Experimental multiplexing of encrypted movies using a JTC architecture

Grupo de Óptica y Fotónica, Instituto de Física, Universidad de Antioquia, A.A. 1226, Medellín, Colombia.
Optics Express (Impact Factor: 3.49). 02/2012; 20(4):3388-93. DOI: 10.1364/OE.20.003388
Source: PubMed


We present the first experimental technique to encrypt a movie under a joint transform correlator architecture. We also extend the method to multiplex several movies in a single package. We use a Mach-Zehnder interferometer to encrypt experimentally each movie. One arm of the interferometer is the joint transform correlator and the other arm is the reference wave. We include the complete description of the procedure along with experimental results supporting the proposal. (C) 2012 Optical Society of America

Download full-text


Available from: Roberto Torroba, Dec 16, 2013
33 Reads
  • Source
    • "In multiplexing protocols , several processed data is added in order to manage multiple data in an efficient way. These protocols have been applied for adding multiple bi-dimensional encrypted data [5] [6] [8] [11], the angular multiplexing and de-multiplexing of digital holograms recorded in microscope configuration [7], the fast reconstruction of off-axis digital holograms based on digital spatial multiplexing Contents lists available at ScienceDirect journal homepage: "
    [Show abstract] [Hide abstract]
    ABSTRACT: We present a new experimental approach for reconstructing in one step 3D scenes otherwise not feasible in a single snapshot from standard off-axis digital hologram architecture, due to a lack of illuminating resources or a limited setup size. Consequently, whenever a scene could not be wholly illuminated or the size of the scene surpasses the available setup disposition, this protocol can be implemented to solve these issues. We need neither to alter the original setup in every step nor to cover the whole scene by the illuminating source, thus saving resources. With this technique we multiplex the processed holograms of actual diffuse objects composing a scene using a two-beam off-axis holographic setup in a Fresnel approach. By registering individually the holograms of several objects and applying a spatial filtering technique, the filtered Fresnel holograms can then be added to produce a compound hologram. The simultaneous reconstruction of all objects is performed in one step using the same recovering procedure employed for single holograms. Using this technique, we were able to reconstruct, for the first time to our knowledge, a scene by multiplexing off-axis holograms of the 3D objects without cross talk. This technique is important for quantitative visualization of optically packaged multiple images and is useful for a wide range of applications. We present experimental results to support the method.
    Optics & Laser Technology 11/2015; 75. DOI:10.1016/j.optlastec.2015.06.028 · 1.65 Impact Factor
  • Source
    • "They also proved that the modification in the diffuser of JTC allows optical multiplexing by means of diffuser lateral shift [8]. Barrera et al. [9] demonstrated a technique to encrypt a movie employing JTC architecture. Rajput and Nishchal [10] used additional encryption keys to increase the security level of non-conventional JTC. "
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, a novel optical cryptosystem is proposed that uses amplitude- and phase-truncation approach in joint transform correlator (JTC) architecture. Due to amplitude- and phase- truncation, the encryption scheme becomes asymmetric and cryptanalysis of the scheme reveals that it is resistant to hybrid attack. This hybrid attack is the combination of specific attack on asymmetric cryptosystem and chosen-plaintext attack on JTC. We also carry out authentication verification using this correlation geometry. The scheme can be implemented digitally or optically employing a conventional JTC. Computer simulation results validate the proposed method.
    Optics and Lasers in Engineering 01/2014; 52(1):167-173. DOI:10.1016/j.optlaseng.2013.06.015 · 2.24 Impact Factor
  • Source
    • "Entre ellos, los sistemasópticos más usados y desarrollados son los que usan dos máscaras aleatorias de fase para cifrar información [3]. En las contribuciones presentadas en losúltimos diez años, y en especial losúltimos cinco, se ha mostrado la confiabilidad [4], versatilidad [5] [7] y aplicabilidad de los sistemasópticos de encriptación de doble máscara de fase [8]; asimismo se ha evaluado [9] y mejorado la seguridad de algunas técnicas [10]. Con esta motivación, varias compañías están construyendo prototipos de dispositivos que permiten mejorar algunos de los procedimientos utilizados en la encriptaciónóptica de información. "
    06/2013; 6:55. DOI:10.4995/msel.2013.1980
Show more