Por favor, use este identificador para citar o enlazar este ítem: https://hdl.handle.net/10495/32711
Registro completo de metadatos
Campo DC Valor Lengua/Idioma
dc.contributor.authorRueda Muñoz, Edgar Alberto-
dc.contributor.authorBarrera Ramírez, John Fredy-
dc.contributor.authorTorroba, Roberto Daniel-
dc.contributor.authorRíos Ocampo, Carlos Andrés-
dc.date.accessioned2022-12-11T15:52:19Z-
dc.date.available2022-12-11T15:52:19Z-
dc.date.issued2012-
dc.identifier.citationRueda, Edgar & Rios Ocampo, Carlos & Barrera Ramírez, John Fredy & Torroba, Roberto. (2012). Master key generation to avoid the use of an external reference wave in an experimental JTC encrypting architecture. Applied optics. 51. 1822-7. 10.1364/AO.51.001822.spa
dc.identifier.issn1559-128X-
dc.identifier.urihttps://hdl.handle.net/10495/32711-
dc.description.abstractABSTRACT: In experimental optodigital encrypting architectures, the use of a reference wave is essential. In this contribution, we present an experimental alternative to avoid the reference wave during the encrypting procedure in a joint transform correlator architecture by introducing the concept of a master key. Besides, the master key represents an additional security element for the entire protocol. In our method, the master key is holographically processed and used during the encryption process with the encrypting key. We give the mathematical description for the process in case of a single input object and then we extend it to multiple input objects. We present the experimental demonstration of the proposed method including two examples where this technique is successfully applied for several input objects.spa
dc.format.extent6spa
dc.format.mimetypeapplication/pdfspa
dc.language.isoengspa
dc.publisherOptical Society of Americaspa
dc.type.hasversioninfo:eu-repo/semantics/publishedVersionspa
dc.rightsinfo:eu-repo/semantics/openAccessspa
dc.rights.urihttp://creativecommons.org/licenses/by/2.5/co/*
dc.titleMaster key generation to avoid the use of an external reference wave in an experimental JTC encrypting architecturespa
dc.typeinfo:eu-repo/semantics/articlespa
dc.publisher.groupGrupo de Óptica y Fotónicaspa
dc.identifier.doi10.1364/AO.51.001822-
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85spa
dc.rights.accessrightshttp://purl.org/coar/access_right/c_abf2spa
dc.identifier.eissn2155-3165-
oaire.citationtitleApplied Opticsspa
oaire.citationstartpage1822spa
oaire.citationendpage1827spa
oaire.citationvolume51spa
oaire.citationissue11spa
dc.rights.creativecommonshttps://creativecommons.org/licenses/by/4.0/spa
dc.publisher.placeWashington, Estados Unidosspa
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1spa
dc.type.redcolhttps://purl.org/redcol/resource_type/ARTspa
dc.type.localArtículo de investigaciónspa
dc.subject.lembCifrado de datos (informática)-
dc.subject.lembData encryption (computer science)-
dc.subject.lembTransmisión de imágenes-
dc.subject.lembImage transmission-
dc.subject.proposalSeguridad ópticaspa
dc.subject.proposalCifrado ópticospa
dc.description.researchgroupidCOL0010789spa
dc.relation.ispartofjournalabbrevAppl. Opt.spa
Aparece en las colecciones: Artículos de Revista en Ciencias Exactas y Naturales

Ficheros en este ítem:
Fichero Descripción Tamaño Formato  
RuedaEdgar_2012_MasterKeyGeneration.pdfArtículo de investigación424.83 kBAdobe PDFVisualizar/Abrir


Este ítem está sujeto a una licencia Creative Commons Licencia Creative Commons Creative Commons