Please use this identifier to cite or link to this item:
http://repositoriodspace.unipamplona.edu.co/jspui/handle/20.500.12744/1138
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Pinzon Rueda, Carlos Alberto. | - |
dc.date.accessioned | 2022-05-25T22:56:10Z | - |
dc.date.available | 2017-03-15 | - |
dc.date.available | 2022-05-25T22:56:10Z | - |
dc.date.issued | 2017 | - |
dc.identifier.citation | Pinzon Rueda, C. A. (2016). Procesador óptico virtual de encriptación usando llaves en armónicos circulares [Trabajo de Grado Pregrado, Universidad de Pamplona]. Repositorio Hulago Universidad de Pamplona. http://repositoriodspace.unipamplona.edu.co/jspui/handle/20.500.12744/1138 | es_CO |
dc.identifier.uri | http://repositoriodspace.unipamplona.edu.co/jspui/handle/20.500.12744/1138 | - |
dc.description | Procesadores ópticos virtuales PEVLC y PEJTC para encriptar imágenes RGB fueron implementados y estudiados. La varianza del proceso de desencriptación con la rotación de la llave en coordenadas cartesianas y en componentes armónicas circulares (CHC) fue estudiada computacionalmente. Determinamos que la llave en coordenadas rectangulares permite una tolerancia de hasta ±1° de rotación de la llave. Con llaves en CHC encontramos una tolerancia de ±60° de rotación, sin utilizar máscara multiplicando la imagen de entrada. Varianza total fue encontrada cuando se multiplica la entrada con una máscara de amplitud de estructura periódica. También una novedosa estrategia de encriptación, que denominamos camuflaje de criptogramas fue presentada; desarrollamos un procesador óptico virtual para tal propósito. | es_CO |
dc.description.abstract | Virtual optical processors PEVLC and PEJTC to encrypt RGB images were implemented and studied. The variance of the decryption process with the rotation of the key in Cartesian coordinates and in circular harmonic components (CHC) was studied computationally. We determined that the key in rectangular coordinates allows a tolerance of up to ± 1 ° of rotation of the key. With keys in CHC we find a tolerance of ± 60 ° of rotation, without using a mask multiplying the input image. Total variance was found when the input was multiplied with a periodic structure amplitude mask. Also a novel encryption strategy, which we call cryptogram camouflage was introduced; we developed a virtual optical processor for this purpose. | es_CO |
dc.format.extent | 84 | es_CO |
dc.format.mimetype | application/pdf | es_CO |
dc.language.iso | es | es_CO |
dc.publisher | Universidad de Pamplona – Facultad de Ciencias Básicas. | es_CO |
dc.subject | El autor no proporciona la información sobre este ítem. | es_CO |
dc.title | Procesador óptico virtual de encriptación usando llaves en armónicos circulares. | es_CO |
dc.type | http://purl.org/coar/resource_type/c_7a1f | es_CO |
dc.date.accepted | 2016-12-15 | - |
dc.relation.references | Pinzon Rueda, C.A.(2016).Procesador óptico virtual de encriptación usando llaves en armónicos circulares.Trabajo de grado Universidad de Pamplona. | es_CO |
dc.relation.references | E. A. R. Muñoz, Encriptación y Desencriptación Dinámica de Información por Medios Óptico-Digitales (tesis doctoral), Medellin: Universidad de Antioquia, 2009. | es_CO |
dc.relation.references | A. Ludia, «Implementacion de tecnicas opticas de seguridad informatica mediante el uso de medios opticos no lineales (tesis maestria, Dir. J. E. Rueda),» Universidad de Pamplona, Pamplona, 2006. | es_CO |
dc.relation.references | J. Knight, Encyclopedia of espionage, intelligence, and security, Gale Group, 2004. | es_CO |
dc.relation.references | A. B. Klimov, «información cuántica: ideas y perspectiva,» Cinvestav, enero-marzo 2008. | es_CO |
dc.relation.references | A. Ekert, «introduction to Quantum Computation,» Springer-Link, vol. 587, pp. 47-76, 26 Agosto 2002. | es_CO |
dc.relation.references | G. Z. Bahram Javidi, «Experimental demonstration of the random phase encoding technique for image encryption and security verification,» Opt. Eng, vol. 35, nº 9, pp. 2506-2512, 1996. | es_CO |
dc.relation.references | A. Salazar, J. Rueda y M. Lasprilla, «Encriptación por conjugación de fase en un BSO Utilizando,» Revista Colombiana de física, vol. 34, nº 2, 2002. | es_CO |
dc.relation.references | E. A. R. y. J. F. B. Carlos A. Ríos, «Sistemas ópticos de encriptacion de doble mascara de fase bajo arquitectura 4f,» Tecno Lógicas, pp. 77-79, Diciembre 2010. | es_CO |
dc.relation.references | M. Tebaldi, J. Barrera, N. Bolognini y R. Torroba, «Estudio de las limitaciones de los dispositivos de encriptación óptica multiple,» mayo 2013. | es_CO |
dc.relation.references | W. C. a. X. Chen, «Optical cryptography topology based on a three-dimensional particle-like distribution and diffractive imaging,» Optics Express, vol. 19, nº 10, 2011. | es_CO |
dc.relation.references | P. R. a. B. Javidi, «Optical image encryption based on input plane and Fourier plane random encoding,» Opt. Lett, vol. 20, p. 767–769, 1995. | es_CO |
dc.relation.references | Nomura y B. Javidi, «Optical encryption using a joint transform correlator architecture,» Optical Engineering, vol. 39, nº 8, p. 2031–2035, 2000. | es_CO |
dc.relation.references | X. Tan, O. Matoba, T. Shimura, K. Kuroda y B. Javidi, «Secure optical storage that uses fully phase encryption,» Applied Optics, vol. 39, nº 35, pp. 6689 - 6694, 2000. | es_CO |
dc.relation.references | B. Javidi y O. Motoba, «Encrypted optical storage with wavelength-key and random phase codes,» Applied Optics, vol. 38, nº 32, pp. 6785-6790, 1999. | es_CO |
dc.relation.references | B. Javidi y O. Motoba, «Secure three-dimensional data transmission and display,» Applied Optics, vol. 43, nº 11, pp. 2285-2291, 2004. | es_CO |
dc.relation.references | B. Javidi, N. Towghi, N. Maghzi y S. Verrall, «Error-reduction techniques and error analysis for fully phase- and amplitude-based encryption,» Applied Optics, vol. 39, nº 23, pp. 4117- 4130, 2000. | es_CO |
dc.relation.references | B. J. a. Z. L. N. Towghi, «Fully phase encrypted image processor,» J. Opt. Soc. Am. A, vol. 16, nº 8, pp. 1915-1923, 1999. | es_CO |
dc.relation.references | L.-C. L. a. C.-J. Cheng, «Optimal key mask design for optical encryption based on joint transform correlator architecture,» Optics Communications, nº 258, p. 144–154, 2006. | es_CO |
dc.relation.references | E. Tajahuerce, O. Matoba, S. Verrall y B. Javidi, «Optoelectronic information encryption with phase-shifting interferometry,» Applied Optics, vol. 39, nº 14, pp. 2313 - 2320, 2000. | es_CO |
dc.relation.references | X. Meng, L. Cai, X. Xu, X. Yang, X. Shen, G. Dong y Y. Wang, «Two-step phase-shifting interferometry and its application in image encryption,» Optics Letters, vol. 31, nº 10, pp. 1414 - 1416, 2006. | es_CO |
dc.relation.references | L. Y. B. Z. Shutian Liu *, «Optical image encryption by cascaded fractional Fourier transforms with random phase filtering,» Optics Communications, nº 187, pp. 57-63, 2001. | es_CO |
dc.relation.references | C.-L. Chen, L.-C. Lin y C.-J. Cheng, «Design and implementation of an optical joint transform encryption system using complex-encoded key mask,» Optical Engineering, vol. 47, nº 6, pp. 1-8, 2008. | es_CO |
dc.relation.references | M. N. Islam, M. S. Alam y M. A. Karim, «Optical security system employing quadrature multiplexing,» Opt. Eng., nº 47(4), abril 17 2008. | es_CO |
dc.relation.references | M. Islam, M. Karim, M. Alam y M. Asari, «Optical cryptographic system employing multiple reference-based joint transform correlation technique,» Optical Engineering, vol. 50, nº (6), 2011. | es_CO |
dc.relation.references | L. Z. N. Z. Jianhua Wu, «Image encryption based on the multiple-order discrete fractional cosine transform,» Optics Communications, nº 283, p. 1720–1725, 2010. | es_CO |
dc.relation.references | M. Tebaldi, W. D. Furlan, R. Torroba y N. Bolognini1, «Optical-data storage-readout technique based on fractal encrypting masks,» Optics Letters, vol. 34, nº 3, pp. 316-318, 2009. | es_CO |
dc.relation.references | J. F. Barrera, M. Tebaldi, D. Amaya, W. D. Furlan, J. A. Monsoriu, N. Bolognini y R. Torroba, «Multiplexing of encrypted data using fractal masks,» Optics Letters, vol. 37, nº 14, pp. 2895-2897, 2012. | es_CO |
dc.relation.references | A. S. Narendra Singh, «Optical image encryption using improper Hartley transforms and chaos,» Optik, nº 121, p. 918–925, 2010. | es_CO |
dc.relation.references | J. Barrera, M. Tebaldi, D. Amaya, W. Furlan, J. Monsoriu, N. Bolognini y R. Torroba, «Experimental multiplexing of encrypted movies using a JTC architecture,» Optics Express, vol. 20, nº 4, 2012. | es_CO |
dc.relation.references | M. Joshi, C. Shakher y K. Singh, «Image encryption using radial Hilbert transform filter bank as an additional key in the modified double random fractional Fourier encoding architecture,» Optics and Lasers in Engineering, nº 48, p. 605–615, 2010. | es_CO |
dc.relation.references | Q. Wang, Q. Guo y J. Zhou, «Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain,» Applied Optics, vol. 52, nº 36, pp. 8854-8863, 2013. | es_CO |
dc.relation.references | X. Li y D. Zhao, «Optical color image encryption with redefined fractional Hartley transform,» Optik, nº 121, p. 673–677, 2010. | es_CO |
dc.relation.references | X. Ding y G. Chen, «Optical color image encryption using position multiplexing technique based on phase truncation operation,» Optics y Laser Technology, nº 57, p. 110–118, 2014. | es_CO |
dc.relation.references | C.-H. Niu, X.-L. Wang y X.-H. Mao, «Multiple-image hiding based on interference principle,» Springer, p. 91–99, 2011. | es_CO |
dc.relation.references | C. Lin, X. Shen y W. Hu, «Information encryption and compression based on random polarization modulation in a joint transform correlator scheme under vector beam illumination,» Springer , pp. 1-7, 2015. | es_CO |
dc.relation.references | I. Muniraj, B. Kim y B.-G. Lee, «Encryption and volumetric 3D object reconstruction using multispectral computational integral imaging,» Applied Optics, vol. 53, nº 27, pp. G25-G32, 2014. | es_CO |
dc.relation.references | X. Li, C. Tang, X. Zhu, B. Li, L. Wang y X. Yan, «Image/video encryption using single shot digital holography,» Optics Communications, nº 342, p. 218–223, 2015. | es_CO |
dc.relation.references | A. Yadav, S. Vashisth, H. Singh y K. Singh, «A phase-image watermarking scheme in gyrator domain using devil's vortex Fresnel lens as a phase mask,» Optics Communications, nº 344, p. 172–180, 2015. | es_CO |
dc.relation.references | J. E. Rueda, «Encryption using circular harmonic key,» DYNA, vol. 82, nº 190, pp. 1-10, 2015. | es_CO |
dc.relation.references | W. Zamrani, E. Ahouzi, A. Lizana, J. Campo y M. Yzuel, «Optical image encryption technique based on deterministic phase masks,» Optical Engineering, vol. 55, nº 10, pp. 1-9, 2016. | es_CO |
dc.relation.references | J. W. Goodman, introduction to Fourier Optics, The McGraw hill, 1996. | es_CO |
dc.relation.references | F. M. Grilmaldi, «físico mathesis de Lumine, coloribus, et iride, aliisque annexis libri duo (Bologna("Bonomia")),» pp. 1-11, 1665. | es_CO |
dc.relation.references | V. Lugt, «Signal detection by complex spatial filtering,» IEEE transactions on Information, vol. 10, p. 139, abril 1964. | es_CO |
dc.relation.references | M. N. Islam, M. S. Alam y M. A. Karim, «Optical security system employing quadrature multiplexing,» Optical Engineering, vol. 47, nº 4, pp. 1-5, 2008. | es_CO |
dc.relation.references | Q. G. M. Huynh-Thu, «Âmbito de validade do PPSNR na avaliação da qualidade de imagem / vídeo,» Electronics Letters, vol. 44, nº 13, 2008. | es_CO |
dc.relation.references | E. W. Hansen, «Theory of circular harmonic image reconstruction,» J. Opt. Soc. Am., vol. 71, nº 3, pp. 304-308, 1981. | es_CO |
dc.relation.references | E. W. Hansen, «Circular harmonic image reconstruction: experiments,» Applied Optics, vol. 20, nº 13, pp. 2266-2274, 1981. | es_CO |
dc.relation.references | J. Hofer, «Optical reconstruction from projections via deconvolution,» Optics Communications, vol. 29, nº 1, pp. 22 - 26, 1979. | es_CO |
dc.relation.references | O. Gualdron y H. Arsenault, «Phase dirived circular harmonic filter,» Optics Communications, vol. 104, pp. 32-34, 1993. | es_CO |
dc.relation.references | C. S. W. a. J. W. Goodman, «A Technique for Optically Convolving Two Functions,» Applied Optics, vol. 5, pp. 1248-1249, 1966. | es_CO |
dc.relation.references | M. N. Islam, M. S. Alam y M. A. Karim, «Optical security system employing quadrature multiplexing,» Optica Engineering, vol. 47, nº (4), abril 17 2008. | es_CO |
dc.relation.references | J. A. V. Valencia, Métodos Optimizados de Multiplexado y Encriptación Óptico-Digital, Medellin, 2014. | es_CO |
dc.relation.references | D. Sosa, M. Tebaldi, S. Horrillo, E. Pérez-Cabré y M. Millán, «Multiplexado en color para esquemas ópticos de encriptación,» de 3ras Jornadas ITE, abril 2015. | es_CO |
dc.relation.references | O. M. a. B. Javidi, «Encrypted optical storage with angular multiplexing,» Applied Optics, vol. 38, nº 35, pp. 7288-7293, 1999. | es_CO |
dc.relation.references | H. Yuang-Neng, H. Arsenault y G. April, «Rotation-invariant digital pattern recognition using circular harmonic expansion,» Applied Optics, pp. 1-2, 15 noviembre 1982. | es_CO |
dc.relation.references | J. Wu, Z. Xie, Z. Liu, W. Liu, Y. Zhang y S. Liu, «Multiple-image encryption based on computational ghost imaging,» Elsevier, vol. 359, pp. 38-43, 2015. | es_CO |
dc.rights.accessrights | http://purl.org/coar/access_right/c_abf2 | es_CO |
dc.type.coarversion | http://purl.org/coar/resource_type/c_2df8fbb1 | es_CO |
Appears in Collections: | Física |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Pinzon_2016_TG.pdf | Pinzon_2016_TG | 5,88 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.