This page has only limited features, please log in for full access.
We present a new experimental system for optical encryption using a nonlinear joint transform correlator (JTC) to implement the optical security technique of the double random phase encoding (DRPE). The DRPE, which is usually performed in a 4f-processor, encodes an image into a noisy distribution (encrypted image) by using two random phase masks (RPMs). In our experimental setup, the input plane of the JTC is fully encoded in phase and this plane contains two non-overlapping data functions (images). In the encryption step, the phase-encoded image to be encrypted and the two RPMs are placed in the input plane of the JTC with the purpose of obtaining the needed intensity distributions at the output plane to compute the encrypted image. The optical and numerical transformations are performed in the Fourier domain. A nonlinear operation is introduced to modify the joint power spectrum (JPS) of the JTC in order to reproduce exactly the same results of the DRPE. The experimental optical encryption scheme based on a three-step JTC is implemented by using an optoelectronic setup. The input plane of the JTC is optically implemented by means of a phase-only spatial light modulator (SLM). The decryption process is performed using a virtual optical system. Experimental and numerical results of the optical encryption and simulated decryption systems are presented, in order to show the feasibility of the proposed security system.
Juan M. Vilardy; María S. Millán; Elisabet Pérez-Cabré. Experimental optical encryption scheme for the double random phase encoding using a nonlinear joint transform correlator. Optik 2020, 217, 164653 .
AMA StyleJuan M. Vilardy, María S. Millán, Elisabet Pérez-Cabré. Experimental optical encryption scheme for the double random phase encoding using a nonlinear joint transform correlator. Optik. 2020; 217 ():164653.
Chicago/Turabian StyleJuan M. Vilardy; María S. Millán; Elisabet Pérez-Cabré. 2020. "Experimental optical encryption scheme for the double random phase encoding using a nonlinear joint transform correlator." Optik 217, no. : 164653.
We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system. In order to perform the decryption and authentication in a proper way, it is necessary to have the two digital fingerprints from the respective users whose simultaneous authentication is pursued. The proposed security system is developed in the Fourier domain. The nonlinearity of the JTC along with the five security keys given by the three random phase masks and the two digital fingerprints of the two users allow an increase of the system security against brute force and plaintext attacks. The feasibility and validity of this proposal is demonstrated using digital fingerprints as biometrics in numerical experiments.
Juan M. Vilardy O.; María S. Millán; Elisabet Pérez-Cabré. Image Encryption System Based on a Nonlinear Joint Transform Correlator for the Simultaneous Authentication of Two Users. Photonics 2019, 6, 128 .
AMA StyleJuan M. Vilardy O., María S. Millán, Elisabet Pérez-Cabré. Image Encryption System Based on a Nonlinear Joint Transform Correlator for the Simultaneous Authentication of Two Users. Photonics. 2019; 6 (4):128.
Chicago/Turabian StyleJuan M. Vilardy O.; María S. Millán; Elisabet Pérez-Cabré. 2019. "Image Encryption System Based on a Nonlinear Joint Transform Correlator for the Simultaneous Authentication of Two Users." Photonics 6, no. 4: 128.
A liquid crystal on silicon spatial light modulator (LCoS SLM) with large phase modulation has been thoroughly characterized to operate optimally with several linear phase modulation ranges (π, 2π, 3π, 4π, 6π, and 8π) for an intermediate wavelength of the visible spectrum (λG = 530 nm). For each range, the device response was also measured for two additional wavelengths at the blue and red extremes of the visible spectrum (λB = 476 nm and λR = 647 nm). Multiorder diffractive optical elements, displayed on the LCoS SLM with the appropriate phase modulation range, allowed us to deal with some widely known encoding issues of conventional first-order diffractive lenses such as undersampling and longitudinal chromatic aberration. We designed an achromatic multiorder lens and implemented it experimentally on the SLM. As a result, the residual chromatic aberration reduces to one-third that of the chromatic aberration of a conventional first-order diffractive lens.
Elisabet Pérez-Cabré; María Sagrario Millán. Liquid Crystal Spatial Light Modulator with Optimized Phase Modulation Ranges to Display Multiorder Diffractive Elements. Applied Sciences 2019, 9, 2592 .
AMA StyleElisabet Pérez-Cabré, María Sagrario Millán. Liquid Crystal Spatial Light Modulator with Optimized Phase Modulation Ranges to Display Multiorder Diffractive Elements. Applied Sciences. 2019; 9 (13):2592.
Chicago/Turabian StyleElisabet Pérez-Cabré; María Sagrario Millán. 2019. "Liquid Crystal Spatial Light Modulator with Optimized Phase Modulation Ranges to Display Multiorder Diffractive Elements." Applied Sciences 9, no. 13: 2592.
In this work, the occlusion and noise test on the encrypted image produced by a joint transform correlator-based encryption system in the Fresnel domain (FrD) are computed and presented, in order to check the performance of this security system with respect to the image quality resulting in the decryption process for the retrieved image. The encryption system based on a joint transform correlator (JTC) in the FrD was proposed by us, with the purpose of using a lensless optical setup. We test the performance of this security system when the encrypted image is affected by common sources of degradation such as noise (additive and multiplicative) or partial occlusion. Finally, we evaluate the performance and robustness of the security system in the FrD by using the metric of the root mean square error (RMSE) between the image to encrypt and the decrypted image when the encrypted image is degraded by noise or modified by occlusion.
Juan M. Vilardy; Maria Millan; Elisabet Pérez–Cabré. Occlusion and noise tests on the encrypted image produced by a security system based on a joint transform correlator and the Fresnel transform. Journal of Physics: Conference Series 2019, 1221, 012046 .
AMA StyleJuan M. Vilardy, Maria Millan, Elisabet Pérez–Cabré. Occlusion and noise tests on the encrypted image produced by a security system based on a joint transform correlator and the Fresnel transform. Journal of Physics: Conference Series. 2019; 1221 (1):012046.
Chicago/Turabian StyleJuan M. Vilardy; Maria Millan; Elisabet Pérez–Cabré. 2019. "Occlusion and noise tests on the encrypted image produced by a security system based on a joint transform correlator and the Fresnel transform." Journal of Physics: Conference Series 1221, no. 1: 012046.
Juan M. Vilardy Ortiz; María S. Millán; Elisabet Pérez-Cabré. Nonlinear joint transform correlator architectures for images encryption, decryption and authentication systems. Third International Conference on Applications of Optics and Photonics 2017, 1 .
AMA StyleJuan M. Vilardy Ortiz, María S. Millán, Elisabet Pérez-Cabré. Nonlinear joint transform correlator architectures for images encryption, decryption and authentication systems. Third International Conference on Applications of Optics and Photonics. 2017; ():1.
Chicago/Turabian StyleJuan M. Vilardy Ortiz; María S. Millán; Elisabet Pérez-Cabré. 2017. "Nonlinear joint transform correlator architectures for images encryption, decryption and authentication systems." Third International Conference on Applications of Optics and Photonics , no. : 1.
Juan M. Vilardy Ortiz; Maria Millan; Elisabet Perez Cabre. Influence of a perturbation in the Gyrator domain for a joint transform correlator-based encryption system. Third International Conference on Applications of Optics and Photonics 2017, 1 .
AMA StyleJuan M. Vilardy Ortiz, Maria Millan, Elisabet Perez Cabre. Influence of a perturbation in the Gyrator domain for a joint transform correlator-based encryption system. Third International Conference on Applications of Optics and Photonics. 2017; ():1.
Chicago/Turabian StyleJuan M. Vilardy Ortiz; Maria Millan; Elisabet Perez Cabre. 2017. "Influence of a perturbation in the Gyrator domain for a joint transform correlator-based encryption system." Third International Conference on Applications of Optics and Photonics , no. : 1.
C. Fernandez; M. Argilés; E. Perez-Cabre; G. Cardona. Spectral radiance of blue light filters on ophthalmic lenses. Optica Pura y Aplicada 2017, 50, 165 -172.
AMA StyleC. Fernandez, M. Argilés, E. Perez-Cabre, G. Cardona. Spectral radiance of blue light filters on ophthalmic lenses. Optica Pura y Aplicada. 2017; 50 (2):165-172.
Chicago/Turabian StyleC. Fernandez; M. Argilés; E. Perez-Cabre; G. Cardona. 2017. "Spectral radiance of blue light filters on ophthalmic lenses." Optica Pura y Aplicada 50, no. 2: 165-172.
© 2016 Elsevier Ltd. A novel nonlinear image encryption scheme based on a fully phase nonzero-order joint transform correlator architecture (JTC) in the Gyrator domain (GD) is proposed. In this encryption scheme, the two non-overlapping data distributions of the input plane of the JTC are fully encoded in phase and this input plane is transformed using the Gyrator transform (GT); the intensity distribution captured in the GD represents a new definition of the joint Gyrator power distribution (JGPD). The JGPD is modified by two nonlinear operations with the purpose of retrieving the encrypted image, with enhancement of the decrypted signal quality and improvement of the overall security. There are three keys used in the encryption scheme, two random phase masks and the rotation angle of the GT, which are all necessary for a proper decryption. Decryption is highly sensitivity to changes of the rotation angle of the GT as well as to little changes in other parameters or keys. The proposed encryption scheme in the GD still preserves the shift-invariance properties originated in the JTC-based encryption in the Fourier domain. The proposed encryption scheme is more resistant to brute force attacks, chosen-plaintext attacks, known-plaintext attacks, and ciphertext-only attacks, as they have been introduced in the cryptanalysis of the JTC-based encryption system. Numerical results are presented and discussed in order to verify and analyze the feasibility and validity of the novel encryption-decryption scheme.Preprin
Juan M. Vilardy; María S. Millán; Elisabet Pérez-Cabré. Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain. Optics and Lasers in Engineering 2017, 89, 88 -94.
AMA StyleJuan M. Vilardy, María S. Millán, Elisabet Pérez-Cabré. Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain. Optics and Lasers in Engineering. 2017; 89 ():88-94.
Chicago/Turabian StyleJuan M. Vilardy; María S. Millán; Elisabet Pérez-Cabré. 2017. "Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain." Optics and Lasers in Engineering 89, no. : 88-94.
To develop and test the sensitivity of an ultrasound-based sensor to assess the viewing distance of visual display terminals operators in real-time conditions.A modified ultrasound sensor was attached to a computer display to assess viewing distance in real time. Sensor functionality was tested on a sample of 20 healthy participants while they conducted four 10-minute randomly presented typical computer tasks (a match-three puzzle game, a video documentary, a task requiring participants to complete a series of sentences, and a predefined internet search).The ultrasound sensor offered good measurement repeatability. Game, text completion, and web search tasks were conducted at shorter viewing distances (54.4 cm [95% CI 51.3-57.5 cm], 54.5 cm [95% CI 51.1-58.0 cm], and 54.5 cm [95% CI 51.4-57.7 cm], respectively) than the video task (62.3 cm [95% CI 58.9-65.7 cm]). Statistically significant differences were found between the video task and the other three tasks (all p < 0.05). Range of viewing distances (from 22 to 27 cm) was similar for all tasks (F = 0.996; p = 0.413).Real-time assessment of the viewing distance of computer users with a non-intrusive ultrasonic device disclosed a task-dependent pattern.
Marc Argilés; Genís Cardona; Elisabet Pérez-Cabré; Ramon Pérez-Magrané; Bernardo Morcego; Joan Gispets. Real-Time Non-Intrusive Assessment of Viewing Distance during Computer Use. Optometry and Vision Science 2016, 93, 1525 -1531.
AMA StyleMarc Argilés, Genís Cardona, Elisabet Pérez-Cabré, Ramon Pérez-Magrané, Bernardo Morcego, Joan Gispets. Real-Time Non-Intrusive Assessment of Viewing Distance during Computer Use. Optometry and Vision Science. 2016; 93 (12):1525-1531.
Chicago/Turabian StyleMarc Argilés; Genís Cardona; Elisabet Pérez-Cabré; Ramon Pérez-Magrané; Bernardo Morcego; Joan Gispets. 2016. "Real-Time Non-Intrusive Assessment of Viewing Distance during Computer Use." Optometry and Vision Science 93, no. 12: 1525-1531.
Recently, a novel nonlinear encryption system based on joint transform correlator (JTC) in the Gyrator domain (GD) was proposed. The encryption system uses a fully nonlinear nonzero order JTC and Gyrator transform (GT). The decryption system is based on two successive GTs. The proposed system preserves the good quality of the decrypted image while increases the overall security of the complete process. In this work, we analyse the performance of this security system when the encrypted image is affected by common sources of degradation such as noise or occlusion. We test its robustness against additive and multiplicative noise affecting the encrypted function. We also study the effect of data loss due to partial occlusion of the encrypted information. The performance of the encryption-decryption system in the GD is evaluated using the metric of the root mean square error (RMSE) between the original image and the decrypted image when the encrypted image is corrupted by noise or modified by occlusion.
Juan M. Vilardy O.; Maria Millan; Elisabet Perez Cabre. Effects of using an encrypted image corrupted by noise and occlusion in a security system based on joint transform correlator and Gyrator transform. 2016 15th Workshop on Information Optics (WIO) 2016, 1 -3.
AMA StyleJuan M. Vilardy O., Maria Millan, Elisabet Perez Cabre. Effects of using an encrypted image corrupted by noise and occlusion in a security system based on joint transform correlator and Gyrator transform. 2016 15th Workshop on Information Optics (WIO). 2016; ():1-3.
Chicago/Turabian StyleJuan M. Vilardy O.; Maria Millan; Elisabet Perez Cabre. 2016. "Effects of using an encrypted image corrupted by noise and occlusion in a security system based on joint transform correlator and Gyrator transform." 2016 15th Workshop on Information Optics (WIO) , no. : 1-3.
First-order and multi-order diffractive lenses are implemented using a LCoS modulator with 8π-phase modulation range for a 514nm operation wavelength. Their performance is compared in terms of energy efficiency in the first and zero order diffractive planes. The influence of the display calibration is evaluated for each phase modulation range.
Elisabet Perez-Cabre; Maria S. Millan. First-order and multi-order diffractive lens using a device with 8π phase modulation range. 2016 15th Workshop on Information Optics (WIO) 2016, 1 -3.
AMA StyleElisabet Perez-Cabre, Maria S. Millan. First-order and multi-order diffractive lens using a device with 8π phase modulation range. 2016 15th Workshop on Information Optics (WIO). 2016; ():1-3.
Chicago/Turabian StyleElisabet Perez-Cabre; Maria S. Millan. 2016. "First-order and multi-order diffractive lens using a device with 8π phase modulation range." 2016 15th Workshop on Information Optics (WIO) , no. : 1-3.
Joint-transform correlator (JTC) architecture presents some advantages, such as no requirement of interferometric recording of the phase distribution or complex conjugation of the key phase mask, in order to optically implement the well-known double random phase encryption (DRPE) method. In addition, a practical optical realization was proposed in a way that the whole information (primary image and two random phase masks) was easily introduced in the same input plane of the JTC system. However, poor image quality was obtained in the decryption stage. Cryptanalysis of JTC-based encryption systems demonstrated that they were vulnerable to certain intruder attacks, similarly to the original DRPE method. In this work, we review recent modifications of encryption algorithms based on JTC architecture that permit, on the one hand, to significantly increase the quality of the retrieved image after information decryption, and on the other hand, to achieve a high security level against a variety of system attacks. The modifications, which were firstly introduced in the Fourier-based JTC system, have been also adapted to be used in the Fresnel and Fractional Fourier domains as well as in the Gyrator domain. Nonlinear operations have been also introduced in multifactor encryption-authentication.
Juan M. Vilardy; Elisabet Perez-Cabre; Maria S. Millan. Image quality and security through nonlinear joint transform encryption. 2016 15th Workshop on Information Optics (WIO) 2016, 1 -3.
AMA StyleJuan M. Vilardy, Elisabet Perez-Cabre, Maria S. Millan. Image quality and security through nonlinear joint transform encryption. 2016 15th Workshop on Information Optics (WIO). 2016; ():1-3.
Chicago/Turabian StyleJuan M. Vilardy; Elisabet Perez-Cabre; Maria S. Millan. 2016. "Image quality and security through nonlinear joint transform encryption." 2016 15th Workshop on Information Optics (WIO) , no. : 1-3.
Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Perez-Cabre], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.
Bahram Javidi; Artur Carnicer; Masahiro Yamaguchi; Takanori Nomura; Elisabet Perez Cabre; Maria Millan; Naveen K Nishchal; Roberto Torroba; John Fredy Barrera; Wenqi He; Xiang Peng; Adrian Stern; Yair Rivenson; A Alfalou; C Brosseau; Changliang Guo; John Sheridan; Guohai Situ; Makoto Naruse; Tsutomu Matsumoto; Ignacio Juvells; Enrique Tajahuerce; Jesús Lancis; Wen Chen; Xudong Chen; Pepijn W H Pinkse; Allard P Mosk; Adam Markman. Roadmap on optical security. Journal of Optics 2016, 18, 1 .
AMA StyleBahram Javidi, Artur Carnicer, Masahiro Yamaguchi, Takanori Nomura, Elisabet Perez Cabre, Maria Millan, Naveen K Nishchal, Roberto Torroba, John Fredy Barrera, Wenqi He, Xiang Peng, Adrian Stern, Yair Rivenson, A Alfalou, C Brosseau, Changliang Guo, John Sheridan, Guohai Situ, Makoto Naruse, Tsutomu Matsumoto, Ignacio Juvells, Enrique Tajahuerce, Jesús Lancis, Wen Chen, Xudong Chen, Pepijn W H Pinkse, Allard P Mosk, Adam Markman. Roadmap on optical security. Journal of Optics. 2016; 18 (8):1.
Chicago/Turabian StyleBahram Javidi; Artur Carnicer; Masahiro Yamaguchi; Takanori Nomura; Elisabet Perez Cabre; Maria Millan; Naveen K Nishchal; Roberto Torroba; John Fredy Barrera; Wenqi He; Xiang Peng; Adrian Stern; Yair Rivenson; A Alfalou; C Brosseau; Changliang Guo; John Sheridan; Guohai Situ; Makoto Naruse; Tsutomu Matsumoto; Ignacio Juvells; Enrique Tajahuerce; Jesús Lancis; Wen Chen; Xudong Chen; Pepijn W H Pinkse; Allard P Mosk; Adam Markman. 2016. "Roadmap on optical security." Journal of Optics 18, no. 8: 1.
. The health of the ocular surface requires blinks of the eye to be frequent in order to provide moisture and to renew the tear film. However, blinking frequency has been shown to decrease in certain conditions such as when subjects are conducting tasks with high cognitive and visual demands. These conditions are becoming more common as people work or spend their leisure time in front of video display terminals. Supervision of blinking frequency in such environments is possible, thanks to the availability of computer-integrated cameras. Therefore, the aim of the present study is to develop an algorithm for the detection of eye blinks and to test it, in a number of videos captured, while subjects are conducting a variety of tasks in front of the computer. The sensitivity of the algorithm for blink detection was found to be of 87.54% (range 30% to 100%), with a mean false-positive rate of 0.19% (range 0% to 1.7%), depending on the illumination conditions during which the image was captured and other computer–user spatial configurations. The current automatic process is based on a partly modified pre-existing eye detection and image processing algorithms and consists of four stages that are aimed at eye detection, eye tracking, iris detection and segmentation, and iris height/width ratio assessment.
Bernardo Morcego; Marc Argilés; Marc Cabrerizo; Genís Cardona; Ramon Pérez; Elisabet Perez Cabre; Joan Gispets. Blinking supervision in a working environment. Journal of Biomedical Optics 2016, 21, 25005 .
AMA StyleBernardo Morcego, Marc Argilés, Marc Cabrerizo, Genís Cardona, Ramon Pérez, Elisabet Perez Cabre, Joan Gispets. Blinking supervision in a working environment. Journal of Biomedical Optics. 2016; 21 (2):25005.
Chicago/Turabian StyleBernardo Morcego; Marc Argilés; Marc Cabrerizo; Genís Cardona; Ramon Pérez; Elisabet Perez Cabre; Joan Gispets. 2016. "Blinking supervision in a working environment." Journal of Biomedical Optics 21, no. 2: 25005.
Purpose: To evaluate spontaneous eye blink rate (SEBR) and percentage of incomplete blinks in different hard-copy and visual display terminal (VDT) reading conditions, compared with baseline conditions. Methods: A sample of 50 participants (29 females, age range, 18–74 years) were recruited for this study. All participants had good ocular health and reported no symptoms of dry eye (OSDI score < 15). Face video recordings were captured while participants observed in silence a landscape picture at 2 m (baseline) and during six different, 6-minute controlled reading experimental conditions. Texts were presented in electronic (tablet and computer display at 100% and 330% zoom levels) and hard-copy (text in book position in silence and aloud and text pasted on the computer display) formats. Video analysis was subsequently conducted to assess blink parameters. Results: All reading conditions resulted in a decrease in SEBR when compared with baseline conditions (all P < 0.001), with the least negative impact corresponding to reading in a 330% expanded display. The percentage of incomplete blinks was found to increase when reading was conducted on an electronic platform, in contrast to hard-copy text. Conclusions: The high cognitive demands associated with a reading task led to a reduction in SEBR, irrespective of type of reading platform. However, only electronic reading resulted in an increase in the percentage of incomplete blinks, which may account for the symptoms experienced by VDT users. Spanish Abstract
Marc Argilés; Genís Cardona; Elisabet Perez Cabre; Margarita Rodríguez. Blink Rate and Incomplete Blinks in Six Different Controlled Hard-Copy and Electronic Reading Conditions. Investigative Opthalmology & Visual Science 2015, 56, 6679 -6685.
AMA StyleMarc Argilés, Genís Cardona, Elisabet Perez Cabre, Margarita Rodríguez. Blink Rate and Incomplete Blinks in Six Different Controlled Hard-Copy and Electronic Reading Conditions. Investigative Opthalmology & Visual Science. 2015; 56 (11):6679-6685.
Chicago/Turabian StyleMarc Argilés; Genís Cardona; Elisabet Perez Cabre; Margarita Rodríguez. 2015. "Blink Rate and Incomplete Blinks in Six Different Controlled Hard-Copy and Electronic Reading Conditions." Investigative Opthalmology & Visual Science 56, no. 11: 6679-6685.
In this work, we present the integration of the photon counting technique (PhCT) with an encryption system in the Gyrator domain (GD) for secure image authentication. The encryption system uses two random phase masks (RPMs), one RPM is defined at the spatial domain and the other RPM is defined at the GD, in order to encode the image to encrypt (original image) into random noise. The rotation angle of the Gyrator transform adds a new key that increases the security of the encryption system. The decryption system is an inverse system with respect to the encryption system. The PhCT limits the information content of an image in a nonlinear, random and controlled way; the photon-limited image only has a few pixels of information, this type of image is usually known as sparse image. We apply the PhCT over the encrypted image. The resulting image in the decryption system is not a copy of the original image, this decrypted image is a random code that should contain the sufficient information for the authentication of the original image using a nonlinear correlation technique. Finally, we evaluate the peak-to-correlation energy metric for different values of the parameters involved in the encryption and authentication systems, in order to test the verification capability of the authentication system.
Juan M. Vilardy O.; Maria S. Millan; Elisabet Perez-Cabre. Secure image encryption and authentication using the photon counting technique in the Gyrator domain. 2015 20th Symposium on Signal Processing, Images and Computer Vision (STSIVA) 2015, 1 -6.
AMA StyleJuan M. Vilardy O., Maria S. Millan, Elisabet Perez-Cabre. Secure image encryption and authentication using the photon counting technique in the Gyrator domain. 2015 20th Symposium on Signal Processing, Images and Computer Vision (STSIVA). 2015; ():1-6.
Chicago/Turabian StyleJuan M. Vilardy O.; Maria S. Millan; Elisabet Perez-Cabre. 2015. "Secure image encryption and authentication using the photon counting technique in the Gyrator domain." 2015 20th Symposium on Signal Processing, Images and Computer Vision (STSIVA) , no. : 1-6.
E Pérez-Cabré; E A Mohammed; Maria Millan; Haitham Saadon. Photon-counting multifactor optical encryption and authentication. Journal of Optics 2015, 17, 1 .
AMA StyleE Pérez-Cabré, E A Mohammed, Maria Millan, Haitham Saadon. Photon-counting multifactor optical encryption and authentication. Journal of Optics. 2015; 17 (2):1.
Chicago/Turabian StyleE Pérez-Cabré; E A Mohammed; Maria Millan; Haitham Saadon. 2015. "Photon-counting multifactor optical encryption and authentication." Journal of Optics 17, no. 2: 1.
Juan M Vilardy; Yezid Torres; Maria Millan; Elisabet Perez Cabre. Generalized formulation of an encryption system based on a joint transform correlator and fractional Fourier transform. Journal of Optics 2014, 16, 1 .
AMA StyleJuan M Vilardy, Yezid Torres, Maria Millan, Elisabet Perez Cabre. Generalized formulation of an encryption system based on a joint transform correlator and fractional Fourier transform. Journal of Optics. 2014; 16 (12):1.
Chicago/Turabian StyleJuan M Vilardy; Yezid Torres; Maria Millan; Elisabet Perez Cabre. 2014. "Generalized formulation of an encryption system based on a joint transform correlator and fractional Fourier transform." Journal of Optics 16, no. 12: 1.
María S. Millán; Elisabet Perez Cabre; Lenny Romero; Natalia Ramírez. Programmable diffractive lens for ophthalmic application. Optical Engineering 2014, 53, 61709 .
AMA StyleMaría S. Millán, Elisabet Perez Cabre, Lenny Romero, Natalia Ramírez. Programmable diffractive lens for ophthalmic application. Optical Engineering. 2014; 53 (6):61709.
Chicago/Turabian StyleMaría S. Millán; Elisabet Perez Cabre; Lenny Romero; Natalia Ramírez. 2014. "Programmable diffractive lens for ophthalmic application." Optical Engineering 53, no. 6: 61709.
A new optical security system for image encryption based on a nonlinear joint transform correlator (JTC) in the Fresnel domain (FrD) is proposed. The proposal of the encryption process is a lensless optical system that produces a real encrypted image and is a simplified version of some previous JTC-based encryption systems. We use a random complex mask as the key in the nonlinear system for the purpose of increasing the security of the encrypted image. In order to retrieve the primary image in the decryption process, a nonlinear operation has to be introduced in the encrypted function. The optical decryption process is implemented through the Fresnel transform and the fractional Fourier transform. The security system proposed in this paper preserves the shift-invariance property of the JTC-based encryption system in the Fourier domain, with respect to the lateral displacement of the key random mask in the decryption process. This system shows an improved resistance to chosen-plaintext and known-plaintext attacks, as they have been proposed in the cryptanalysis of the JTC encrypting system. Numerical simulations show the validity of this new optical security system.
Juan M. Vilardy; Maria Millan; Elisabet Perez Cabre. Nonlinear optical security system based on a joint transform correlator in the Fresnel domain. Applied Optics 2014, 53, 1674 -1682.
AMA StyleJuan M. Vilardy, Maria Millan, Elisabet Perez Cabre. Nonlinear optical security system based on a joint transform correlator in the Fresnel domain. Applied Optics. 2014; 53 (8):1674-1682.
Chicago/Turabian StyleJuan M. Vilardy; Maria Millan; Elisabet Perez Cabre. 2014. "Nonlinear optical security system based on a joint transform correlator in the Fresnel domain." Applied Optics 53, no. 8: 1674-1682.