Please use this identifier to cite or link to this item:
https://repositorio.accefyn.org.co/handle/001/888
Cómo citar
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Torroba, Roberto | - |
dc.contributor.author | Barrera Ramírez, John F. | - |
dc.date.accessioned | 2021-10-15T20:47:43Z | - |
dc.date.available | 2021-10-15T20:47:43Z | - |
dc.date.issued | 2015-11-18 | - |
dc.identifier.uri | https://repositorio.accefyn.org.co/handle/001/888 | - |
dc.description.abstract | En esta contribución se presenta la implementación experimental un sistema de protección de información basado en el procesamiento óptico y se analiza la fidelidad de la información recuperada cuando hay pérdida de datos durante la transmisión. La información es encriptada empleando una arquitectura óptica de correlador de transformada conjunta y una técnica de codificación de doble máscara de fase. Un usuario autorizado puede recuperar la información original cuando tiene acceso a la información del dato encriptado y de la llave de seguridad; si un intruso puede interceptar la imagen encriptada, pero no accede la información de la llave de seguridad, no podrá acceder a la información contenida en el dato encriptado. La descripción teórica y los resultados experimentales demuestran la habilidad que tiene el sistema de seguridad para proteger y recuperar información por medio de procesadores ópticos, y su tolerancia a la pérdida de información durante la transmisión. | spa |
dc.description.abstract | In this contribution the implementation of an experimental data protection system based on optical processing is presented, and the reliability of the recovered information when there is data loss during transmission is analyzed. The information is encrypted using an optical joint transform correlation architecture together with a double phase mask encoding technique. An authorized user recovers the original information when accessing the encoded data and the security key; if an intruder intersects the encoded image but does not possess the security key there is no possibility to access to the information contained in the encrypted image. The theoretical description and the experimental results show the ability the security systems exhibits to protect and recover the information by optical means, including the tolerance to data loss during transmission. | eng |
dc.format.extent | 6 páginas | spa |
dc.format.mimetype | application/pdf | spa |
dc.language.iso | spa | spa |
dc.publisher | Academia Colombiana de Ciencias Exactas, Físicas y Naturales | spa |
dc.rights | Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International | spa |
dc.rights.uri | https://creativecommons.org/licenses/by-nc/4.0/ | spa |
dc.title | Suplemento Protección de datos usando un sistema experimental de encriptación de correlador de transformada conjunta | spa |
dc.type | Artículo de revista | spa |
dcterms.audience | Estudiantes, Profesores, Comunidad científica | spa |
dcterms.references | Alfalou, A., Brosseau, C. 2009. Optical image compression and Optical image compression and encryption methods. Adv. Opt. Photon 1: 589-636. | spa |
dcterms.references | Barrera, J.F., Henao, R., Tebaldi, M., Torroba, R., Bolognini, N. 2006a. Multiplexing encryption-decryption via lateral shifting of a random phase mask. Opt. Commun. 259: 532-536. | spa |
dcterms.references | Barrera, J.F., Henao, R., Tebaldi, M., Torroba, R., Bolognini, N. 2006b. Multiplexing encrypted data by using polarized light. Opt. Commun. 260: 109-112 | spa |
dcterms.references | Barrera, J.F., Henao, R., Tebaldi, M., Torroba, R., Bolognini, N. 2006c. Multiple image encryption using an aperture-modulated optical system. Opt. Commun. 261: 29-33. | spa |
dcterms.references | Barrera, J.F., Tebaldi, M., Torroba, R., Bolognini, N. 2009. Multiplexing encryption technique by combining random amplitude and phase masks. Optik 120: 351-355 | spa |
dcterms.references | Barrera, J.F., Rueda, E., Ríos, C., Tebaldi, M., Bolognini, N., Torroba, R. 2011. Experimental opto-digital synthesis of encrypted sub-samples of an image to improve its decoded quality. Opt. Commun. 284: 4350-4355. | spa |
dcterms.references | Barrera, J.F., Torroba, R. 2010. One step multiplexing optical encryption. Opt. Commun. 283: 1268-1272. | spa |
dcterms.references | Barrera, J.F., Vargas, C., Tebaldi, M., Torroba, R., Bolognini, N. 2010. Known-plaintext attack on a joint transform correlator encrypting system. Opt. Lett. 35: 3553-3555. | spa |
dcterms.references | Bellare, M., Desai, A., Pointcheval, D., Rogaway, P. 1998. Rela-tions Among Notions Security for Public-Key Encryption Schemes. Lecture Notes in Computer 1492: 26-46. | spa |
dcterms.references | Carnicer, A., Montes-Usategui, M., Arcos, S., Juvells, I. 2005. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt. Lett. 30: 1644-1646. | spa |
dcterms.references | Camp-Winget, N., Housley, R., Wagner, D., Walker, J. 2003. Security flaws data links protocols. Communications of the ACM 46: 35-39. | spa |
dcterms.references | Graydon, O. 2013. Cryptography: Quick response codes, Nature Photonics 7: 343. | spa |
dcterms.references | Javidi, B., Zhang, G., Li, J. 1996. Experimental demonstration of the random phase encoding technique for image encryption and security verification. Opt. Eng. 35: 2506-2512 | spa |
dcterms.references | Javidi, B., Esmail, A., Zhang, G. (Abril 3, 2012). Optical security system using Fourier plane encoding. U.S. patent 8,150,033 B2 | spa |
dcterms.references | Matoba, O., Javidi, B. 1999. Encrypted optical memory system using three-dimensional keys in the Fresnel domain. Opt. Lett. 24: 762-764 | spa |
dcterms.references | Nomura, T., Javidi B. 2000. Optical encryption using a joint transform correlator architecture. Opt. Eng. 39: 2031-2035. | spa |
dcterms.references | Nomura, T., Pérez-Cabré, E., Millán, M.S., Javidi, B. 2009. Optical Techniques for Information Security. Proc. IEEE 97: 1128-1148 | spa |
dcterms.references | Pile, D. 2010. Optical encryption: The ghost holds a secret. Nature Photonics 4: 587. | spa |
dcterms.references | Refregier, P., Javidi, B. 1995. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20: 767-769. | spa |
dcterms.references | Shannon, C. 1949. Communication Theory of Secrecy Systems. Bell Systems Technical Journal 28: 656-715. | spa |
dcterms.references | Situ, G., Zhang, J. 2004. Double random-phase encoding in the Fresnel domain. Opt. Lett. 29: 1584-1586. | spa |
dcterms.references | Situ, G., Zhang, J. 2005. Multiple-image encryption by wavelength multiplexing. Opt. Lett. 30: 1306-1308. | spa |
dcterms.references | Unnikrishnan, G., Joseph, J., Singh K. 1998. Optical encryption system that uses phase conjugation in a photorefractive crystal. Appl. Opt. 31: 8181-8186 | spa |
dcterms.references | Unnikrishnan, G.; Joseph, J.; Singh, K. 2000. Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt. Lett. 25: 887-889. | spa |
dcterms.references | Wang, X., Zhao, D. 2012. Double images encryption method with resistance against the specific attack based on an asymmetric algorithm. Opt. Express 20: 11994-12003. | spa |
dc.rights.accessrights | info:eu-repo/semantics/openAccess | spa |
dc.type.driver | info:eu-repo/semantics/article | spa |
dc.type.version | info:eu-repo/semantics/publishedVersion | spa |
dc.rights.creativecommons | Atribución-NoComercial 4.0 Internacional (CC BY-NC 4.0) | spa |
dc.identifier.doi | https://doi.org/10.18257/raccefyn.263 | - |
dc.subject.proposal | Procesamiento óptico de información | spa |
dc.subject.proposal | Optical information processing | eng |
dc.subject.proposal | Protección de datos | spa |
dc.subject.proposal | Data protection | eng |
dc.subject.proposal | Seguridad óptica | spa |
dc.subject.proposal | Optical security | eng |
dc.subject.proposal | Correlador de transformada conjunta | spa |
dc.subject.proposal | Joint transform correlator | eng |
dc.subject.proposal | Encriptación | spa |
dc.subject.proposal | Encryption | eng |
dc.subject.proposal | Desencriptación | spa |
dc.subject.proposal | Decryption | eng |
dc.type.coar | http://purl.org/coar/resource_type/c_6501 | spa |
dc.relation.ispartofjournal | Revista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturales | spa |
dc.relation.citationvolume | 39 | spa |
dc.relation.citationstartpage | 55 | spa |
dc.relation.citationendpage | 60 | spa |
dc.publisher.place | Bogotá, Colombia | spa |
dc.contributor.corporatename | Academia Colombiana de Ciencias Exactas, Físicas y Naturales | spa |
dc.relation.citationissue | Suplemento | spa |
dc.type.content | DataPaper | spa |
dc.type.redcol | http://purl.org/redcol/resource_type/ART | spa |
oaire.accessrights | http://purl.org/coar/access_right/c_abf2 | spa |
oaire.version | http://purl.org/coar/version/c_970fb48d4fbd8a85 | spa |
Appears in Collections: | BA. Revista de la Academia Colombiana de Ciencias Exactas Físicas y Naturales |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
6. Protección de datos usando un sistema experimentalde encriptación.pdf | Ciencias físicas | 2.4 MB | Adobe PDF | View/Open |
This item is licensed under a Creative Commons License