Please use this identifier to cite or link to this item: https://repositorio.accefyn.org.co/handle/001/887 Cómo citar
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBarrera Ramírez, John F.-
dc.contributor.authorTorroba, Roberto-
dc.date.accessioned2021-10-15T20:47:07Z-
dc.date.available2021-10-15T20:47:07Z-
dc.date.issued2015-11-18-
dc.identifier.urihttps://repositorio.accefyn.org.co/handle/001/887-
dc.description.abstractLos sistemas de protección de información basados en procesadores ópticos y que emplean una técnica de codificación de doble máscara aleatoria de fase permiten el manejo seguro de los datos, pero su recuperación no está libre de ruido. Si bien la seguridad del sistema es provista por el procesador óptico que habilita encriptar la información, en este trabajo se demuestra que la recuperación libre de ruido es posible mediante la inclusión de la codificación de respuesta rápida, sin alterar el proceso de protección de datos. La información que se desea proteger es previamente convertida en un código de respuesta rápida o código QR, y posteriormente el código es encriptado ópticamente. El código QR recuperado contendrá el ruido habitual producido por el uso de las máscaras aleatorias de fase y el procesamiento óptico-digital involucrado en el proceso. Finalmente, al escanear el código QR desencriptado se puede recuperar la información original completamente libre de ruido. Se incluye la descripción teórica del procesador óptico y se presentan resultados experimentales que demuestran la validez y aplicabilidad del sistema de protección.spa
dc.description.abstractThe information protection systems based on optical processors, employing a double random phase mask encryption technique, allow data securely handling, but the recovery is not noise-free. Although the system security is provided by the optical processor enabling the information encoding, we demonstrate in this contribution that noise-free recovery is indeed possible by including the quick response coding, without altering the data protection process. The information to be protected is first converted into a quick response code or QR code, and then this code is optically encrypted. The decrypted QR code exhibits the usual noise produced by the random phase masks along with the involved opto-digital processing. Finally, when scanning the decrypted QR code we recover the original information without noise. We include the theoretical description of the optical processor, as well as we show experimental results that corroborate the validity and applicability of the security system.eng
dc.format.extent7 páginasspa
dc.format.mimetypeapplication/pdfspa
dc.language.isospaspa
dc.publisherAcademia Colombiana de Ciencias Exactas, Físicas y Naturalesspa
dc.rightsCreative Commons Attribution-NonCommercial-ShareAlike 4.0 Internationalspa
dc.rights.urihttps://creativecommons.org/licenses/by-nc/4.0/spa
dc.titleSuplemento Encriptación óptica de información con recuperación libre de ruidospa
dc.typeArtículo de revistaspa
dcterms.audienceEstudiantes, Profesores, Comunidad científicaspa
dcterms.referencesBarrera, J.F., Henao, R., Tebaldi, M., Torroba, R., Bolognini, N. 2006a. Multiplexing encrypted data by using polarized light. Opt. Commun. 260: 109-112.spa
dcterms.referencesBarrera, J.F., Henao, R., Tebaldi, M., Torroba, R., Bolognini, N. 2006b. Multiple image encryption using an aperture-modulated optical system. Opt. Commun. 261: 29-33.spa
dcterms.referencesBarrera, J. F., Vargas, C., Tebaldi, M., Torroba, R. 2010a. Chosen-plaintext attack on a joint transform correlator encrypting system. Opt. Commun. 283: 3917-3921.spa
dcterms.referencesBarrera, J., Vargas, C., Tebaldi, M., Torroba, R., Bolognini, N. 2010b. Known plaintext attack on a joint transform correlator encrypting system. Opt. Lett. 35: 3553-3555.spa
dcterms.referencesBarrera, J.F., Mira, A., Torroba, R. 2013a. Optical encryption and QR codes: Secure and noise-free information retrieval. Opt. Express 21: 5373-5378.spa
dcterms.referencesBarrera, J.F., Vélez, A., Torroba, R. (Agosto, 2013)b. Information security through light: Protecting information with optical processors. Sección Labtalk, J. Opt. Recuperado de http://iopscience.iop.org/2040-8986/labtalk-article/54457.spa
dcterms.referencesBarrera, J.F., Vélez, A., Torroba, R. 2013c. Experimental multiplexing protocol to encrypt messages of any length. Journal of Optics 15: 055404spa
dcterms.referencesBarrera, J.F., Mira, A., Torroba, R. 2014a. Experimental QR code optical encryption: noise-free data recovering. Opt. Lett. 39: 3074-3077spa
dcterms.referencesBarrera, J.F., Vélez, A., Torroba R. 2014b. Experimental scrambling and noise reduction applied to the optical encryption of QR codes. Opt. Express. 22: 20268-20277.spa
dcterms.referencesCarnicer, A., Montes-Usategui, M., Arcos, S., Juvells I. 2005. Vulnerability to chosen cyphertext attacks of optical encryption scheme based on double random phase mask. Opt. Lett. 30: 1644-1646spa
dcterms.referencesCarnicer, A., Hassanfiroozi, A., Latorre-Carmona, P. Huang, Y. P., Javidi B. 2015. Security authentication using phase-encoded nanoparticle structures and polarized light. Opt. Lett. 40: 135-138spa
dcterms.referencesFan, D., Meng, X., Wang, Y., Yang, X., Peng, X., He, W., Dong, G., Chen, H. 2013. Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm. Appl. Opt. 52: 5645-5652.spa
dcterms.referencesGraydon, O. 2013. Cryptography: Quick response codes. Nature Photonics, 7: 343spa
dcterms.referencesISO, IEC 18004. 2006. Information technology - Automatic identification and data capture techniques – QR Code 2005 bar code symbology specification. International Organization for Standardization, Geneva, Switzerland.spa
dcterms.referencesJavidi, B., Towghi, N., Maghzi, N., Verrall S. C. 2000. Error-reduction techniques and error analysis for fully phase- and amplitude-based encryption. Appl. Opt. 39: 4117-4130spa
dcterms.referencesJavidi, B. (Febrero, 2003). Method and Apparatus for Encryption Using Partial Information. U.S. Patent Number 6519340 B1.spa
dcterms.referencesJavidi, B., Tajahuerce, E. (Mayo 22, 2007). Information security using digital holography. U.S. patent 7221760 B2.spa
dcterms.referencesJavidi, B., Esmail, A., Zhang, G. (Marzo 23, 2010). Optical Security system using Fourier plane encoding. U.S. patent 7684098spa
dcterms.referencesLiao, K. C., Lee, W. H. 2010. A novel user authentication scheme based on QR-Code. J. Netw. 5: 937-941.spa
dcterms.referencesLin, C., Shen, X., Li, B. 2014. Four-dimensional key design in amplitude, phase, polarization and distance for optical encryption based on polarization digital holography and QR code. Opt. Express 22: 20727-20739.spa
dcterms.referencesMarkman, A., Javidi, B., Tehramipoor, M. 2014. Photon-counting security tagging and verification using optically encoded QR codes. IEEE Photonics Journal 6: 6800609.spa
dcterms.referencesMatoba, O., Javidi, B. 1999. Encrypted optical storage with wavelength-key and random phase codes. Appl. Opt 38: 6785-6790spa
dcterms.referencesPeng, X., Zhang, P., Wei, H., Yu B. 2006. Known-plaintext attack on optical encryption based on double random phase keys. Opt. Lett. 31: 1044-1046spa
dcterms.referencesQin, Y., Gong, Q. 2014. Optical information encryption based on incoherent superposition with the help of the QR code. Opt. Commun. 310: 69-74.spa
dcterms.referencesTreacy, S. (agosto de 2013). The creative power of Colaboration. The world Academy of Sciences TWAS. Recuperado de http://twas-old.ictp.it/news-in-home-page/news/the-creative-power-of-collaboration.spa
dcterms.referencesVilardy, J. M., Millán, M. S., Peréz-Cabre, E. 2013. Improved decryption quality and security of a joint transform correlator-based encryption system. J. Opt. 15: 025401spa
dcterms.referencesWang, Z., Zhang, S., Liu, H., Qin, Y. 2014. Single-intensity-recording optical encryption technique based on phase retrieval algoritm and QR code. Opt. Commun. 332: 36-41.spa
dcterms.referencesZhang, Y., Xiao, D., Wen, W., Liu, H. 2013a. Vulnerability to chosen-plaintext attack of a general optical encryption model with the architecture of scrambling-then-double random phase encoding. Opt. Lett. 38: 4506-4508.spa
dcterms.referencesZhang, C., Liao, M., He, W., Peng, X. 2013b. Ciphertext-only attack on a joint transform correlator encryption system. Opt. Express 21: 28523-28530.spa
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.type.driverinfo:eu-repo/semantics/articlespa
dc.type.versioninfo:eu-repo/semantics/publishedVersionspa
dc.rights.creativecommonsAtribución-NoComercial 4.0 Internacional (CC BY-NC 4.0)spa
dc.identifier.doihttps://doi.org/10.18257/raccefyn.259-
dc.subject.proposalProtección de informaciónspa
dc.subject.proposalInformation protectioneng
dc.subject.proposalProcesadores ópticosspa
dc.subject.proposalOptical processorseng
dc.subject.proposalRecuperación libre de ruidospa
dc.subject.proposalNoise-free recoveryeng
dc.type.coarhttp://purl.org/coar/resource_type/c_6501spa
dc.relation.ispartofjournalRevista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturalesspa
dc.relation.citationvolume39spa
dc.relation.citationstartpage48spa
dc.relation.citationendpage54spa
dc.publisher.placeBogotá, Colombiaspa
dc.contributor.corporatenameAcademia Colombiana de Ciencias Exactas, Físicas y Naturalesspa
dc.relation.citationissueSuplementospa
dc.type.contentDataPaperspa
dc.type.redcolhttp://purl.org/redcol/resource_type/ARTREFspa
oaire.accessrightshttp://purl.org/coar/access_right/c_abf2spa
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85spa
Appears in Collections:BA. Revista de la Academia Colombiana de Ciencias Exactas Físicas y Naturales

Files in This Item:
File Description SizeFormat 
5. Encriptación óptica de información con recuperación libre de ruido.pdfCiencias físicas2.55 MBAdobe PDFThumbnail
View/Open


This item is licensed under a Creative Commons License Creative Commons