of optical encryption systems but it is limited for practical applications since it requires a large set of plaintext-ciphertext pairs for the cryptosystem to be at-tacked.Here,we propose a two-step deep learning strategy for ciphertext-only attack(COA)on the classical double ran-dom phase encryption(DRPE).Specifically,we construct a virtual DRPE system to gather the training data.Besides,we divide the inverse problem in COA into two more specific inverse problems and employ two deep neural networks(DNNs)to respectively learn the removal of speckle noise in the autocorrelation domain and the de-correlation operation to retrieve the plaintext image.With these two trained DNNs at hand,we show that the plaintext can be predicted in real-time from an unknown ciphertext alone.The proposed learning-based COA method dispenses with not only the retrieval of random phase keys but also the invasive data acquisition of plaintext-ciphertext pairs in the DPRE system.Numerical simulations and optical experiments demonstrate the feasibility and effectiveness of the proposed learning-based COA method.
文摘A new distribution scheme of decryption keys used in optical verification systems is proposed. The encryption procedure is digitally implemented with the use of an iteration algorithm in computer. Three target images corresponding to three wavelengths are encoded into three sets of phase-only masks (POMs) by a special distributing method. These three sets of POMs are assigned to three authorized users as the personal identification. A lensless optical system is used as the verification system. In the verification procedure, every two of the three authorized users can pass the verification procedure cooperatively, but only one user cannot do. Numerical simulation shows that the proposed distribution scheme of decryption keys not only can improve the security level of verification system, but also can bring convenience and flexibility for authorized users.
基金Supported by the National Natural Science Foundation of China under Grant Nos 61575197 and 61307018the K.C.Wong Education Foundation,the President Fund of University of Chinese Academy of Sciencesthe Fusion Funds of Research and Education of Chinese Academy of Sciences
文摘The principle of ptychography is applied in known plain text attack on the double random phase encoding (DRPE) system. We find that with several pairs of plain texts and cipher texts, the model of attack on DRPE can be converted to the model of ptyehographical imaging. Owing to the inherent merits of the ptyehographical imaging, the DRPE system can be breached totally in a fast and nearly perfect way, which is unavailable for currently existing attack methods. Further, since the decryption keys can be seen as an object to be imaged from the perspective of imaging, the ptychographical technique may be a kind of new direction to further analysis of the security of other encryption systems based on double random keys.
基金This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program to support publication in the top journal(Grant no.42-FTTJ-12).
文摘Due to the rapid growth of telemedicine and healthcare services,color medical image security applications have been expanded precipitously.In this paper,an asymmetric PTFrFT(Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested.Two different phases in the fractional Fourier and output planes are provided as deciphering keys.Accordingly,the ciphering keys will not be employed for the deciphering procedure.Thus,the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH(Optical Scanning Holography)and DRPE(Double Random Phase Encoding)algorithms.One of the principal impacts of the introduced asymmetric cryptosystem is that it eliminates the onedimensionality aspects of the related symmetric cryptosystems due to its remarkable feature of phase nonlinear truncation components.More comparisons on various colormedical images are examined and analyzed to substantiate the cryptosystem efficacy.The achieved experimental outcomes ensure that the introduced cryptosystem is robust and secure.It has terrific cryptography performance compared to conventional cryptography algorithms,even in the presence of noise and severe channel attacks.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61975185 and 61575178)the Natural Science Foundation of Zhejiang Province,China(Grant No.LY19F030004)the Scientific Research and Development Fund of Zhejiang University of Science and Technology,China(Grant No.F701108L03).
文摘The two types of nonlinear optical cryptosystems(NOCs)that are respectively based on amplitude-phase retrieval algorithm(APRA)and phase retrieval algorithm(PRA)have attracted a lot of attention due to their unique mechanism of encryption process and remarkable ability to resist common attacks.In this paper,the securities of the two types of NOCs are evaluated by using a deep-learning(DL)method,where an end-to-end densely connected convolutional network(DenseNet)model for cryptanalysis is developed.The proposed DL-based method is able to retrieve unknown plaintexts from the given ciphertexts by using the trained DenseNet model without prior knowledge of any public or private key.The results of numerical experiments with the DenseNet model clearly demonstrate the validity and good performance of the proposed the DL-based attack on NOCs.
基金This work was supported by the National Key Research and Development Program of China(2022YFA1404800,2019YFA0705000)National Natural Science Foundation of China(11974218,12004220,12104264,12192254,92250304)+2 种基金Regional Science and Technology Development Project of the Central Government(YDZX20203700001766)China Postdoctoral Science Foundation(2022T150392)the Natural Science Foundation of Shandong Province(ZR2021QA014,ZR2021ZD02).
文摘The optical coherence structures of random optical fields can determine beam propagation behavior,light–matter interactions,etc.Their performance makes a light beam robust against turbulence,scattering,and distortion.Recently,we proposed optical coherence encryption and robust far-field optical imaging techniques.All related applications place a high demand on precision in the experimental measurements of complex optical coherence structures,including their real and imaginary parts.Past studies on these measurements have mainly adopted theoretical mathematical approximations,limited to Gaussian statistic involving speckle statistic(time-consuming),or used complicated and delicate optical systems in the laboratory.In this study,we provide:a robust,convenient,and fast protocol to measure the optical coherence structures of random optical fields via generalized Arago(or Poisson)spot experiments with rigorous mathematical solutions.Our proposal only requires to capture the intensity thrice,and is applicable to any optical coherence structures,regardless of their type or optical statistics.The theoretical and experimental results demonstrated that the real and imaginary parts of the structures could be simultaneously recovered with high precision.We believe that such a protocol can be widely employed in phase measurement,optical imaging,and image transfer.
基金supported by the National Basic Research Program of China(Grant No.2011CB302903)the National Natural Science Foundation of China(Grant Nos.61272084 and 61202004)the Key Project of Natural Science Research of Jiangsu University,China(Grant No.11KJA520002)
文摘In this paper, we propose an encryption scheme based on phase-shifting digital interferometry. According to the original system framework, we add a random amplitude mask and replace the Fourier transform by the Fresnel transform. We develop a mathematical model and give a discrete formula based on the scheme, which makes it easy to implement the scheme in computer programming. The experimental results show that the improved system has a better performance in security than the original encryption method. Moreover, it demonstrates a good capability of anti-noise and anti-shear robustness.
基金The authors would like to thank the Deanship of Scientific Research,Taif University Researchers Supporting Project Number(TURSP-2020/08),Taif University,Taif,Saudi Arabia for supporting this research work.
文摘In the last few years,videos became the most common form of information transmitted over the internet,and a lot of the traffic is confidential and must be protected and delivered safely to its intended users.This introduces the challenges of presenting encryption systems that can encode videos securely and efficiently at the same time.This paper presents an efficient opto-video encryption system using Logistic Adjusted Sine map(LASM)in the Fractional Fourier Transform(FrFT).In the presented opto-video LASM-based FrFT scheme,the encoded video is split into distinct frames and transformed into optical signals utilizing an optical supply.Each of the developed optical video frames is ciphered by utilizing the LASM in optical FrFT system using two-phase modulation forms on the video frame,the first in the time-domain and the second in the FrFT domain.In the end,the ciphervideo frame is spotted utilizing a CCD digital camera and transformed into a digital structure that can be managed using a computer.We test the proposed opto-video LASM-based FrFT scheme using various security tools.The outcomes demonstrate that the presented scheme can effectively encrypt and decrypt video signals.In addition,it encrypts videos with a high level of encryption qualitywithout sacrificing its resistance to noise immunity.Finally,the test outcomes demonstrate that the presented scheme is immune to known attacks.
文摘A new method coherent DWDM system has been proposed. Standard method uses 90 wavelengths with channel capacity 100 G, so total capacity amounts to 9 Terabit, optical power is P. New “channel super” (CS) consists of 15 wavelengths, number of CS is 6, so total number of wavelengths is 90 too, total capacity is 6 Terabit, but optical power is 4/15P. Over ULH and EULH markets, standard approach will be forced to reduce the total capacity to 2.4 Terabit with optical power 4/15P as in proposed method. But the new can reach 6 Terabit with the same optical power 4/15P.
基金supported by the National Key Research and Development Program of China(Nos.2022YFA1405000 and 2021YFA1202000)the National Natural Science Foundation of China(Nos.52003115,62375119,62305157,and 62005009)+2 种基金the Natural Science Foundation of Jiangsu Province(No.BK20212004)the support of Xiaomi Young Scholar ProgramYoung Elite Scientists Sponsorship Program by CAST(No.2022QNRC001).
文摘Cascaded holography coupled with the secret-sharing scheme has recently gained considerable attention due to its enhanced information processing and encryption capabilities.Here,we propose a new holographic iterative algorithm and present the implementation of cascaded liquid crystal(LC)holography for optical encryption.Each LC layer acts as the secret key and can generate a distinct holographic image.By cascading two LC elements,a new holographic image is formed.Additionally,we showcase the dynamic optical encryption achieved by electrically switching LCs with combined electric keys.This work may offer promising applications in optical cryptography,all-optical computing,and data storage.
基金supported by Science Challenge Project(no.TZ2018001)National Natural Science Foundation of China(nos.11872058 and 21802036)Project of State Key Laboratory of Environment-friendly Energy Materials,and Southwest University of Science and Technology(21fksy07).
文摘Optical logic gates call for materials with giant optical nonlinearity to break the current performance bottleneck.Metal–organic frameworks(MOFs)provide an intriguing route to achieve superior optical nonlinearity benefitting from structural diversity and design flexibility.However,the potential of MOFs for optoelectronics has been largely overlooked and their applications in optical logic have not been exploited.Here,through temporally manipulating the nonlinear optical absorption process in porphyrin-based MOFs,we have successfully developed AND and XOR logic gates with an ultrafast speed approaching 1 THz and an on–off ratio above 90%.On this basis,all-optical information encryption is further demonstrated using transmittance as primary codes,which shows vast prospects in avoiding the disclosure of security information.To the best of our knowledge,this is the first exploration of MOFs for applications in ultrafast optical logic devices and information encryption.
基金The authors would like to acknowledge the National Natural Science Foundation of China(NSFC)(Nos.52203252 and 61822501)the Beijing Natural Science Foundation(No.Z180015)for financial support.
文摘Lasing emissions with multiple and tunable modes are promising in coding field as a novel cryptographic primitive.With the advantages of simple fabrication,full-color and high-quality-factor whispering gallery mode lasing inside a circular cross-section,polymer microfibers are attractive for photonic devices.However,polymer lasing microfibers for information encryption have never been reported.Herein,we propose a design of printable lasing microfiber encryption chip by in-situ tuning the effective refractive index of the microresonator arrays via a facile approach.Through inkjet printing high-refractive-index nanoparticles on the designated position of lasing microfiber arrays,the effective refractive index of the microcavities is regulated,and the ratio of wavenumber spacing between transverse electric and transverse magnetic mode to the free spectral range can be modulated,particularly with neglectable influence by the size factor.Thus,the programmable region selective encoding process can be conducted simply by a printing program within several minutes.Besides,the encoded microfiber arrays are encapsulated into polydimethylsiloxane to reduce the scattering loss and environmental interference,and a printable encryption chip is realized.This work is expected to provide a platform for the printable encrypted devices.
基金supported by the National Key Research and Development Program of China(No.2021YFE0205800)the National Natural Science Foundation of China(Nos.12174292,11904267,and 91950110)the Fundamental Research Funds for the Central Universities(Nos.2042022kf1013,2042022kf0024,and 2042021kf0018)。
文摘For a conventional cascaded metasurface,the combination channel and each single channel are mutually dependent because the phase modulation of a cascaded metasurface is the sum of each single one.Here we propose a cascaded metasurface that can independently encode information into multiple channels.Based on the orientation degeneracy of anisotropic metasurfaces,each single metasurface can produce a quick-response(QR)image in the near field,governed by the Malus law,while the combined channel can produce a holographic image in the far field,governed by geometric phase.The independent and physically separated trichannel design makes information encryption safer.
基金National Natural Science Foundation of China(61991452,62061136005)Sino-German Center(GZ1391).
文摘Optical technologies have been widely used in information security owing to its parallel and high-speed processing capability.However,the most critical problem with current optical encryption techniques is that the cyphertext is linearly related with the plaintext,leading to the possibility that one can crack the system by solving a set of linear equations with only two cyphertext from the same encryption machine.Many efforts have been taken in the last decade to resolve the linearity issue,but none of these offers a true nonlinear solution.Inspired by the recent advance in spatial nonlinear optics,here we demonstrate a true nonlinear optical encryption technique.We show that,owing to the self-phase modulation effect of the photorefractive crystal,the proposed nonlinear optical image encryption technique is robust against the known plaintext attack based on phase retrieval.This opens up a new avenue for optical encryption in the spatial nonlinear domain.
基金supported by the National Natural Science Foundation of China(No.10874105)Natural Science Foundation of Shandong Province(No.ZR2020KA009).
文摘In light of the powerful light manipulation ability of holographic metasurfaces,optical imaging with wavelength multiplexing and polarization multiplexing is performed in this paper.The metasurface is composed of identical rectangular nanoholes etched in silver film.Three imaging effects,including the in-plane color imaging,three-dimensional wavelength-encrypted imaging,and polarization-multiplexing wavelength-encrypted imaging,are realized.The designed metasurface has compact structure,and the obtained image has lower noise.The simulation and experiment results give the verification.Multiple images,including spatial multiplexing,wavelength multiplexing,and polarization multiplexing,exhibit immense potentialities of metasurfaces,and this work is helpful for expanding the applications of metasurfaces.
基金supported by the Macao Science and Technology Development Fund(FDCT-116/2016/A3,FDCT-091/2017/A2,FDCT-014/2017/AMJ and FDCT-199/2017/A3)Start-up Research Grant Fund from University of Macao(SRG2016-00002-FST)+3 种基金Research and Development Grant for Chair Professor Fund from University of Macao(CPG2018-00026-FST)Research Grant(SRG201600087-FST,MYRG2018-00148-IAPME and MYRG2018-00142-IAPME)from University of Macaothe National Natural Science Foundation of China(91733302,61935017 and 61605073)the Natural Science Foundation of Guangdong Province of China(2019A1515012186)。
文摘Organic-inorganic hybrid two-dimensional(2D)ruddlesden-popper(RP)perovskites with fantastic optoelectronic properties and good stability have attracted tremendous attention for the potential applications in photovoltaics and electroluminescence.Recently,a new allinorganic Cs2PbI2Cl22D perovskite has been proposed with excellent excitonic absorption and improved ambient and thermal stability.Herein,an interesting light-induced phase transition and photochromism in the Cs2PbI2Cl2were reported.Under low fluence light pumping,the room temperature photoluminescence(PL)of Cs2PbI2Cl2is dominated by a weak violet excitonic emission peaked at 412 nm.Surprisingly,the emission color gradually changes from violet to bright red while increasing the laser pumping fluence.This photochromic effect is determined to be caused by forming CsPbI3phase within the Cs2PbI2Cl2crystals,which is efficiently driven by thermal energy.Due to protection by the Cs2PbI2Cl2matrix,the embedded CsPbI3nanocrystals show improved stability than standard pure CsPbI3.Therefore,the Cs2PbI2Cl2perovskite with photochromic feature may find applications in optical encryption,as preliminarily shown in this work.
基金This work was supported by the French National Research Agency(grants LABEX SIGMALIM and ANR 08-JCJC-0122 PARADHOQS)the European Research Council(project ULTRALASER)+2 种基金the Leverhulme Trust(grant RPG-278)the Spanish MICINN project TEC2011-27314(RAMAS)We also acknowledge support by the XLIM Institute(grant VIP2013).
文摘We propose a new approach to the generation of an alphabet for secret key exchange relying on small variations in the cavity length of an ultralong fiber laser.This new concept is supported by experimental results showing how the radiofrequency spectrum of the laser can be exploited as a carrier to exchange information.The test bench for our proof of principle is a 50-km-long fiber laser linking two users,Alice and Bob,where each user can randomly add an extra 1-km-long segment of fiber.The choice of laser length is driven by two independent random binary values,which makes such length become itself a random variable.The security of key exchange is ensured whenever the two independent random choices lead to the same laser length and,hence,to the same free spectral range.