Roadmap on Optics and Photonics for Security and Encryption
| dc.contributor.author | Stern, A. | |
| dc.contributor.author | Wang, Xinyuan | |
| dc.contributor.author | Xia, T. | |
| dc.contributor.author | Xiao, Y. | |
| dc.contributor.author | Zhenwei, X. | |
| dc.contributor.author | Zhu, S. | |
| dc.contributor.author | Jana, A. | |
| dc.contributor.author | Lam, E.Y. | |
| dc.contributor.author | Long, G.-L. | |
| dc.contributor.author | Matoba, O. | |
| dc.contributor.author | Mi, Z. | |
| dc.contributor.author | Moon, I. | |
| dc.contributor.author | Nishchal, N.K. | |
| dc.contributor.author | Pan, D. | |
| dc.contributor.author | Peng, X. | |
| dc.contributor.author | Pinkse, P.W.H. | |
| dc.contributor.author | Javidi, B. | |
| dc.contributor.author | Carnicer González, Arturo | |
| dc.contributor.author | Ahmadi, K. | |
| dc.contributor.author | Awatsuji, Y. | |
| dc.contributor.author | Chen, Wanqi | |
| dc.contributor.author | Fournel, T. | |
| dc.contributor.author | Genevet, P. | |
| dc.contributor.author | Guo, J. | |
| dc.contributor.author | He, W. | |
| dc.contributor.author | Hebert, M. | |
| dc.contributor.author | Shi, Y. | |
| dc.contributor.author | Situ, G. | |
| dc.date.accessioned | 2026-01-29T08:39:54Z | |
| dc.date.available | 2026-01-29T08:39:54Z | |
| dc.date.issued | 2025-12-01 | |
| dc.date.updated | 2026-01-29T08:39:54Z | |
| dc.description.abstract | In 1994, Javidi and Horner published a paper in Optical Engineering that highlighted the ability of free space optical systems to manipulate sensitive data for authentication purposes. The underlying idea was effective yet surprisingly simple: an optical nonlinear joint transform using a random phase mask in both the input and the reference could produce a correlation peak to indicate whether the input object is authentic or not. This seminal paper fueled the development of this new discipline. After three decades, optical encryption and security have matured into a field that plays a central role in the development of photonics techniques. While the pioneering work was mainly focused on the field of optical information processing, nowadays, a broad spectrum of disciplines are contributing to developing security solutions, including nanotechnology, materials science, quantum information, and deep learning, just to cite a few. The present roadmap paper gathers 28 leading authors in the field from 21 academic institutions across nine different countries. It is organized into 17 sections which discuss the present and future challenges, state-of-the-art technology, and real-world solutions to address the security challenges facing our society. | |
| dc.format.extent | 31 p. | |
| dc.format.mimetype | application/pdf | |
| dc.identifier.idgrec | 764450 | |
| dc.identifier.issn | 2169-3536 | |
| dc.identifier.uri | https://hdl.handle.net/2445/226382 | |
| dc.language.iso | eng | |
| dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
| dc.relation.isformatof | Reproducció del document publicat a: https://doi.org/10.1109/ACCESS.2025.3597226 | |
| dc.relation.ispartof | IEEE Access, 2025, vol. 13, p. 140087-140117 | |
| dc.relation.uri | https://doi.org/10.1109/ACCESS.2025.3597226 | |
| dc.rights | cc-by (c) Javidi, B. et al., 2025 | |
| dc.rights.accessRights | info:eu-repo/semantics/openAccess | |
| dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | |
| dc.subject.classification | Polarització (Llum) | |
| dc.subject.classification | Holografia | |
| dc.subject.classification | Sistemes de seguretat | |
| dc.subject.other | Polarization (Light) | |
| dc.subject.other | Holography | |
| dc.subject.other | Security systems | |
| dc.title | Roadmap on Optics and Photonics for Security and Encryption | |
| dc.type | info:eu-repo/semantics/article | |
| dc.type | info:eu-repo/semantics/publishedVersion |
Fitxers
Paquet original
1 - 1 de 1