4.7 Article

Focus-tunable experimental optical cryptosystem

期刊

OPTICS AND LASER TECHNOLOGY
卷 148, 期 -, 页码 -

出版社

ELSEVIER SCI LTD
DOI: 10.1016/j.optlastec.2021.107689

关键词

Optical encryption; Fractional Fourier transform; Focus-tunable lens; Multiplexing

资金

  1. Comite para el Desarrollo de la Investigacion -CODI-(Universidad de Antioquia -UdeA, Colombia)
  2. Fundacion Para la Promocion de la Investigacion y la Tecnologia -Banco de la Republica (Colombia)
  3. Fondo Nacional de Financiamiento para la Ciencia, la Tecnologia y la Innovacion Francisco Jose de Caldas [2019-848]
  4. Fondo Francisco Jose de Caldas (Colciencias-Colombia) [727]
  5. Agencia Nacional de Promocion Cientifica y Tecnologica [2018-04558]
  6. CONICET (Argentina) [0849/16]

向作者/读者索取更多资源

We have successfully implemented an optical encryption setup in the fractional Fourier domain using an electrically focus-tunable lens. Our proposed scheme offers stability and reduced alignment requirements compared to previous fractional cryptosystems. The results are supported by numerical simulations and experimental evidence, confirming the viability and versatility of our proposal.
We present a first implementation of an optical encryption setup in the fractional Fourier domain using an electrically focus-tunable lens. Fractional Fourier transform cryptosystems allow the use of the fractional order of the transform as an encryption parameter. In our proposed scheme, the tunable lens enables fast control of this parameter and replaces the use of mechanical alternatives, increasing the stability and reducing the alignment requirements compared to previous fractional cryptosystems. The active electrically focus-tunable lens was accurately calibrated to ensure proper implementation and control of the tunable optical cryptosystem. We tested the encryption-decryption range of the electro-optical lens by encrypting objects using different focal lengths. Then we analyzed the tolerance to decryption with keys registered with different focal lengths. In this way, we found an operation range that enables the implementation of an effective multi-user encryption protocol. All results presented in this work are supported by numerical simulations and experimental results, demonstrating the viability and versatility of our proposal.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据