Roadmap on Optics and Photonics for Security and Encryption

dc.contributor.author
Stern, A.
dc.contributor.author
Wang, Xinyuan
dc.contributor.author
Xia, T.
dc.contributor.author
Xiao, Y.
dc.contributor.author
Zhenwei, X.
dc.contributor.author
Zhu, S.
dc.contributor.author
Jana, A.
dc.contributor.author
Lam, E.Y.
dc.contributor.author
Long, G.-L.
dc.contributor.author
Matoba, O.
dc.contributor.author
Mi, Z.
dc.contributor.author
Moon, I.
dc.contributor.author
Nishchal, N.K.
dc.contributor.author
Pan, D.
dc.contributor.author
Peng, X.
dc.contributor.author
Pinkse, P.W.H.
dc.contributor.author
Javidi, B.
dc.contributor.author
Carnicer González, Arturo
dc.contributor.author
Ahmadi, K.
dc.contributor.author
Awatsuji, Y.
dc.contributor.author
Chen, Wanqi
dc.contributor.author
Fournel, T.
dc.contributor.author
Genevet, P.
dc.contributor.author
Guo, J.
dc.contributor.author
He, W.
dc.contributor.author
Hebert, M.
dc.contributor.author
Shi, Y.
dc.contributor.author
Situ, G.
dc.date.accessioned
2026-01-30T18:28:26Z
dc.date.available
2026-01-30T18:28:26Z
dc.date.issued
2026-01-29T08:39:54Z
dc.date.issued
2026-01-29T08:39:54Z
dc.date.issued
2025-12-01
dc.date.issued
2026-01-29T08:39:54Z
dc.identifier
2169-3536
dc.identifier
https://hdl.handle.net/2445/226382
dc.identifier
764450
dc.identifier.uri
https://hdl.handle.net/2445/226382
dc.description.abstract
In 1994, Javidi and Horner published a paper in Optical Engineering that highlighted the ability of free space optical systems to manipulate sensitive data for authentication purposes. The underlying idea was effective yet surprisingly simple: an optical nonlinear joint transform using a random phase mask in both the input and the reference could produce a correlation peak to indicate whether the input object is authentic or not. This seminal paper fueled the development of this new discipline. After three decades, optical encryption and security have matured into a field that plays a central role in the development of photonics techniques. While the pioneering work was mainly focused on the field of optical information processing, nowadays, a broad spectrum of disciplines are contributing to developing security solutions, including nanotechnology, materials science, quantum information, and deep learning, just to cite a few. The present roadmap paper gathers 28 leading authors in the field from 21 academic institutions across nine different countries. It is organized into 17 sections which discuss the present and future challenges, state-of-the-art technology, and real-world solutions to address the security challenges facing our society.
dc.format
31 p.
dc.format
application/pdf
dc.language
eng
dc.publisher
Institute of Electrical and Electronics Engineers (IEEE)
dc.relation
Reproducció del document publicat a: https://doi.org/10.1109/ACCESS.2025.3597226
dc.relation
IEEE Access, 2025, vol. 13, p. 140087-140117
dc.relation
https://doi.org/10.1109/ACCESS.2025.3597226
dc.rights
cc-by (c) Javidi, B. et al., 2025
dc.rights
http://creativecommons.org/licenses/by/4.0/
dc.rights
info:eu-repo/semantics/openAccess
dc.subject
Polarització (Llum)
dc.subject
Holografia
dc.subject
Sistemes de seguretat
dc.subject
Polarization (Light)
dc.subject
Holography
dc.subject
Security systems
dc.title
Roadmap on Optics and Photonics for Security and Encryption
dc.type
info:eu-repo/semantics/article
dc.type
info:eu-repo/semantics/publishedVersion


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)