Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Juan M. Vilardy is active.

Publication


Featured researches published by Juan M. Vilardy.


Journal of Optics | 2013

Improved decryption quality and security of a joint transform correlator-based encryption system

Juan M. Vilardy; María S. Millán; Elisabet Pérez-Cabré

Some image encryption systems based on modified double random phase encoding and joint transform correlator architecture produce low quality decrypted images and are vulnerable to a variety of attacks. In this work, we analyse the algorithm of some reported methods that optically implement the double random phase encryption in a joint transform correlator. We show that it is possible to significantly improve the quality of the decrypted image by introducing a simple nonlinear operation in the encrypted function that contains the joint power spectrum. This nonlinearity also makes the system more resistant to chosen-plaintext attacks. We additionally explore the system resistance against this type of attack when a variety of probability density functions are used to generate the two random phase masks of the encryption–decryption process. Numerical results are presented and discussed.


Applied Optics | 2014

Nonlinear optical security system based on a joint transform correlator in the Fresnel domain

Juan M. Vilardy; María S. Millán; Elisabet Pérez-Cabré

A new optical security system for image encryption based on a nonlinear joint transform correlator (JTC) in the Fresnel domain (FrD) is proposed. The proposal of the encryption process is a lensless optical system that produces a real encrypted image and is a simplified version of some previous JTC-based encryption systems. We use a random complex mask as the key in the nonlinear system for the purpose of increasing the security of the encrypted image. In order to retrieve the primary image in the decryption process, a nonlinear operation has to be introduced in the encrypted function. The optical decryption process is implemented through the Fresnel transform and the fractional Fourier transform. The security system proposed in this paper preserves the shift-invariance property of the JTC-based encryption system in the Fourier domain, with respect to the lateral displacement of the key random mask in the decryption process. This system shows an improved resistance to chosen-plaintext and known-plaintext attacks, as they have been proposed in the cryptanalysis of the JTC encrypting system. Numerical simulations show the validity of this new optical security system.


electronics robotics and automotive mechanics conference | 2006

Digital Images Phase Encryption Using Fractional Fourier Transform

Juan M. Vilardy; Jorge E. Calderon; Cesar O. Torres; Lorenzo Mattos

In the present paper the fractional Fourier transform was used to make phase encryption of color digital images. The image to encrypt is placed as the phase of a complex exponential, then is fractionally transformed three times and multiplied in intermediate steps by two statistically independent random phase masks thus to obtain the encrypted image, to decrypt the coding image the encryption procedure is applied in the inverse sense to the conjugated complex of the encrypted image, then is taken the negative of the phase of the resulting function from the decryption process and the original image is obtained this way that had been encrypted. The use of the fractional Fourier transform and the phase encryption of the image add much more complexity to the decryption of the image to who wants decrypt it without being authorized. In the cryptographic algorithm implemented five keys are used, made up of three fractional orders and two random phase masks, all these keys are necessary for proper decryption affording reliability to image transference via transmission networks


Journal of Optics | 2014

Generalized formulation of an encryption system based on a joint transform correlator and fractional Fourier transform

Juan M. Vilardy; Yezid Torres; María S. Millán; Elisabet Pérez-Cabré

We propose a generalization of the encryption system based on double random phase encoding (DRPE) and a joint transform correlator (JTC), from the Fourier domain to the fractional Fourier domain (FrFD) by using the fractional Fourier operators, such as the fractional Fourier transform (FrFT), fractional traslation, fractional convolution and fractional correlation. Image encryption systems based on a JTC architecture in the FrFD usually produce low quality decrypted images. In this work, we present two approaches to improve the quality of the decrypted images, which are based on nonlinear processing applied to the encrypted function (that contains the joint fractional power spectrum, JFPS) and the nonzero-order JTC in the FrFD. When the two approaches are combined, the quality of the decrypted image is higher. In addition to the advantages introduced by the implementation of the DRPE using a JTC, we demonstrate that the proposed encryption system in the FrFD preserves the shift-invariance property of the JTC-based encryption system in the Fourier domain, with respect to the lateral displacement of both the key random mask in the decryption process and the retrieval of the primary image. The feasibility of this encryption system is verified and analyzed by computer simulations.


Journal of Physics: Conference Series | 2011

Image encryption using the fractional wavelet transform

Juan M. Vilardy; J Useche; Cesar O. Torres; Lorenzo Mattos

In this paper a technique for the coding of digital images is developed using Fractional Wavelet Transform (FWT) and random phase masks (RPMs). The digital image to encrypt is transformed with the FWT, after the coefficients resulting from the FWT (Approximation, Details: Horizontal, vertical and diagonal) are multiplied each one by different RPMs (statistically independent) and these latest results is applied an Inverse Wavelet Transform (IWT), obtaining the encrypted digital image. The decryption technique is the same encryption technique in reverse sense. This technique provides immediate advantages security compared to conventional techniques, in this technique the mother wavelet family and fractional orders associated with the FWT are additional keys that make access difficult to information to an unauthorized person (besides the RPMs used), thereby the level of encryption security is extraordinarily increased. In this work the mathematical support for the use of the FWT in the computational algorithm for the encryption is also developed.


8th Iberoamerican Optics Meeting and 11th Latin American Meeting on Optics, Lasers, and Applications | 2013

Double image encryption method using the Arnold transform in the fractional Hartley domain

Juan M. Vilardy; Cesar O. Torres; Carlos J. Jimenez

A new method for double image encryption based on the fractional Hartley transform (FrHT) and the Arnold transform (AT) is proposed in this work. The encryption method encodes the first input image in amplitude and the second input image is encoded in phase, in order to define a complex image. This complex image is successively four times transformed using FrHT and AT, and the resulting complex image represents the encrypted image. The decryption method is the same method as the encryption method applied in the inverse sense. The AT is a process of image shearing and stitching in which pixels of the image are rearranged. This AT is used in the encryption method with the purpose of spreading the information content of the two input images onto the encrypted image and to increase the security of the encrypted image. The fractional orders of the FrHTs and the parameters of the ATs correspond to the keys of the encryption-decryption method. Only when all of those keys are correct in the decryption method, the two original images can be recovered. We present digital results that confirm our approach.


8th Iberoamerican Optics Meeting and 11th Latin American Meeting on Optics, Lasers, and Applications | 2013

Joint transform correlator-based encryption system using the Fresnel transform and nonlinear filtering

Juan M. Vilardy; María S. Millán; Elisabet Pérez-Cabré

A new optical security system for image encryption based on a nonlinear joint transform correlator (JTC) and Fresnel transform is proposed. A lensless optical encryption system, which is a simplified version of previous JTCbased encryption systems, produces a complex distribution in the Fresnel domain, whose intensity is captured by a power-law sensor and nonlinearly modified to yield the real-valued encrypted image. The nonlinearity plays an essential role in the decryption system which, in turn, contains an optical fractional Fourier transform to retrieve the primary image. The security system proposed in this work is a novel extension of the conventional JTC-based encryption system from the Fourier domain to the Fresnel domain. Additional advantages of the proposed system are: simplification of the optical setup, alleviated alignment requirements, and an additional key (the propagation distance) that improves security. Numerical simulations verify the validity of this new optical security system.


Journal of Physics: Conference Series | 2011

Template characterization and correlation algorithm created from segmentation for the iris biometric authentication based on analysis of textures implemented on a FPGA

F J Giacometto; Juan M. Vilardy; Cesar O. Torres; Lorenzo Mattos

Among the most used biometric signals to set personal security permissions, taker increasingly importance biometric iris recognition based on their textures and images of blood vessels due to the rich in these two unique characteristics that are unique to each individual. This paper presents an implementation of an algorithm characterization and correlation of templates created for biometric authentication based on iris texture analysis programmed on a FPGA (Field Programmable Gate Array), authentication is based on processes like characterization methods based on frequency analysis of the sample, and frequency correlation to obtain the expected results of authentication.


8th Iberoamerican Optics Meeting and 11th Latin American Meeting on Optics, Lasers, and Applications | 2013

Static and dynamic amplitude modulation of light in a twisted nematic liquid crystal display

Juan M. Vilardy; María S. Millán; Elisabet Pérez-Cabré

A SLM has been experimentally characterized in terms of amplitude modulation versus the gray level distribution (input signal) electronically addressed to the pixelated display in two conditions: input constant with time, and time variant input with increasing frame rate. The SLM considered in this work was a twisted nematic liquid crystal display manufactured by CRL (XGA2 model) that operates on the transmitted light. The influence of some technical specifications such as gamma correction, brightness and contrast of this SLM have been considered as well.


Journal of Physics: Conference Series | 2011

Design and implementation of an algorithm for creating templates for the purpose of iris biometric authentication through the analysis of textures implemented on a FPGA

F J Giacometto; Juan M. Vilardy; Cesar O. Torres; Lorenzo Mattos

Currently addressing problems related to security in access control, as a consequence, have been developed applications that work under unique characteristics in individuals, such as biometric features. In the world becomes important working with biometric images such as the liveliness of the iris which are for both the pattern of retinal images as your blood vessels. This paper presents an implementation of an algorithm for creating templates for biometric authentication with ocular features for FPGA, in which the object of study is that the texture pattern of iris is unique to each individual. The authentication will be based in processes such as edge extraction methods, segmentation principle of John Daugman and Libor Maseks, and standardization to obtain necessary templates for the search of matches in a database and then get the expected results of authentication.

Collaboration


Dive into the Juan M. Vilardy's collaboration.

Top Co-Authors

Avatar

Elisabet Pérez-Cabré

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

María S. Millán

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge