42 research outputs found

    Multiplexing encrypted data by using polarized light

    Get PDF
    We investigate the feasibility of multiplexing, employing polarized light, a set of security encrypted data. The encryption approach is based on the double random pure-phase enciphering method. Phase conjugation operation is conducted in the reconstruction stage with the aid of a photorefractive crystal which stores the encrypted information. When storing each encrypted image, a polarization change is introduced in the system. This induces decorrelation on the speckle patterns inside the storing medium. We apply this approach for multiple image encryption. We show experimental results that confirm our approach

    Multi-user multiplexed scheme for decoding modulated-encoded sequential information

    Get PDF
    ABSTRACT: Encrypting procedures with multiplexed operations exhibit an inherent noise. We presented options to avoid background noise arising from the non-decoded images. We have a coding mask corresponding to each single input object, thus resulting in a static decrypting mechanism. Besides, if we manage the spatial destination of each decoded output, then we avoid the noise superposition. In those schemes, the displaying output order was irrelevant. However, when we face a sequence of events including multi-users, we need to develop another strategy. We present a multi-user encrypting scheme with a single encoding mask that removes the background noise, also showing the decrypted data in a prescribed sequence. The multiplexing scheme is based on the 4f double random phase encryption architecture and a theta modulation method, which consists in superposing each encrypted information with a determined sinusoidal grating. Afterwards we proceed to the completely encoded data multiplexing. In a multi-user scheme, we employ different encrypting masks in the 4f optical setup for each user, and the same mask is employed for the user sequence. We store the encrypted data in the single medium. After a Fourier transform operation and an appropriate filtering procedure, we reach the sequence of isolated encrypted spots corresponding to the right user. With the aid of the pertaining decoding mask, the user can decrypt the sequence. We avoid the noise by the appropriate choice of the modulating gratings pitch as to elude the overlapping of spots at the Fourier plane, which is the cause of information degradation

    Consequences of representativeness bias on SHM-based decision-making

    Get PDF
    Judging the state of a bridge based on SHM observations is an inference process, which should be rationally carried out using a logical approach. However, it is often observed that real-life decision makers depart from this ideal model of rationality, judge and decide using common sense, and privilege fast and frugal heuristics to rational analytic thinking. For instance, confusion between condition state and safety of a bridge is one of the most frequently observed examples in bridge management. The aim of this paper is to describe mathematically this observed biased judgement, a condition that is broadly described by Kahneman and Tversky’s representativeness heuristic. Particularly, the paper examines how this heuristic affects the interpretation of data, providing a deeper understanding of the differences between a method affected by cognitive biases and the classical rational approach. Based on the literature review, three different models reproducing an individual behaviour distorted by representativeness are identified. These models are applied to the case of a transportation manager who wrongly judges a particular bridge unsafe simply because deteriorated, regardless its actual residual load-carrying capacity. It is demonstrated that the application of any of the three heuristic judgment models correctly predicts that the manager will mistakenly judge the bridge as unsafe based on the observed condition state. It is not objective of the paper to suggest that representativeness should be used instead of rational logic, however, understanding how real-life managers actually behave is of paramount importance when setting a general policy for bridge maintenance

    Multiplexing of encrypted data using fractal masks

    Full text link
    This paper was published in OPTICS LETTERS and is made available as an electronic reprint with the permission of OSA. The paper can be found at the following URL on the OSA website: http://dx.doi.org/10.1364/OL.37.002895. Systematic or multiple reproduction or distribution to multiple locations via electronic or other means is prohibited and is subject to penalties under lawIn this Letter, we present to the best of our knowledge a new all-optical technique for multiple-image encryption and multiplexing, based on fractal encrypting masks. The optical architecture is a joint transform correlator. The multiplexed encrypted data are stored in a photorefractive crystal. The fractal parameters of the key can be easily tuned to lead to a multiplexing operation without cross talk effects. Experimental results that support the potential of the method are presented.This research was performed under grants TWAS-UNESCO Associateship Scheme at Centres of Excellence in the South, CONICET No. 0863 (Argentina), ANCYT PICT 1167 (Argentina), and Facultad de Ingenieria, Universidad Nacional de La Plata No. 11/I125 (Argentina), Sostenibilidad 2011-2012, and CODI (Universidad de Antioquia-Colombia). W. D. Furlan and J. A. Monsoriua acknowledge financial support from Ministerio de Economia y Competitividad (grant FIS2011-23175), Generalitat Valenciana (grant PROMETEO2009-077), and Universitat Politecnica de Valencia (grants PAID-05-11 and PAID-02-11), Spain.Barrera, J.; Tebaldi, M.; Amaya, D.; Furlan, W.; Monsoriu Serra, JA.; Bolognini, NA.; Torroba, RD.... (2012). Multiplexing of encrypted data using fractal masks. Optics Letters. 37(14):2895-2897. doi:10.1364/OL.37.002895S289528973714Refregier, P., & Javidi, B. (1995). Optical image encryption based on input plane and Fourier plane random encoding. Optics Letters, 20(7), 767. doi:10.1364/ol.20.000767Matoba, O., & Javidi, B. (1999). Encrypted optical memory system using three-dimensional keys in the Fresnel domain. Optics Letters, 24(11), 762. doi:10.1364/ol.24.000762Unnikrishnan, G., Joseph, J., & Singh, K. (2000). Optical encryption by double-random phase encoding in the fractional Fourier domain. Optics Letters, 25(12), 887. doi:10.1364/ol.25.000887Nomura, T. (2000). Polarization encoding for optical security systems. Optical Engineering, 39(9), 2439. doi:10.1117/1.1288369Tebaldi, M., Furlan, W. D., Torroba, R., & Bolognini, N. (2009). Optical-data storage-readout technique based on fractal encrypting masks. Optics Letters, 34(3), 316. doi:10.1364/ol.34.000316Situ, G., & Zhang, J. (2005). Multiple-image encryption by wavelength multiplexing. Optics Letters, 30(11), 1306. doi:10.1364/ol.30.001306Liu, Z., & Liu, S. (2007). Double image encryption based on iterative fractional Fourier transform. Optics Communications, 275(2), 324-329. doi:10.1016/j.optcom.2007.03.039Hwang, H.-E., Chang, H. T., & Lie, W.-N. (2009). Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain. Optics Letters, 34(24), 3917. doi:10.1364/ol.34.003917Matoba, O., & Javidi, B. (1999). Encrypted optical storage with angular multiplexing. Applied Optics, 38(35), 7288. doi:10.1364/ao.38.007288Fredy Barrera, J., Henao, R., Tebaldi, M., Torroba, R., & Bolognini, N. (2006). Multiplexing encryption–decryption via lateral shifting of a random phase mask. Optics Communications, 259(2), 532-536. doi:10.1016/j.optcom.2005.09.027Henao, R., Rueda, E., Barrera, J. F., & Torroba, R. (2010). Noise-free recovery of optodigital encrypted and multiplexed images. Optics Letters, 35(3), 333. doi:10.1364/ol.35.000333Barrera, J. F., Henao, R., Tebaldi, M., Torroba, R., & Bolognini, N. (2006). Multiple image encryption using an aperture-modulated optical system. Optics Communications, 261(1), 29-33. doi:10.1016/j.optcom.2005.11.055Mosso, F., Barrera, J. F., Tebaldi, M., Bolognini, N., & Torroba, R. (2011). All-optical encrypted movie. Optics Express, 19(6), 5706. doi:10.1364/oe.19.005706Monsoriu, J. A., Saavedra, G., & Furlan, W. D. (2004). Fractal zone plates with variable lacunarity. Optics Express, 12(18), 4227. doi:10.1364/opex.12.00422

    Multiplexing encrypted data by using polarized light

    Get PDF
    We investigate the feasibility of multiplexing, employing polarized light, a set of security encrypted data. The encryption approach is based on the double random pure-phase enciphering method. Phase conjugation operation is conducted in the reconstruction stage with the aid of a photorefractive crystal which stores the encrypted information. When storing each encrypted image, a polarization change is introduced in the system. This induces decorrelation on the speckle patterns inside the storing medium. We apply this approach for multiple image encryption. We show experimental results that confirm our approach.Facultad de Ingeniería (FI

    Subsampling technique to enhance the decoded output of JTC encrypting system

    Get PDF
    ABSTRACT: Optical systems have physical restrictions that impose limits in the finest spatial feature that can be processed. In this work we combine a subsampling procedure with a multiplexing technique to overtake the limit on the information that is processed in a JTC encryption system. In the process the object is divided in subsamples and each subsample is encrypted separately. Then the encrypted subsamples are multiplexed. The encryption of the subsamples is performed in a real optical JTC encrypting system. The multiplexing and the decryption process are carried out by means of a virtual optical system. Experimental results are presented to show the validity of the proposal

    Estudio de las limitaciones de los dispositivos de encriptación óptica múltiple

    Get PDF
    En los últimos años ha aumentado notablemente el número de transacciones financieras realizadas por internet y conjuntamente se han incrementado los problemas de seguridad. En este contexto, se han propuesto e implementado sistemas ópticos para el cifrado de datos, los cuales han demostrado que el procesamiento óptico permite una manipulación segura de la información. Entre ellos, los dispositivos más usados y desarrollados se basan en el empleo de máscaras aleatorias de fase para transformar los datos en una distribución de ruido blanco (imagen encriptada). El proceso de desencriptación se realiza con la máscara de fase correcta (llave de seguridad), sin la cual se hace imposible recuperar el dato original. En la actualidad se buscan nuevas estrategias para aumentar la cantidad de datos codificados a ser almacenados. Los resultados obtenidos en arreglos de encriptación múltiple permitieron verificar que a medida que se incrementa el número de datos, en esa misma medida se degradan los datos recuperados en la etapa de decodificación. Este deterioro se debe al solapamiento y al ruido generado por los datos no desencriptados. Este hecho representa una gran limitación para la aplicación práctica de los sistemas ópticos de seguridad cuando se involucran múltiples datos. En ese sentido, se esboza una solución que permite eliminar el deterioro a través del reposicionado de la información asociada a cada uno de los datos de entrada.Facultad de Ingenierí

    Formulation development and characterization of cellulose acetate nitrate based propellants for improved insensitive munitions properties

    Get PDF
    AbstractCellulose acetate nitrate (CAN) was used as an insensitive energetic binder to improve the insensitive munitions (IM) properties of gun propellants to replace the M1 propellant used in 105 mm artillery charges. CAN contains the energetic nitro groups found in nitrocellulose (NC), but also acetyl functionalities, which lowered the polymer's sensitivity to heat and shock, and therefore improved its IM properties relative to NC. The formulation, development and small-scale characterization testing of several CAN-based propellants were done. The formulations, using insensitive energetic solid fillers and high-nitrogen modifiers in place of nitramine were completed. The small scale characterization testing, such as closed bomb testing, small scale sensitivity, thermal stability, and chemical compatibility were done. The mechanical response of the propellants under high-rate uni-axial compression at, hot, cold, and ambient temperatures were also completed. Critical diameter testing, hot fragment conductive ignition (HFCI) tests were done to evaluate the propellants' responses to thermal and shock stimuli. Utilizing the propellant chemical composition, theoretical predictions of erosivity were completed. All the small scale test results were utilized to down-select the promising CAN based formulations for large scale demonstration testing such as the ballistic performance and fragment impact testing in the 105 mm M67 artillery charge configurations. The test results completed in the small and large scale testing are discussed

    Pure optical dynamical color encryption

    Get PDF
    We introduce a way to encrypt-decrypt a color dynamical phenomenon using a pure optical alternative. We split the three basic chromatic channels composing the input, and then each channel is processed through a 4f encoding method and a theta modulation applied to the each encrypted frame in every channel. All frames for a single channel are multiplexed. The same phase mask is used to encode all the information. Unlike the usual procedure we do not multiplex the three chromatic channels into a single encoding media, because we want to decrypt the information in real time. Then, we send to the decoding station the phase mask and the three packages each one containing the multiplexing of a single channel. The end user synchronizes and decodes the information contained in the separate channels. Finally, the decoding information is conveyed together to bring the decoded dynamical color phenomenon in real-time. We present material that supports our concepts.Centro de Investigaciones Óptica

    All-optical encrypted movie

    Get PDF
    We introduce for the first time the concept of an all-optical encrypted movie. This movie joints several encrypted frames corresponding to a time evolving situation employing the same encoding mask. Thanks to a multiplexing operation we compact the encrypted movie information into a single package. But the decryption of this single package implies the existence of cross-talk if we do not adequately pre-process the encoded information before multiplexing. In this regard, we introduce a grating modulation to each encoded image, and then we proceed to multiplexing. After appropriate filtering and synchronizing procedures applied to the multiplexing, we are able to decrypt and to reproduce the movie. This movie is only properly decoded when in possession of the right decoding key. The concept development is carried-out in virtual optical systems, both for the encrypting and the filtering-decrypting stages. Experimental results are shown to confirm our approach.Centro de Investigaciones Óptica
    corecore