46 research outputs found
Multiplexing encrypted data by using polarized light
We investigate the feasibility of multiplexing, employing polarized light, a set of security encrypted data. The encryption approach is based on the double random pure-phase enciphering method. Phase conjugation operation is conducted in the reconstruction stage with the aid of a photorefractive crystal which stores the encrypted information. When storing each encrypted image, a polarization change is introduced in the system. This induces decorrelation on the speckle patterns inside the storing medium. We apply this approach for multiple image encryption. We show experimental results that confirm our approach
Multi-user multiplexed scheme for decoding modulated-encoded sequential information
ABSTRACT: Encrypting procedures with multiplexed operations exhibit an inherent noise. We presented options to avoid background noise arising from the non-decoded images. We have a coding mask corresponding to each single input object, thus resulting in a static decrypting mechanism. Besides, if we manage the spatial destination of each decoded output, then we avoid the noise superposition. In those schemes, the displaying output order was irrelevant. However, when we face a sequence of events including multi-users, we need to develop another strategy. We present a multi-user encrypting scheme with a single encoding mask that removes the background noise, also showing the decrypted data in a prescribed sequence. The multiplexing scheme is based on the 4f double random phase encryption architecture and a theta modulation method, which consists in superposing each encrypted information with a determined sinusoidal grating. Afterwards we proceed to the completely encoded data multiplexing. In a multi-user scheme, we employ different encrypting masks in the 4f optical setup for each user, and the same mask is employed for the user sequence. We store the encrypted data in the single medium. After a Fourier transform operation and an appropriate filtering procedure, we reach the sequence of isolated encrypted spots corresponding to the right user. With the aid of the pertaining decoding mask, the user can decrypt the sequence. We avoid the noise by the appropriate choice of the modulating gratings pitch as to elude the overlapping of spots at the Fourier plane, which is the cause of information degradation
Consequences of representativeness bias on SHM-based decision-making
Judging the state of a bridge based on SHM observations is an inference process, which should be rationally carried out using a logical approach. However, it is often observed that real-life decision makers depart from this ideal model of rationality, judge and decide using common sense, and privilege fast and frugal heuristics to rational analytic thinking. For instance, confusion between condition state and safety of a bridge is one of the most frequently observed examples in bridge management. The aim of this paper is to describe mathematically this observed biased judgement, a condition that is broadly described by Kahneman and Tversky’s representativeness heuristic. Particularly, the paper examines how this heuristic affects the interpretation of data, providing a deeper understanding of the differences between a method affected by cognitive biases and the classical rational approach. Based on the literature review, three different models reproducing an individual behaviour distorted by representativeness are identified. These models are applied to the case of a transportation manager who wrongly judges a particular bridge unsafe simply because deteriorated, regardless its actual residual load-carrying capacity. It is demonstrated that the application of any of the three heuristic judgment models correctly predicts that the manager will mistakenly judge the bridge as unsafe based on the observed condition state. It is not objective of the paper to suggest that representativeness should be used instead of rational logic, however, understanding how real-life managers actually behave is of paramount importance when setting a general policy for bridge maintenance
Multiplexing of encrypted data using fractal masks
This paper was published in OPTICS LETTERS and is made available as an electronic reprint with the permission of OSA. The paper can be found at the following URL on the OSA website: http://dx.doi.org/10.1364/OL.37.002895. Systematic or multiple reproduction or distribution to multiple locations via electronic or other means is prohibited and is subject to penalties under lawIn this Letter, we present to the best of our knowledge a new all-optical technique for multiple-image encryption and multiplexing, based on fractal encrypting masks. The optical architecture is a joint transform correlator. The multiplexed encrypted data are stored in a photorefractive crystal. The fractal parameters of the key can be easily tuned to lead to a multiplexing operation without cross talk effects. Experimental results that support the potential of the method are presented.This research was performed under grants TWAS-UNESCO Associateship Scheme at Centres of Excellence in the South, CONICET No. 0863 (Argentina), ANCYT PICT 1167 (Argentina), and Facultad de Ingenieria, Universidad Nacional de La Plata No. 11/I125 (Argentina), Sostenibilidad 2011-2012, and CODI (Universidad de Antioquia-Colombia). W. D. Furlan and J. A. Monsoriua acknowledge financial support from Ministerio de Economia y Competitividad (grant FIS2011-23175), Generalitat Valenciana (grant PROMETEO2009-077), and Universitat Politecnica de Valencia (grants PAID-05-11 and PAID-02-11), Spain.Barrera, J.; Tebaldi, M.; Amaya, D.; Furlan, W.; Monsoriu Serra, JA.; Bolognini, NA.; Torroba, RD.... (2012). Multiplexing of encrypted data using fractal masks. Optics Letters. 37(14):2895-2897. doi:10.1364/OL.37.002895S289528973714Refregier, P., & Javidi, B. (1995). Optical image encryption based on input plane and Fourier plane random encoding. Optics Letters, 20(7), 767. doi:10.1364/ol.20.000767Matoba, O., & Javidi, B. (1999). Encrypted optical memory system using three-dimensional keys in the Fresnel domain. Optics Letters, 24(11), 762. doi:10.1364/ol.24.000762Unnikrishnan, G., Joseph, J., & Singh, K. (2000). Optical encryption by double-random phase encoding in the fractional Fourier domain. Optics Letters, 25(12), 887. doi:10.1364/ol.25.000887Nomura, T. (2000). Polarization encoding for optical security systems. Optical Engineering, 39(9), 2439. doi:10.1117/1.1288369Tebaldi, M., Furlan, W. D., Torroba, R., & Bolognini, N. (2009). Optical-data storage-readout technique based on fractal encrypting masks. Optics Letters, 34(3), 316. doi:10.1364/ol.34.000316Situ, G., & Zhang, J. (2005). Multiple-image encryption by wavelength multiplexing. Optics Letters, 30(11), 1306. doi:10.1364/ol.30.001306Liu, Z., & Liu, S. (2007). Double image encryption based on iterative fractional Fourier transform. Optics Communications, 275(2), 324-329. doi:10.1016/j.optcom.2007.03.039Hwang, H.-E., Chang, H. T., & Lie, W.-N. (2009). Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain. Optics Letters, 34(24), 3917. doi:10.1364/ol.34.003917Matoba, O., & Javidi, B. (1999). Encrypted optical storage with angular multiplexing. Applied Optics, 38(35), 7288. doi:10.1364/ao.38.007288Fredy Barrera, J., Henao, R., Tebaldi, M., Torroba, R., & Bolognini, N. (2006). Multiplexing encryption–decryption via lateral shifting of a random phase mask. Optics Communications, 259(2), 532-536. doi:10.1016/j.optcom.2005.09.027Henao, R., Rueda, E., Barrera, J. F., & Torroba, R. (2010). Noise-free recovery of optodigital encrypted and multiplexed images. Optics Letters, 35(3), 333. doi:10.1364/ol.35.000333Barrera, J. F., Henao, R., Tebaldi, M., Torroba, R., & Bolognini, N. (2006). Multiple image encryption using an aperture-modulated optical system. Optics Communications, 261(1), 29-33. doi:10.1016/j.optcom.2005.11.055Mosso, F., Barrera, J. F., Tebaldi, M., Bolognini, N., & Torroba, R. (2011). All-optical encrypted movie. Optics Express, 19(6), 5706. doi:10.1364/oe.19.005706Monsoriu, J. A., Saavedra, G., & Furlan, W. D. (2004). Fractal zone plates with variable lacunarity. Optics Express, 12(18), 4227. doi:10.1364/opex.12.00422
Experimental multiplexing of encrypted movies using a JTC architecture
We present the first experimental technique to encrypt a movie under a joint transform correlator architecture. We also extend the method to multiplex several movies in a single package. We use a Mach-Zehnder interferometer to encrypt experimentally each movie. One arm of the interferometer is the joint transform correlator and the other arm is the reference wave. We include the complete description of the procedure along with experimental results supporting the proposal.Centro de Investigaciones ÓpticasUnidad de Investigación y Desarrollo Optim
Optical smart packaging to reduce transmitted information
We demonstrate a smart image-packaging optical technique that uses what we believe is a new concept to save byte space when transmitting data. The technique supports a large set of images mapped into modulated speckle patterns. Then, they are multiplexed into a single package. This operation results in a substantial decreasing of the final amount of bytes of the package with respect to the amount resulting from the addition of the images without using the method. Besides, there are no requirements on the type of images to be processed. We present results that proof the potentiality of the technique.Centro de Investigaciones Óptica
All-optical encrypted movie
We introduce for the first time the concept of an all-optical encrypted movie. This movie joints several encrypted frames corresponding to a time evolving situation employing the same encoding mask. Thanks to a multiplexing operation we compact the encrypted movie information into a single package. But the decryption of this single package implies the existence of cross-talk if we do not adequately pre-process the encoded information before multiplexing. In this regard, we introduce a grating modulation to each encoded image, and then we proceed to multiplexing. After appropriate filtering and synchronizing procedures applied to the multiplexing, we are able to decrypt and to reproduce the movie. This movie is only properly decoded when in possession of the right decoding key. The concept development is carried-out in virtual optical systems, both for the encrypting and the filtering-decrypting stages. Experimental results are shown to confirm our approach.Centro de Investigaciones Óptica
Pure optical dynamical color encryption
We introduce a way to encrypt-decrypt a color dynamical phenomenon using a pure optical alternative. We split the three basic chromatic channels composing the input, and then each channel is processed through a 4f encoding method and a theta modulation applied to the each encrypted frame in every channel. All frames for a single channel are multiplexed. The same phase mask is used to encode all the information. Unlike the usual procedure we do not multiplex the three chromatic channels into a single encoding media, because we want to decrypt the information in real time. Then, we send to the decoding station the phase mask and the three packages each one containing the multiplexing of a single channel. The end user synchronizes and decodes the information contained in the separate channels. Finally, the decoding information is conveyed together to bring the decoded dynamical color phenomenon in real-time. We present material that supports our concepts.Centro de Investigaciones Óptica
Multiplexing encrypted data by using polarized light
We investigate the feasibility of multiplexing, employing polarized light, a set of security encrypted data. The encryption approach is based on the double random pure-phase enciphering method. Phase conjugation operation is conducted in the reconstruction stage with the aid of a photorefractive crystal which stores the encrypted information. When storing each encrypted image, a polarization change is introduced in the system. This induces decorrelation on the speckle patterns inside the storing medium. We apply this approach for multiple image encryption. We show experimental results that confirm our approach.Facultad de IngenierÃa (FI
Subsampling technique to enhance the decoded output of JTC encrypting system
ABSTRACT: Optical systems have physical restrictions that impose limits in the finest spatial feature that can be processed. In this work we combine a subsampling procedure with a multiplexing technique to overtake the limit on the information that is processed in a JTC encryption system. In the process the object is divided in subsamples and each subsample is encrypted separately. Then the encrypted subsamples are multiplexed. The encryption of the subsamples is performed in a real optical JTC encrypting system. The multiplexing and the decryption process are carried out by means of a virtual optical system. Experimental results are presented to show the validity of the proposal