Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John Fredy Barrera is active.

Publication


Featured researches published by John Fredy Barrera.


Optics Letters | 2010

Known-plaintext attack on a joint transform correlator encrypting system

John Fredy Barrera; Carlos Vargas; Myrian Tebaldi; Roberto Torroba; Néstor Bolognini

We demonstrate in this Letter that a joint transform correlator shows vulnerability to known-plaintext attacks. An unauthorized user, who intercepts both an object and its encrypted version, can obtain the security key code mask. In this contribution, we conduct a hybrid heuristic attack scheme merge to a Gerchberg-Saxton routine to estimate the encrypting key to decode different ciphertexts encrypted with that same key. We also analyze the success of this attack for different pairs of plaintext-ciphertext used to get the encrypting code. We present simulation results for the decrypting procedure to demonstrate the validity of our analysis.


Optics Express | 2011

All-optical encrypted movie

Fabian Mosso; John Fredy Barrera; Myrian Tebaldi; Néstor Bolognini; Roberto Torroba

We introduce for the first time the concept of an all-optical encrypted movie. This movie joints several encrypted frames corresponding to a time evolving situation employing the same encoding mask. Thanks to a multiplexing operation we compact the encrypted movie information into a single package. But the decryption of this single package implies the existence of cross-talk if we do not adequately pre-process the encoded information before multiplexing. In this regard, we introduce a grating modulation to each encoded image, and then we proceed to multiplexing. After appropriate filtering and synchronizing procedures applied to the multiplexing, we are able to decrypt and to reproduce the movie. This movie is only properly decoded when in possession of the right decoding key. The concept development is carried-out in virtual optical systems, both for the encrypting and the filtering-decrypting stages. Experimental results are shown to confirm our approach.


Optics Express | 2012

Experimental multiplexing of encrypted movies using a JTC architecture

John Fredy Barrera; Myrian Tebaldi; Carlos Eduardo Castaño Ríos; Edgar Rueda; Néstor Bolognini; Roberto Torroba

We present the first experimental technique to encrypt a movie under a joint transform correlator architecture. We also extend the method to multiplex several movies in a single package. We use a Mach-Zehnder interferometer to encrypt experimentally each movie. One arm of the interferometer is the joint transform correlator and the other arm is the reference wave. We include the complete description of the procedure along with experimental results supporting the proposal.


Optics Express | 2011

Pure optical dynamical color encryption

Fabian Mosso; Myrian Tebaldi; John Fredy Barrera; Néstor Bolognini; Roberto Torroba

We introduce a way to encrypt-decrypt a color dynamical phenomenon using a pure optical alternative. We split the three basic chromatic channels composing the input, and then each channel is processed through a 4f encoding method and a theta modulation applied to the each encrypted frame in every channel. All frames for a single channel are multiplexed. The same phase mask is used to encode all the information. Unlike the usual procedure we do not multiplex the three chromatic channels into a single encoding media, because we want to decrypt the information in real time. Then, we send to the decoding station the phase mask and the three packages each one containing the multiplexing of a single channel. The end user synchronizes and decodes the information contained in the separate channels. Finally, the decoding information is conveyed together to bring the decoded dynamical color phenomenon in real-time. We present material that supports our concepts.


Optics Letters | 2010

Noise-free recovery of optodigital encrypted and multiplexed images.

Rodrigo Henao; Edgar Rueda; John Fredy Barrera; Roberto Torroba

We present a method that allows storing multiple encrypted data using digital holography and a joint transform correlator architecture with a controllable angle reference wave. In this method, the information is multiplexed by using a key and a different reference wave angle for each object. In the recovering process, the use of different reference wave angles prevents noise produced by the nonrecovered objects from being superimposed on the recovered object; moreover, the position of the recovered object in the exit plane can be fully controlled. We present the theoretical analysis and the experimental results that show the potential and applicability of the method.


Optics Letters | 2012

Multiplexing of encrypted data using fractal masks

John Fredy Barrera; Myrian Tebaldi; Dafne Amaya; Walter D. Furlan; Juan A. Monsoriu; Néstor Bolognini; Roberto Torroba

In this Letter, we present to the best of our knowledge a new all-optical technique for multiple-image encryption and multiplexing, based on fractal encrypting masks. The optical architecture is a joint transform correlator. The multiplexed encrypted data are stored in a photorefractive crystal. The fractal parameters of the key can be easily tuned to lead to a multiplexing operation without cross talk effects. Experimental results that support the potential of the method are presented.


Optical Engineering | 2009

Lateral shift multiplexing with a modified random mask in a joint transform correlator encrypting architecture

Edgar Rueda; John Fredy Barrera; Rodrigo Henao; Roberto Torroba; Unidad de Investigación; Facultad Ingeniería

The joint transform correlator JTC is a classical optical ar- chitecture, recently associated with interesting applications in optical se- curity. In addition, multiplexing is a tactic associated with optical encrypt- ing mechanisms that provide security for multiple users. However, experimental constraints arise when we intend to reproduce a diffuser shifting multiplexing option. This is due to the invariance to lateral shifts under a JTC setup. To overcome this problem, we propose a setup modi- fication that allows its use under a multiplexing approach. Instead of placing the encrypting mask in contact with the input JTC plane, we use the actual optical Fourier transform of a diffuser projected over the en- trance plane of the JTC. We present a theoretical explanation, along with computer simulations and experimental results, that support our proposal.


Applied Optics | 2012

Master key generation to avoid the use of an external reference wave in an experimental JTC encrypting architecture

Edgar Rueda; Carlos Eduardo Castaño Ríos; John Fredy Barrera; Roberto Torroba

In experimental optodigital encrypting architectures, the use of a reference wave is essential. In this contribution, we present an experimental alternative to avoid the reference wave during the encrypting procedure in a joint transform correlator architecture by introducing the concept of a master key. Besides, the master key represents an additional security element for the entire protocol. In our method, the master key is holographically processed and used during the encryption process with the encrypting key. We give the mathematical description for the process in case of a single input object and then we extend it to multiple input objects. We present the experimental demonstration of the proposed method including two examples where this technique is successfully applied for several input objects.


Journal of Optics | 2013

Experimental multiplexing protocol to encrypt messages of any length

John Fredy Barrera; Alejandro Ramírez Vélez; Roberto Torroba

As optical systems are diffraction limited, it is not possible to encrypt in a single step texts containing a large amount of characters. We overcome this situation by separately encrypting several characters, along with a multiplexing procedure to obtain an encrypted keyboard. The experimental application is performed in a joint transform correlator architecture and using digital holography. We combine the different characters into a keyboard encrypted with a single phase mask together with a selection-position key that gives the right sequence to recover safe encrypted messages. The multiplexing operation we suggest is advantageous in the sense that the technique enables processing of messages that otherwise the optical system could not process in a single step. We also employ a repositioning technique to prevent both the natural background noise over recovered characters and the possible cross talk. The lack of any single key avoids the correct message recovery. Experimental results are presented to show the feasibility of our proposal, representing an actual application of the optical encrypting protocols.


Journal of Optics | 2013

Experimental protocol for packaging and encrypting multiple data

John Fredy Barrera; Sorayda Trejos; Myrian Tebaldi; Roberto Torroba

We present a novel single optical packaging and encryption (SOPE) procedure for multiple inputs. This procedure is based on a merging of a 2f scheme with a digital holographic technique to achieve efficient handling of multiple data. Through the 2f system with a random phase mask attached in its input plane, and the holographic technique, we obtain each processed input. A posteriori filtering and repositioning protocol on each hologram followed by an addition of all processed data, allows storing these data to form a single package. The final package is digitally multiplied by a second random phase mask acting as an encryption mask. In this way, the final user receives only one encrypted information unit and a single key, instead of a conventional multiple-image collecting method and several keys. Processing of individual images is cast into an optimization problem. The proposed optimization aims to simplify the handling and recovery of images while packing all of them into a single unit. The decoding process does not have the usual cross-talk or noise problems involved in other methods, as filtering and repositioning precedes the encryption step. All data are recovered in just one step at the same time by applying a simple Fourier transform operation and the decoding key. The proposed protocol takes advantage of optical processing and the versatility of the digital format. Experiments have been conducted using a Mach–Zehnder interferometer. An application is subsequently demonstrated to illustrate the feasibility of the SOPE procedure.

Collaboration


Dive into the John Fredy Barrera's collaboration.

Top Co-Authors

Avatar

Roberto Torroba

National University of La Plata

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Myrian Tebaldi

National University of La Plata

View shared research outputs
Top Co-Authors

Avatar

Néstor Bolognini

National University of La Plata

View shared research outputs
Top Co-Authors

Avatar

Edgar Rueda

University of Antioquia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Andrzej Kolodziejczyk

Warsaw University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Fabian Mosso

National University of La Plata

View shared research outputs
Researchain Logo
Decentralizing Knowledge