Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ignasi Juvells is active.

Publication


Featured researches published by Ignasi Juvells.


Journal of Optics | 2016

Roadmap on optical security

Bahram Javidi; Artur Carnicer; Masahiro Yamaguchi; Takanori Nomura; Elisabet Pérez-Cabré; María S. Millán; Naveen K. Nishchal; Roberto Torroba; John Fredy Barrera; Wenqi He; Xiang Peng; Adrian Stern; Yair Rivenson; A Alfalou; C Brosseau; Changliang Guo; John T. Sheridan; Guohai Situ; Makoto Naruse; Tsutomu Matsumoto; Ignasi Juvells; Enrique Tajahuerce; Jesús Lancis; Wen Chen; Xudong Chen; Pepijn Willemszoon Harry Pinkse; Allard Mosk; Adam Markman

Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Perez-Cabre], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.


Journal of Optics | 2007

Design strategies for optimizing holographic optical tweezers set-ups

Estela Martín-Badosa; Mario Montes-Usategui; Arturo Carnicer; Jordi Andilla; Encarnación Pleguezuelos; Ignasi Juvells

We provide a detailed account of the construction of a system of holographic optical tweezers. While a lot of information is available on the design, alignment and calibration of other optical trapping configurations, those based on holography are relatively poorly described. Inclusion of a spatial light modulator in the set-up gives rise to particular design trade-offs and constraints, and the system benefits from specific optimization strategies, which we discuss.


Journal of Optics | 2003

Full complex Fresnel holograms displayed on liquid crystal devices

Raúl Tudela; Estela Martín-Badosa; Ignasi Labastida; Santiago Vallmitjana; Ignasi Juvells; Arturo Carnicer

We propose a method to display full complex Fresnel holograms by adding the information displayed on two analogue ferroelectric liquid crystal spatial light modulators. One of them works in real-only configuration and the other in imaginary-only mode. The Fresnel holograms are computed by backpropagating an object at a selected distance with the Fresnel transform. Then, displaying the real and imaginary parts on each panel, the object is reconstructed at that distance from the modulators by simple propagation of light. We present simulation results taking into account the specifications of the modulators as well as optical results. We have also studied the quality of reconstructions using only real, imaginary, amplitude or phase information. Although the real and imaginary reconstructions look acceptable for certain distances, full complex reconstruction is always better and is required when arbitrary distances are used.


Optics Express | 2015

Optical encryption using photon-counting polarimetric imaging

David Maluenda; Artur Carnicer; R. Martínez-Herrero; Ignasi Juvells; Bahram Javidi

We present a polarimetric-based optical encoder for image encryption and verification. A system for generating random polarized vector keys based on a Mach-Zehnder configuration combined with translucent liquid crystal displays in each path of the interferometer is developed. Polarization information of the encrypted signal is retrieved by taking advantage of the information provided by the Stokes parameters. Moreover, photon-counting model is used in the encryption process which provides data sparseness and nonlinear transformation to enhance security. An authorized user with access to the polarization keys and the optical design variables can retrieve and validate the photon-counting plain-text. Optical experimental results demonstrate the feasibility of the encryption method.


Optics Express | 2013

Reconfigurable beams with arbitrary polarization and shape distributions at a given plane

David Maluenda; Ignasi Juvells; R. Martínez-Herrero; Artur Carnicer

Methods for generating beams with arbitrary polarization based on the use of liquid crystal displays have recently attracted interest from a wide range of sources. In this paper we present a technique for generating beams with arbitrary polarization and shape distributions at a given plane using a Mach-Zehnder setup. The transverse components of the incident beam are processed independently by means of spatial light modulators placed in each path of the interferometer. The modulators display computer generated holograms designed to dynamically encode any amplitude value and polarization state for each point of the wavefront in a given plane. The steps required to design such beams are described in detail. Several beams performing different polarization and intensity landscapes have been experimentally implemented. The results obtained demonstrate the capability of the proposed technique to tailor the amplitude and polarization of the beam simultaneously.


Measurement Science and Technology | 1997

Complex modulation characterization of liquid crystal devices by interferometric data correlation

Estela Martín-Badosa; Arturo Carnicer; Ignasi Juvells; Santiago Vallmitjana

A new phase modulation spatial light modulator (SLM) characterization procedure is presented, based on the analysis of the interference fringes of a Mach - Zender interferometer arrangement, by means of correlation and Fourier transform methods. This, accompanied by an amplitude calibration technique that makes use of the same experimental set-up, gives a general measurement procedure for SLM full complex characterization. As an experimental application, two different operation curves of an Epson LCTV are determined, in order to use these configurations for an optical pattern recognition procedure: a phase-only high-efficient joint transform correlator.


Physics in Medicine and Biology | 1996

The influence of a relaxation parameter on SPECT iterative reconstruction algorithms

Domènec Ros; Carles Falcon; Ignasi Juvells; Javier Pavía

Algebraic reconstruction techniques (ARTs) have been intensively studied in image reconstruction. However, reconstructed images often exhibit a characteristic noise when applied to emission tomography. In this work, we study the influence of the ART relaxation parameter and identify values of that parameter which yield smooth images and good convergence. The study includes both simulated and real single photon emission computed tomographic (SPECT) data. In the simulated studies, scattering, attenuation, noise and detector response were included. Relaxation factors ranging between 0.01 and 0.35 were considered. Total counts in projections were between 2.5 x 10(5) and 10(6) in one slice. The goodness of the reconstructions was assessed by using the correlation coefficient between the pattern and the actual reconstruction (CC), the background coefficient of variation (CV), the contrast (CON) and the signal-to-noise ratio (SNR). The results show that values for the relaxation factor and number of interations close to 0.1 and 8, respectively, yield reconstructed images in which CC, CV, CON and SNR have well balanced values and CC, CV and SNR are very close to the extremal. An increase in either the number of iterations or in the relaxation factor results in a rise of CON but the other three FOMs deteriorate. The results from the real phantom, which are in agreement with those of the simulated studies, validate the simulation method and demonstrate the influence of the relaxation parameter.


Optics Communications | 2002

A simple method for displaying Fresnel holograms on liquid crystal panels

Raúl Tudela; Ignasi Labastida; Estela Martín-Badosa; Santiago Vallmitjana; Ignasi Juvells; Arturo Carnicer

In this paper we present a method for reconstructing Fresnel holograms using two liquid crystal devices, one to display the amplitude information and the other to display the phase. The theoretical approach has been adapted to real configurations of VGA panels removed from a commercial video projector. The optical setup is based on the projection of the phase plane into the amplitude plane by means of an imaging lens. Simulated and experimental results are presented.


Optics Express | 2014

Synthesis of highly focused fields with circular polarization at any transverse plane

David Maluenda; R. Martínez-Herrero; Ignasi Juvells; Artur Carnicer

We develop a method for generating focused vector beams with circular polarization at any transverse plane. Based on the Richards-Wolf vector model, we derive analytical expressions to describe the propagation of these set of beams near the focal area. Since the polarization and the amplitude of the input beam are not uniform, an interferometric system capable of generating spatially-variant polarized beams has to be used. In particular, this wavefront is manipulated by means of spatial light modulators displaying computer generated holograms and subsequently focused using a high numerical aperture objective lens. Experimental results using a NA = 0.85 system are provided: irradiance and Stokes images of the focused field at different planes near the focal plane are presented and compared with those obtained by numerical simulation.


Optics Letters | 2013

On the physical realizability of highly focused electromagnetic field distributions

R. Martínez-Herrero; Ignasi Juvells; Artur Carnicer

A method to evaluate the physical realizability of an arbitrary three-dimensional vectorial field distribution in the focal area is proposed. A parameter that measures the similarity between the designed (target) field and the physically achievable beam is provided. This analysis is carried out within the framework of the closest electromagnetic field to a given vectorial function, and the procedure is applied to two illustrative cases.

Collaboration


Dive into the Ignasi Juvells's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

R. Martínez-Herrero

Complutense University of Madrid

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Juan Campos

Autonomous University of Barcelona

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Domènec Ros

University of Barcelona

View shared research outputs
Top Co-Authors

Avatar

P. M. Mejías

Complutense University of Madrid

View shared research outputs
Researchain Logo
Decentralizing Knowledge