Artur Carnicer
University of Barcelona
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Artur Carnicer.
Journal of Optics | 2016
Bahram Javidi; Artur Carnicer; Masahiro Yamaguchi; Takanori Nomura; Elisabet Pérez-Cabré; María S. Millán; Naveen K. Nishchal; Roberto Torroba; John Fredy Barrera; Wenqi He; Xiang Peng; Adrian Stern; Yair Rivenson; A Alfalou; C Brosseau; Changliang Guo; John T. Sheridan; Guohai Situ; Makoto Naruse; Tsutomu Matsumoto; Ignasi Juvells; Enrique Tajahuerce; Jesús Lancis; Wen Chen; Xudong Chen; Pepijn Willemszoon Harry Pinkse; Allard Mosk; Adam Markman
Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Perez-Cabre], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.
Optics Express | 2015
David Maluenda; Artur Carnicer; R. Martínez-Herrero; Ignasi Juvells; Bahram Javidi
We present a polarimetric-based optical encoder for image encryption and verification. A system for generating random polarized vector keys based on a Mach-Zehnder configuration combined with translucent liquid crystal displays in each path of the interferometer is developed. Polarization information of the encrypted signal is retrieved by taking advantage of the information provided by the Stokes parameters. Moreover, photon-counting model is used in the encryption process which provides data sparseness and nonlinear transformation to enhance security. An authorized user with access to the polarization keys and the optical design variables can retrieve and validate the photon-counting plain-text. Optical experimental results demonstrate the feasibility of the encryption method.
Optics Express | 2013
David Maluenda; Ignasi Juvells; R. Martínez-Herrero; Artur Carnicer
Methods for generating beams with arbitrary polarization based on the use of liquid crystal displays have recently attracted interest from a wide range of sources. In this paper we present a technique for generating beams with arbitrary polarization and shape distributions at a given plane using a Mach-Zehnder setup. The transverse components of the incident beam are processed independently by means of spatial light modulators placed in each path of the interferometer. The modulators display computer generated holograms designed to dynamically encode any amplitude value and polarization state for each point of the wavefront in a given plane. The steps required to design such beams are described in detail. Several beams performing different polarization and intensity landscapes have been experimentally implemented. The results obtained demonstrate the capability of the proposed technique to tailor the amplitude and polarization of the beam simultaneously.
Optics Letters | 2015
Artur Carnicer; Amir Hassanfiroozi; Pedro Latorre-Carmona; Yi-Pai Huang; Bahram Javidi
Phase-encoded nanostructures such as quick response (QR) codes made of metallic nanoparticles are suggested to be used in security and authentication applications. We present a polarimetric optical method able to authenticate random phase-encoded QR codes. The system is illuminated using polarized light, and the QR code is encoded using a phase-only random mask. Using classification algorithms, it is possible to validate the QR code from the examination of the polarimetric signature of the speckle pattern. We used Kolmogorov-Smirnov statistical test and Support Vector Machine algorithms to authenticate the phase-encoded QR codes using polarimetric signatures.
Optics Express | 2014
David Maluenda; R. Martínez-Herrero; Ignasi Juvells; Artur Carnicer
We develop a method for generating focused vector beams with circular polarization at any transverse plane. Based on the Richards-Wolf vector model, we derive analytical expressions to describe the propagation of these set of beams near the focal area. Since the polarization and the amplitude of the input beam are not uniform, an interferometric system capable of generating spatially-variant polarized beams has to be used. In particular, this wavefront is manipulated by means of spatial light modulators displaying computer generated holograms and subsequently focused using a high numerical aperture objective lens. Experimental results using a NA = 0.85 system are provided: irradiance and Stokes images of the focused field at different planes near the focal plane are presented and compared with those obtained by numerical simulation.
Optics Letters | 2013
R. Martínez-Herrero; Ignasi Juvells; Artur Carnicer
A method to evaluate the physical realizability of an arbitrary three-dimensional vectorial field distribution in the focal area is proposed. A parameter that measures the similarity between the designed (target) field and the physically achievable beam is provided. This analysis is carried out within the framework of the closest electromagnetic field to a given vectorial function, and the procedure is applied to two illustrative cases.
Optics Express | 2016
Artur Carnicer; Ignasi Juvells; Bahram Javidi; R. Martínez-Herrero
We develop a method for encoding information in the longitudinal component of a focused field. Focused beams display a non-zero contribution of the electric field in the direction of propagation. However, the associated irradiance is very weak and difficult to isolate from the transverse part of the beam. For these reasons, the longitudinal component of a focused field could be a good choice for encoding and securing information. Using the Richards and Wolf formalism we show how to encrypt information in the longitudinal domain of the focal area. In addition, we use quantum imaging techniques to enhance the security and to prevent unauthorized access to the information. To the best of our knowledge, this is the first report on using the longitudinal component of the focused fields in optical security.
Optics Express | 2015
Artur Carnicer; Bahram Javidi
We develop a method for obtaining 3D polarimetric integral images from elemental images recorded in low light illumination conditions. Since photon-counting images are very sparse, calculation of the Stokes parameters and the degree of polarization should be handled carefully. In our approach, polarimetric 3D integral images are generated using the Maximum Likelihood Estimation and subsequently reconstructed by means of a Total Variation Denoising filter. In this way, polarimetric results are comparable to those obtained in conventional illumination conditions. We also show that polarimetric information retrieved from photon starved images can be used in 3D object recognition problems. To the best of our knowledge, this is the first report on 3D polarimetric photon counting integral imaging.
Journal of The Optical Society of America A-optics Image Science and Vision | 2016
Adam Markman; Artur Carnicer; Bahram Javidi
An object with a unique three-dimensional (3D) optical phase mask attached is analyzed for security and authentication. These 3D optical phase masks are more difficult to duplicate or to have a mathematical formulation compared with 2D masks and thus have improved security capabilities. A quick response code was modulated using a random 3D optical phase mask generating a 3D optical phase code (OPC). Due to the scattering of light through the 3D OPC, a unique speckle pattern based on the materials and structure in the 3D optical phase mask is generated and recorded on a CCD device. Feature extraction is performed by calculating the mean, variance, skewness, kurtosis, and entropy for each recorded speckle pattern. The random forest classifier is used for authentication. Optical experiments demonstrate the feasibility of the authentication scheme.
Optics Letters | 2015
Artur Carnicer; Oriol Arteaga; E. Pascual; A. Canillas; Santiago Vallmitjana; Bahram Javidi; E. Bertran
This Letter reports the production and optical polarimetric verification of codes based on thin-film technology for security applications. Because thin-film structures display distinctive polarization signatures, this data is used to authenticate the message encoded. Samples are analyzed using an imaging ellipsometer able to measure the 16 components of the Mueller matrix. As a result, the behavior of the thin film under polarized light becomes completely characterized. This information is utilized to distinguish among true and false codes by means of correlation. Without the imaging optics the components of the Mueller matrix become noise-like distributions and, consequently, the message encoded is no longer available. Then, a set of Stokes vectors are generated numerically for any polarization state of the illuminating beam and thus, machine learning techniques can be used to perform classification. We show that successful authentication is possible using the k-nearest neighbors algorithm in thin-films codes that have been anisotropically phase-encoded with pseudorandom phase code.