Experimental multiplexing of encrypted movies using a JTC architecture

Grupo de Óptica y Fotónica, Instituto de Física, Universidad de Antioquia, A.A. 1226, Medellín, Colombia.
Optics Express (Impact Factor: 3.49). 02/2012; 20(4):3388-93. DOI: 10.1364/OE.20.003388
Source: PubMed


We present the first experimental technique to encrypt a movie under a joint transform correlator architecture. We also extend the method to multiplex several movies in a single package. We use a Mach-Zehnder interferometer to encrypt experimentally each movie. One arm of the interferometer is the joint transform correlator and the other arm is the reference wave. We include the complete description of the procedure along with experimental results supporting the proposal. (C) 2012 Optical Society of America

Download full-text


Available from: Roberto Torroba, Dec 16, 2013
  • Source
    • "In multiplexing protocols , several processed data is added in order to manage multiple data in an efficient way. These protocols have been applied for adding multiple bi-dimensional encrypted data [5] [6] [8] [11], the angular multiplexing and de-multiplexing of digital holograms recorded in microscope configuration [7], the fast reconstruction of off-axis digital holograms based on digital spatial multiplexing Contents lists available at ScienceDirect journal homepage: www.elsevier.com/locate/optlastec "
    [Show abstract] [Hide abstract]
    ABSTRACT: We present a new experimental approach for reconstructing in one step 3D scenes otherwise not feasible in a single snapshot from standard off-axis digital hologram architecture, due to a lack of illuminating resources or a limited setup size. Consequently, whenever a scene could not be wholly illuminated or the size of the scene surpasses the available setup disposition, this protocol can be implemented to solve these issues. We need neither to alter the original setup in every step nor to cover the whole scene by the illuminating source, thus saving resources. With this technique we multiplex the processed holograms of actual diffuse objects composing a scene using a two-beam off-axis holographic setup in a Fresnel approach. By registering individually the holograms of several objects and applying a spatial filtering technique, the filtered Fresnel holograms can then be added to produce a compound hologram. The simultaneous reconstruction of all objects is performed in one step using the same recovering procedure employed for single holograms. Using this technique, we were able to reconstruct, for the first time to our knowledge, a scene by multiplexing off-axis holograms of the 3D objects without cross talk. This technique is important for quantitative visualization of optically packaged multiple images and is useful for a wide range of applications. We present experimental results to support the method.
    Optics & Laser Technology 11/2015; 75. DOI:10.1016/j.optlastec.2015.06.028 · 1.65 Impact Factor
    • "The double random phase encryption methods based on other transforms, have also been proposed after that [2] [3] [4] [5] [6]. Other methods, such as phase only encryption [7], JTC system [8] and phase shift interferometry [9] are also used in optical image encryption. In 2006, we used the color information in image encryption and processing by wavelength multiplexing and tricolor theory [10]. "
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, a new method for optical image encryption based on multi-beams interference principle and vector composition is proposed. In this encryption, the original image is encoded into n−1 phase only masks which are regarded as the keys of the encryption system and a ciphertext according to multi-beams interference principle and vector composition. In decryption process, n beams of parallel incident light illuminate at the phase only masks and the ciphertext, and we can obtain the decrypted image at output plane after Fourier transforms. The security of the proposed method is discussed, finding that no decrypted image can be obtained only when all the keys used are right. Furthermore, the keys can be stored separately resulting in improving the security of encryption system. Computer simulation results are presented to verify the validity of the proposed method.
    Optics & Laser Technology 06/2015; 69. DOI:10.1016/j.optlastec.2014.12.007 · 1.65 Impact Factor
  • Source
    • "They also proved that the modification in the diffuser of JTC allows optical multiplexing by means of diffuser lateral shift [8]. Barrera et al. [9] demonstrated a technique to encrypt a movie employing JTC architecture. Rajput and Nishchal [10] used additional encryption keys to increase the security level of non-conventional JTC. "
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, a novel optical cryptosystem is proposed that uses amplitude- and phase-truncation approach in joint transform correlator (JTC) architecture. Due to amplitude- and phase- truncation, the encryption scheme becomes asymmetric and cryptanalysis of the scheme reveals that it is resistant to hybrid attack. This hybrid attack is the combination of specific attack on asymmetric cryptosystem and chosen-plaintext attack on JTC. We also carry out authentication verification using this correlation geometry. The scheme can be implemented digitally or optically employing a conventional JTC. Computer simulation results validate the proposed method.
    Optics and Lasers in Engineering 01/2014; 52(1):167-173. DOI:10.1016/j.optlaseng.2013.06.015 · 2.24 Impact Factor
Show more