Data protection using a joint transform correlator experimental system
PDF (Español (España))

How to Cite

Torroba, R., & Barrera Ramírez, J. F. (2015). Data protection using a joint transform correlator experimental system. Revista De La Academia Colombiana De Ciencias Exactas, Físicas Y Naturales, 39, 55–60. https://doi.org/10.18257/raccefyn.263

Downloads

Download data is not yet available.

Métricas Alternativas


Dimensions

Abstract

In this contribution the implementation of an experimental data protection system based on optical processing is presented, and the reliability of the recovered information when there is data loss during transmission is analyzed. The information is encrypted using an optical joint transform correlation architecture together with a double phase mask encoding technique. An authorized user recovers the original information when accessing the encoded data and the security key; if an intruder intersects the encoded image but does not possess the security key there is no possibility to access to the information contained in the encrypted image. The theoretical description and the experimental results show the ability the security systems exhibits to protect and recover the information by optical means, including the tolerance to data loss during transmission. © 2015. Acad. Colomb. Cienc. Ex. Fis. Nat. All rights reserved.Alfalou, A., Brosseau, C.2009. Optical image compression andOptical image compression and encryption methods. Adv.Opt. Photon1:589-636.Barrera, J.F., Henao, R., Tebaldi, M., Torroba, R., Bolognini,N.2006a. Multiplexing encryption-decryption via lateralshifting of a random phase mask. Opt. Commun.259:532-536.Barrera, J.F., Henao, R., Tebaldi, M., Torroba, R., Bolognini,N.2006b. Multiplexing encrypted data by using polarizedlight. Opt. Commun.260:109-112.Barrera, J.F., Henao, R., Tebaldi, M., Torroba, R., Bolognini,N.2006c.Multiple image encryption using an aperture-modulated optical system. Opt. Commun.261:29-33.Barrera, J.F., Tebaldi, M., Torroba, R., Bolognini, N.2009.Multiplexing encryption technique by combining randomamplitude and phase masks.Optik120:351-355.Barrera, J.F., Rueda, E., Ríos, C., Tebaldi, M., Bolognini, N.,Torroba, R.2011.Experimental opto-digital synthesis ofencrypted sub-samples of an image to improve its decodedquality.Opt. Commun.284:4350-4355.Barrera, J.F., Torroba, R.2010. One step multiplexing opticalencryption. Opt. Commun.283:1268-1272.Barrera, J.F., Vargas, C., Tebaldi, M., Torroba, R., Bolognini,N.2010.Known-plaintext attack on a joint transformcorrelator encrypting system. Opt. Lett.35:3553-3555.Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.1998. Rela-tions Among Notions Security for Public-Key EncryptionSchemes.Lecture Notes in Computer1492:26-46.Carnicer, A., Montes-Usategui, M., Arcos, S., Juvells, I.2005.Vulnerability to chosen-cyphertext attacks of opticalencryption schemes based on double random phase keys.Opt. Lett.30:1644-1646.Camp-Winget, N., Housley, R., Wagner, D., Walker, J.2003.Security flaws data links protocols.Communications of theACM46:35-39.Graydon, O.2013. Cryptography: Quick response codes, NaturePhotonics7:343.Javidi, B., Zhang, G., Li, J.1996. Experimental demonstration ofthe random phase encoding technique for image encryptionand security verification. Opt. Eng.35:2506-2512.Javidi, B., Esmail, A., Zhang, G.(Abril 3, 2012). Opticalsecurity system using Fourier plane encoding. U.S. patent8,150,033 B2.Matoba, O., Javidi, B.1999. Encrypted optical memory systemusing three-dimensional keys in the Fresnel domain. Opt.Lett.24:762-764.Nomura, T., Javidi B.2000.Optical encryption using a jointtransform correlator architecture.Opt. Eng.39:2031-2035.Nomura, T., Pérez-Cabré, E., Millán, M.S., Javidi, B.2009.Optical Techniques for Information Security. Proc. IEEE97:1128-1148.Pile, D.2010.Optical encryption: The ghost holds a secret.NaturePhotonics4:587.Refregier, P., Javidi, B.1995. Optical image encryption based oninput plane and Fourier plane random encoding. Opt. Lett.20:767-769.Shannon, C.1949. Communication Theory of Secrecy Systems.Bell Systems Technical Journal28:656-715.Situ, G., Zhang, J.2004. Double random-phase encoding in theFresnel domain. Opt. Lett.29:1584-1586.Situ, G., Zhang, J.2005. Multiple-image encryption by wavelengthmultiplexing. Opt. Lett.30:1306-1308.Unnikrishnan, G., Joseph, J., Singh K.1998. Optical encryptionsystem that uses phase conjugation in a photorefractivecrystal.Appl. Opt.31:8181-8186.Unnikrishnan, G.; Joseph, J.; Singh, K.2000. Optical encryptionby double-random phase encoding in the fractional Fourierdomain. Opt. Lett.25:887-889.Wang, X., Zhao, D.2012.Double images encryption methodwith resistance against the specific attack based on anasymmetric algorithm.Opt. Express20:11994-12003.
https://doi.org/10.18257/raccefyn.263
PDF (Español (España))

References

Alfalou, A., Brosseau, C. 2009. Optical image compression and Optical image compression and encryption methods. Adv. Opt. Photon 1: 589-636.

Barrera, J.F., Henao, R., Tebaldi, M., Torroba, R., Bolognini, N. 2006a. Multiplexing encryption-decryption via lateral shifting of a random phase mask. Opt. Commun. 259: 532-536.

Barrera, J.F., Henao, R., Tebaldi, M., Torroba, R., Bolognini, N. 2006b. Multiplexing encrypted data by using polarized light. Opt. Commun. 260: 109-112.

Barrera, J.F., Henao, R., Tebaldi, M., Torroba, R., Bolognini, N. 2006c. Multiple image encryption using an aperture-modulated optical system. Opt. Commun. 261: 29-33.

Barrera, J.F., Tebaldi, M., Torroba, R., Bolognini, N. 2009. Multiplexing encryption technique by combining random amplitude and phase masks. Optik 120: 351-355.

Barrera, J.F., Rueda, E., Ríos, C., Tebaldi, M., Bolognini, N., Torroba, R. 2011. Experimental opto-digital synthesis of encrypted sub-samples of an image to improve its decoded quality.Opt. Commun. 284: 4350-4355.

Barrera, J.F., Torroba, R. 2010. One step multiplexing optical encryption. Opt. Commun. 283: 1268-1272.

Barrera, J.F., Vargas, C., Tebaldi, M., Torroba, R., Bolognini, N. 2010.Known-plaintext attack on a joint transform correlator encrypting system. Opt. Lett. 35: 3553-3555.

Bellare, M., Desai, A., Pointcheval, D., Rogaway, P. 1998. Rela-tions Among Notions Security for Public-Key Encryption Schemes.Lecture Notes in Computer 1492: 26-46.

Carnicer, A., Montes-Usategui, M., Arcos, S., Juvells, I. 2005. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys.Opt. Lett. 30: 1644-1646.

Camp-Winget, N., Housley, R., Wagner, D., Walker, J. 2003.Security flaws data links protocols.Communications of the ACM 46: 35-39.Graydon, O. 2013. Cryptography: Quick response codes, Nature Photonics 7: 343.

Javidi, B., Zhang, G., Li, J. 1996. Experimental demonstration of

the random phase encoding technique for image encryption and security verification. Opt. Eng. 35: 2506-2512.

Javidi, B., Esmail, A., Zhang, G. (Abril 3, 2012). Optical security system using Fourier plane encoding. U.S. patent 8,150,033 B2.

Matoba, O., Javidi, B. 1999. Encrypted optical memory system using three-dimensional keys in the Fresnel domain. Opt. Lett. 24: 762-764.

Nomura, T., Javidi B. 2000.Optical encryption using a joint transform correlator architecture.Opt. Eng. 39: 2031-2035.

Nomura, T., Pérez-Cabré, E., Millán, M.S., Javidi, B. 2009. Optical Techniques for Information Security. Proc. IEEE 97: 1128-1148.

Pile, D. 2010.Optical encryption: The ghost holds a secret.Nature Photonics 4: 587.

Refregier, P., Javidi, B. 1995. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett.20: 767-769.

Shannon, C. 1949. Communication Theory of Secrecy Systems. Bell Systems Technical Journal 28: 656-715.Situ, G., Zhang, J. 2004. Double random-phase encoding in the Fresnel domain. Opt. Lett. 29: 1584-1586.

Situ, G., Zhang, J. 2005. Multiple-image encryption by wavelength multiplexing. Opt. Lett. 30: 1306-1308.

Unnikrishnan, G., Joseph, J., Singh K. 1998. Optical encryption system that uses phase conjugation in a photorefractive crystal.Appl. Opt. 31: 8181-8186.

Unnikrishnan, G.; Joseph, J.; Singh, K. 2000. Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt. Lett. 25: 887-889.

Wang, X., Zhao, D. 2012.Double images encryption method with resistance against the specific attack based on an asymmetric algorithm. Opt. Express 20: 11994-12003.

Declaration of originality and transfer author's rights

The authors declare:

  1. The published data and reference materials have been duly identified with their respective credits and have been included in the bibliographic notes and citations that have been so identified and that should it be required, I have all releases and permissions from any copyrighted material. 
  2. All material presented is free from any copyright and that I accept full legal responsibility for any legal claims relating to copyrighted intellectual property, fully exonerating from responsibility the Revista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturales.
  3. This work is unpublished and will not be sent to any other journal while waiting for the editorial decision of this journal. I declare that there is no conflict of interest in this manuscript.
  4. In case of publication of this article, all author´s rights are transferred to the Revista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturales, and so cannot be reproduced in any form without the express permission of it.
  5. By means of this document, if the article is accepted for publication by the Revista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturales, the Revista assumes the right to edit and publish the articles in national and international indices or data bases for academic and scientific use in paper, electronic, CD-ROM, internet form either of the complete text or any other known form known or to be known and non-commercial, respecting the rights of the authors.

Transfer of author rights

In case the article is approved for publication, the main author in representation of himself and his co-authors or the main author and his co-authors must cede the author rights of the corresponding article to the Revista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturales, except in the following cases:

The authors and co-authors will retain the right to revise, adapt, prepare derived works, oral presentations, and distribution to some colleagues of reprints of their own published work, if the corresponding credit is given to the Revista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturales. It is also permissible to publish the title of the work, summary, tables, and figures of the work in the corresponding web sites of the authors or their employers, also giving credit to the Revista.

If the work has been realized under contract, the author’s employer has the right to revise, adapt, prepare derivative works, reproduce, or distribute in hard copy the published work, in a secure manner and for the exclusive use of his employees.

If the Revista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturales were approached for permission by a third party for using, printing, or publishing specifically articles already published, the Revista must obtain the express permission of the author and co-authors of the work or of the employer except for use in classrooms, libraries, or reprinted in a collective work. The Revista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturales reserves the possible use in its front cover of figures submitted with the manuscripts.

No other right, other than the author’s right, can be claimed by the Revista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturales.