A Survey of Current Optical Security Techniques

نویسنده

  • Ari Y. Benbasat
چکیده

In this paper, we describe two types of optical security devices: di ractive anti-counterfeiting devices such holograms and microgratings, and encryption techniques such as double-phase encoding and optoelectronic implementation of conventional algorithms. It is shown that holograms are more easily copied than is widely believed, though advanced techniques may soon make duplication far more di cult. Zero-order microgratings, which produce a distinctive red to green colour shift upon rotation about their own axis, are o ered as a more secure alternative that could gain ascendency. Double-phase encryption allows for simple encoding using a two-lens processor, as well as the possibility of denser holographic storage. Its security, however, is poor because of its linearity. Optoelectronic implementations of operations such as exclusive-or and bit-permutation, which are central to current cryptography, will allow faster parallel instantiations of algorithms for which the security is already well tested.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Non-invasive Optical Techniques for determination of blood Glucose levels: A Review Article

This article reviews the development of non-invasive optical techniques for determination of blood glucose concentrations in diabetic patients. Early diagnosis and daily management are essential for ensuring the healthy life of diabetic patients. The determination of blood glucose concentration with common devices involves the chemical analysis of blood samples, which are obtained by pricking t...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

A Survey of Concurrency Control Algorithms in the Operating Systems

Concurrency control is one of the important problems in operation systems. Various studies have been reported to present different algorithms to address this problem, although a few attempts have been made to represent an overall view of the characteristics of these algorithms and comparison of their capabilities to each other. This paper presents a survey of the current methods for controlling...

متن کامل

Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks

In recent years, Vehicular Ad Hoc Networks (VANETs) have emerged as one of the most active areas in the field of technology to provide a wide range of services, including road safety, passenger's safety, amusement facilities for passengers and emergency facilities. Due to the lack of flexibility, complexity and high dynamic network topology, the development and management of current Vehicular A...

متن کامل

A Survey of Concurrency Control Algorithms in the Operating Systems

Concurrency control is one of the important problems in operation systems. Various studies have been reported to present different algorithms to address this problem, although a few attempts have been made to represent an overall view of the characteristics of these algorithms and comparison of their capabilities to each other. This paper presents a survey of the current methods for controlling...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999