Experimental multiplexing protocol to encrypt messages of any length

As optical systems are diffraction limited, it is not possible to encrypt in a single step texts containing a large amount of characters. We overcome this situation by separately encrypting several characters, along with a multiplexing procedure to obtain an encrypted keyboard. The experimental application is performed in a joint transform correlator architecture and using digital holography. We combine the different characters into a keyboard encrypted with a single phase mask together with a selection-position key that gives the right sequence to recover safe encrypted messages. The multiplexing operation we suggest is advantageous in the sense that the technique enables processing of messages that otherwise the optical system could not process in a single step. We also employ a repositioning technique to prevent both the natural background noise over recovered characters and the possible cross talk. The lack of any single key avoids the correct message recovery. Experimental results are presented to show the feasibility of our proposal, representing an actual application of the optical encrypting protocols.

[1]  Myrian Tebaldi,et al.  Multiplexing encrypted data by using polarized light , 2006 .

[2]  Bahram Javidi,et al.  Optical encryption using a joint transform correlator architecture , 2000 .

[3]  Kehar Singh,et al.  Secure optical system that uses fully phase-based encryption and lithium niobate crystal as phase contrast filter for decryption , 2008 .

[4]  L. A. Skvortsov Active spectral imaging for standoff detection of explosives , 2011 .

[5]  AbdulRahman Alsamman,et al.  Spatially efficient reference phase-encrypted joint transform correlator. , 2010, Applied optics.

[6]  Myrian Tebaldi,et al.  Multiplexing encryption–decryption via lateral shifting of a random phase mask , 2006 .

[7]  Bahram Javidi,et al.  Experimental demonstration of the random phase encoding technique for image encryption and security verification , 1996 .

[8]  Roberto Torroba,et al.  Master key generation to avoid the use of an external reference wave in an experimental JTC encrypting architecture. , 2012, Applied optics.

[9]  Jari Lindberg,et al.  Mathematical concepts of optical superresolution , 2012 .

[10]  Elisabet Pérez-Cabré,et al.  Optical Data Encryption , 2011 .

[11]  Naveen K. Nishchal,et al.  Flexible optical encryption with multiple users and multiple security levels , 2011 .

[12]  Jingjuan Zhang,et al.  Multiple-image encryption by wavelength multiplexing. , 2005, Optics letters.

[13]  John Fredy Barrera,et al.  Experimental multiplexing approach via code key rotations under a joint transform correlator scheme , 2011 .

[14]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[15]  B Javidi,et al.  Optical encryption system with a binary key code. , 2000, Applied optics.

[16]  Cecilia La Mela,et al.  Optical encryption using phase-shifting interferometry in a joint transform correlator. , 2006, Optics letters.

[17]  Dafne Amaya,et al.  Multiplexing of encrypted data using fractal masks. , 2012, Optics letters.

[18]  Bahram Javidi,et al.  Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator. , 2003, Applied optics.

[19]  Dafne Amaya,et al.  Multichanneled encryption via a joint transform correlator architecture. , 2008, Applied optics.

[20]  Osamu Matoba,et al.  Secure holographic memory by double-random polarization encryption. , 2004, Applied optics.

[21]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.

[22]  Dafne Amaya,et al.  Wavelength multiplexing encryption using joint transform correlator architecture. , 2009, Applied optics.

[23]  Hone-Ene Hwang,et al.  Wavelength multiplexing multiple-image encryption using cascaded phase-only masks in the Fresnel transform domain. , 2011, Applied optics.

[24]  Juan Liu,et al.  Multiple-image encryption based on position multiplexing of Fresnel phase , 2013 .

[25]  Naveen K. Nishchal,et al.  Image encryption and authentication verification using fractional nonconventional joint transform correlator , 2012 .

[26]  Ayman Alfalou,et al.  Optical image compression and encryption methods , 2009 .