Audio encryption using polarized light beam
APL Photonics,
Год журнала:
2025,
Номер
10(3)
Опубликована: Март 1, 2025
In
recent
years,
the
security
of
audio
data
has
become
paramount
in
terms
personal
information,
national
security,
and
forensic
evidence.
However,
most
reported
systems
use
digital
algorithms
lack
their
implementation
optical
domain,
which
can
provide
better
due
to
physical
keys
high
speed.
addition,
recently
developed
phase-encoded
encryption
schemes
domain
have
quality
limitations
precise
wavefront
measurement
control.
Perfect
experimental
alignment
achieve
good
retrieved
is
very
challenging,
no
voice
been
reported.
This
work
introduces
a
robust
scheme
using
polarization
property
light
beam.
Initially,
one-dimensional
(1D)
combined
with
random
dataset
acts
as
an
key
converts
it
1D
cipher
audio,
transformed
into
two-dimensional
(2D)
cipher-audio
map.
Subsequently,
this
fragmented
several
2D
segments,
are
then
encoded
beam
binary
states.
An
arbitrary
sequence
maintained
during
encoding
segments
The
demonstrated
technique
non-interferometric
method,
decryption
be
achieved
through
intensity
recording
only.
Язык: Английский
Optical Audio Cryptosystem Using Hyperchaotic Implementation in Gyrator Domain
Physics Open,
Год журнала:
2025,
Номер
unknown, С. 100264 - 100264
Опубликована: Апрель 1, 2025
Язык: Английский
Securing multiple images using Gaussian aperture gyrator wavelet transform through QR decomposition and optical scanning holography
Journal of Optics,
Год журнала:
2025,
Номер
unknown
Опубликована: Май 30, 2025
Язык: Английский
Optical asymmetric image encryption using DNA through vortex beam encoding
Deleted Journal,
Год журнала:
2024,
Номер
6(11)
Опубликована: Ноя. 5, 2024
Optical
vortex
beam
has
gained
much
attention
in
the
field
of
information
processing
because
its
inherent
features,
such
as
infinite
number
orthogonal
modes.
In
this
paper,
we
demonstrate
optical
image
encryption
based
on
deoxyribonucleic
acid
(DNA)
encoding
rule
through
vortices.
scheme,
two
levels
security
are
achieved;
first
level,
an
input
is
encrypted
using
equal
modulus
decomposition
well
phase
truncation
and
reservation
approach.
Thus,
obtained
encoded
into
a
DNA
sequence
according
to
existing
then
exclusive-OR
operation
applied
with
random
key
order
obtain
ciphertext.
second
level
security,
beams
different
modes
arranged
form
lattices.
This
type
overcomes
tedious
task
manually
also
enhances
space
and,
hence,
security.
Simulation
experimental
results
support
efficacy
proposed
scheme.
Язык: Английский