Roadmap on Optics and Photonics for Security and Encryption

dc.contributor.authorStern, A.
dc.contributor.authorWang, Xinyuan
dc.contributor.authorXia, T.
dc.contributor.authorXiao, Y.
dc.contributor.authorZhenwei, X.
dc.contributor.authorZhu, S.
dc.contributor.authorJana, A.
dc.contributor.authorLam, E.Y.
dc.contributor.authorLong, G.-L.
dc.contributor.authorMatoba, O.
dc.contributor.authorMi, Z.
dc.contributor.authorMoon, I.
dc.contributor.authorNishchal, N.K.
dc.contributor.authorPan, D.
dc.contributor.authorPeng, X.
dc.contributor.authorPinkse, P.W.H.
dc.contributor.authorJavidi, B.
dc.contributor.authorCarnicer González, Arturo
dc.contributor.authorAhmadi, K.
dc.contributor.authorAwatsuji, Y.
dc.contributor.authorChen, Wanqi
dc.contributor.authorFournel, T.
dc.contributor.authorGenevet, P.
dc.contributor.authorGuo, J.
dc.contributor.authorHe, W.
dc.contributor.authorHebert, M.
dc.contributor.authorShi, Y.
dc.contributor.authorSitu, G.
dc.date.accessioned2026-01-29T08:39:54Z
dc.date.available2026-01-29T08:39:54Z
dc.date.issued2025-12-01
dc.date.updated2026-01-29T08:39:54Z
dc.description.abstractIn 1994, Javidi and Horner published a paper in Optical Engineering that highlighted the ability of free space optical systems to manipulate sensitive data for authentication purposes. The underlying idea was effective yet surprisingly simple: an optical nonlinear joint transform using a random phase mask in both the input and the reference could produce a correlation peak to indicate whether the input object is authentic or not. This seminal paper fueled the development of this new discipline. After three decades, optical encryption and security have matured into a field that plays a central role in the development of photonics techniques. While the pioneering work was mainly focused on the field of optical information processing, nowadays, a broad spectrum of disciplines are contributing to developing security solutions, including nanotechnology, materials science, quantum information, and deep learning, just to cite a few. The present roadmap paper gathers 28 leading authors in the field from 21 academic institutions across nine different countries. It is organized into 17 sections which discuss the present and future challenges, state-of-the-art technology, and real-world solutions to address the security challenges facing our society.
dc.format.extent31 p.
dc.format.mimetypeapplication/pdf
dc.identifier.idgrec764450
dc.identifier.issn2169-3536
dc.identifier.urihttps://hdl.handle.net/2445/226382
dc.language.isoeng
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.relation.isformatofReproducció del document publicat a: https://doi.org/10.1109/ACCESS.2025.3597226
dc.relation.ispartofIEEE Access, 2025, vol. 13, p. 140087-140117
dc.relation.urihttps://doi.org/10.1109/ACCESS.2025.3597226
dc.rightscc-by (c) Javidi, B. et al., 2025
dc.rights.accessRightsinfo:eu-repo/semantics/openAccess
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.subject.classificationPolarització (Llum)
dc.subject.classificationHolografia
dc.subject.classificationSistemes de seguretat
dc.subject.otherPolarization (Light)
dc.subject.otherHolography
dc.subject.otherSecurity systems
dc.titleRoadmap on Optics and Photonics for Security and Encryption
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion

Fitxers

Paquet original

Mostrant 1 - 1 de 1
Carregant...
Miniatura
Nom:
913550.pdf
Mida:
3.57 MB
Format:
Adobe Portable Document Format