Please use this identifier to cite or link to this item: https://repositorio.accefyn.org.co/handle/001/888 Cómo citar
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTorroba, Roberto-
dc.contributor.authorBarrera Ramírez, John F.-
dc.date.accessioned2021-10-15T20:47:43Z-
dc.date.available2021-10-15T20:47:43Z-
dc.date.issued2015-11-18-
dc.identifier.urihttps://repositorio.accefyn.org.co/handle/001/888-
dc.description.abstractEn esta contribución se presenta la implementación experimental un sistema de protección de información basado en el procesamiento óptico y se analiza la fidelidad de la información recuperada cuando hay pérdida de datos durante la transmisión. La información es encriptada empleando una arquitectura óptica de correlador de transformada conjunta y una técnica de codificación de doble máscara de fase. Un usuario autorizado puede recuperar la información original cuando tiene acceso a la información del dato encriptado y de la llave de seguridad; si un intruso puede interceptar la imagen encriptada, pero no accede la información de la llave de seguridad, no podrá acceder a la información contenida en el dato encriptado. La descripción teórica y los resultados experimentales demuestran la habilidad que tiene el sistema de seguridad para proteger y recuperar información por medio de procesadores ópticos, y su tolerancia a la pérdida de información durante la transmisión.spa
dc.description.abstractIn this contribution the implementation of an experimental data protection system based on optical processing is presented, and the reliability of the recovered information when there is data loss during transmission is analyzed. The information is encrypted using an optical joint transform correlation architecture together with a double phase mask encoding technique. An authorized user recovers the original information when accessing the encoded data and the security key; if an intruder intersects the encoded image but does not possess the security key there is no possibility to access to the information contained in the encrypted image. The theoretical description and the experimental results show the ability the security systems exhibits to protect and recover the information by optical means, including the tolerance to data loss during transmission.eng
dc.format.extent6 páginasspa
dc.format.mimetypeapplication/pdfspa
dc.language.isospaspa
dc.publisherAcademia Colombiana de Ciencias Exactas, Físicas y Naturalesspa
dc.rightsCreative Commons Attribution-NonCommercial-ShareAlike 4.0 Internationalspa
dc.rights.urihttps://creativecommons.org/licenses/by-nc/4.0/spa
dc.titleSuplemento Protección de datos usando un sistema experimental de encriptación de correlador de transformada conjuntaspa
dc.typeArtículo de revistaspa
dcterms.audienceEstudiantes, Profesores, Comunidad científicaspa
dcterms.referencesAlfalou, A., Brosseau, C. 2009. Optical image compression and Optical image compression and encryption methods. Adv. Opt. Photon 1: 589-636.spa
dcterms.referencesBarrera, J.F., Henao, R., Tebaldi, M., Torroba, R., Bolognini, N. 2006a. Multiplexing encryption-decryption via lateral shifting of a random phase mask. Opt. Commun. 259: 532-536.spa
dcterms.referencesBarrera, J.F., Henao, R., Tebaldi, M., Torroba, R., Bolognini, N. 2006b. Multiplexing encrypted data by using polarized light. Opt. Commun. 260: 109-112spa
dcterms.referencesBarrera, J.F., Henao, R., Tebaldi, M., Torroba, R., Bolognini, N. 2006c. Multiple image encryption using an aperture-modulated optical system. Opt. Commun. 261: 29-33.spa
dcterms.referencesBarrera, J.F., Tebaldi, M., Torroba, R., Bolognini, N. 2009. Multiplexing encryption technique by combining random amplitude and phase masks. Optik 120: 351-355spa
dcterms.referencesBarrera, J.F., Rueda, E., Ríos, C., Tebaldi, M., Bolognini, N., Torroba, R. 2011. Experimental opto-digital synthesis of encrypted sub-samples of an image to improve its decoded quality. Opt. Commun. 284: 4350-4355.spa
dcterms.referencesBarrera, J.F., Torroba, R. 2010. One step multiplexing optical encryption. Opt. Commun. 283: 1268-1272.spa
dcterms.referencesBarrera, J.F., Vargas, C., Tebaldi, M., Torroba, R., Bolognini, N. 2010. Known-plaintext attack on a joint transform correlator encrypting system. Opt. Lett. 35: 3553-3555.spa
dcterms.referencesBellare, M., Desai, A., Pointcheval, D., Rogaway, P. 1998. Rela-tions Among Notions Security for Public-Key Encryption Schemes. Lecture Notes in Computer 1492: 26-46.spa
dcterms.referencesCarnicer, A., Montes-Usategui, M., Arcos, S., Juvells, I. 2005. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt. Lett. 30: 1644-1646.spa
dcterms.referencesCamp-Winget, N., Housley, R., Wagner, D., Walker, J. 2003. Security flaws data links protocols. Communications of the ACM 46: 35-39.spa
dcterms.referencesGraydon, O. 2013. Cryptography: Quick response codes, Nature Photonics 7: 343.spa
dcterms.referencesJavidi, B., Zhang, G., Li, J. 1996. Experimental demonstration of the random phase encoding technique for image encryption and security verification. Opt. Eng. 35: 2506-2512spa
dcterms.referencesJavidi, B., Esmail, A., Zhang, G. (Abril 3, 2012). Optical security system using Fourier plane encoding. U.S. patent 8,150,033 B2spa
dcterms.referencesMatoba, O., Javidi, B. 1999. Encrypted optical memory system using three-dimensional keys in the Fresnel domain. Opt. Lett. 24: 762-764spa
dcterms.referencesNomura, T., Javidi B. 2000. Optical encryption using a joint transform correlator architecture. Opt. Eng. 39: 2031-2035.spa
dcterms.referencesNomura, T., Pérez-Cabré, E., Millán, M.S., Javidi, B. 2009. Optical Techniques for Information Security. Proc. IEEE 97: 1128-1148spa
dcterms.referencesPile, D. 2010. Optical encryption: The ghost holds a secret. Nature Photonics 4: 587.spa
dcterms.referencesRefregier, P., Javidi, B. 1995. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20: 767-769.spa
dcterms.referencesShannon, C. 1949. Communication Theory of Secrecy Systems. Bell Systems Technical Journal 28: 656-715.spa
dcterms.referencesSitu, G., Zhang, J. 2004. Double random-phase encoding in the Fresnel domain. Opt. Lett. 29: 1584-1586.spa
dcterms.referencesSitu, G., Zhang, J. 2005. Multiple-image encryption by wavelength multiplexing. Opt. Lett. 30: 1306-1308.spa
dcterms.referencesUnnikrishnan, G., Joseph, J., Singh K. 1998. Optical encryption system that uses phase conjugation in a photorefractive crystal. Appl. Opt. 31: 8181-8186spa
dcterms.referencesUnnikrishnan, G.; Joseph, J.; Singh, K. 2000. Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt. Lett. 25: 887-889.spa
dcterms.referencesWang, X., Zhao, D. 2012. Double images encryption method with resistance against the specific attack based on an asymmetric algorithm. Opt. Express 20: 11994-12003.spa
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.type.driverinfo:eu-repo/semantics/articlespa
dc.type.versioninfo:eu-repo/semantics/publishedVersionspa
dc.rights.creativecommonsAtribución-NoComercial 4.0 Internacional (CC BY-NC 4.0)spa
dc.identifier.doihttps://doi.org/10.18257/raccefyn.263-
dc.subject.proposalProcesamiento óptico de informaciónspa
dc.subject.proposalOptical information processingeng
dc.subject.proposalProtección de datosspa
dc.subject.proposalData protectioneng
dc.subject.proposalSeguridad ópticaspa
dc.subject.proposalOptical securityeng
dc.subject.proposalCorrelador de transformada conjuntaspa
dc.subject.proposalJoint transform correlatoreng
dc.subject.proposalEncriptaciónspa
dc.subject.proposalEncryptioneng
dc.subject.proposalDesencriptaciónspa
dc.subject.proposalDecryptioneng
dc.type.coarhttp://purl.org/coar/resource_type/c_6501spa
dc.relation.ispartofjournalRevista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturalesspa
dc.relation.citationvolume39spa
dc.relation.citationstartpage55spa
dc.relation.citationendpage60spa
dc.publisher.placeBogotá, Colombiaspa
dc.contributor.corporatenameAcademia Colombiana de Ciencias Exactas, Físicas y Naturalesspa
dc.relation.citationissueSuplementospa
dc.type.contentDataPaperspa
dc.type.redcolhttp://purl.org/redcol/resource_type/ARTspa
oaire.accessrightshttp://purl.org/coar/access_right/c_abf2spa
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85spa
Appears in Collections:BA. Revista de la Academia Colombiana de Ciencias Exactas Físicas y Naturales

Files in This Item:
File Description SizeFormat 
6. Protección de datos usando un sistema experimentalde encriptación.pdfCiencias físicas2.4 MBAdobe PDFThumbnail
View/Open


This item is licensed under a Creative Commons License Creative Commons