scispace - formally typeset
Search or ask a question
Author

John T. Sheridan

Bio: John T. Sheridan is an academic researcher from University College Dublin. The author has contributed to research in topics: Holography & Fourier transform. The author has an hindex of 46, co-authored 434 publications receiving 8435 citations. Previous affiliations of John T. Sheridan include University of Alicante & Science Foundation Ireland.


Papers
More filters
Journal ArticleDOI
TL;DR: A new technique based on a random shifting, or jigsaw, algorithm is proposed, which does not require the use of phase keys for decrypting data and shows comparable or superior robustness to blind decryption.
Abstract: A number of methods have recently been proposed in the literature for the encryption of two-dimensional information by use of optical systems based on the fractional Fourier transform. Typically, these methods require random phase screen keys for decrypting the data, which must be stored at the receiver and must be carefully aligned with the received encrypted data. A new technique based on a random shifting, or jigsaw, algorithm is proposed. This method does not require the use of phase keys. The image is encrypted by juxtaposition of sections of the image in fractional Fourier domains. The new method has been compared with existing methods and shows comparable or superior robustness to blind decryption. Optical implementation is discussed, and the sensitivity of the various encryption keys to blind decryption is examined.

434 citations

Journal ArticleDOI
TL;DR: An overview of the potential, recent advances, and challenges of optical security and encryption using free space optics is presented, highlighting the need for more specialized hardware and image processing algorithms.
Abstract: Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Perez-Cabre], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.

317 citations

Journal ArticleDOI
TL;DR: This overview allows the numerical simulations of the corresponding optical encryption systems, and the extra degree of freedom (keys) provided by different techniques that enhance the optical encryption security, to be generally appreciated and briefly compared and contrasted.
Abstract: In this paper we review a number of optical image encryption techniques proposed in the literature inspired by the architecture of the classic optical Double Random Phase Encoding (DRPE) system. The optical DRPE method and its numerical simulation algorithm are first investigated in relation to the sampling considerations at various stages of the system according to the spreading of the input signal in both the space and spatial frequency domains. Then the several well-known optically inspired encryption techniques are examined and categorized into all optical techniques and image scrambling techniques. Each method is numerically implemented and compared with the optical DRPE scheme, in which random phase diffusers (masks) are applied after different transformations. The optical system used for each method is first illustrated and the corresponding unitary numerical algorithm implementation is then investigated in order to retain the properties of the optical counterpart. The simulation results for the sensitivities of the various encryption keys are presented and the robustness of each method is examined. This overview allows the numerical simulations of the corresponding optical encryption systems, and the extra degree of freedom (keys) provided by different techniques that enhance the optical encryption security, to be generally appreciated and briefly compared and contrasted.

265 citations

Journal ArticleDOI
TL;DR: In this article, the standard one-dimensional diffusion equation is extended to include nonlocal temporal and spatial medium responses, and the resulting nonlocal diffusion equation was then solved numerically, in low-harmonic approximation, to describe grating formation.
Abstract: The standard one-dimensional diffusion equation is extended to include nonlocal temporal and spatial medium responses. How such nonlocal effects arise in a photopolymer is discussed. It is argued that assuming rapid polymer chain growth, any nonlocal temporal response can be dealt with so that the response can be completely understood in terms of a steady-state nonlocal spatial response. The resulting nonlocal diffusion equation is then solved numerically, in low-harmonic approximation, to describe grating formation. The effects of the diffusion rate, the rate of polymerization, and a new parameter, the nonlocal response length, are examined by using the predictions of the model. By applying the two-wave coupled-wave model, assuming a linear relationship between polymerized concentration and index modulation, the resulting variation of the grating diffraction efficiency is examined.

254 citations

Journal ArticleDOI
01 Jan 2001-Optik
TL;DR: In this article, the authors proposed a non-local material response model that predicts that the spatial frequency response might be improved by decreasing the mean polymer chain lengths and/or by increasing the mobility of the molecules used in the material.

215 citations


Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

Journal Article
J. Walkup1
TL;DR: Development of this more comprehensive model of the behavior of light draws upon the use of tools traditionally available to the electrical engineer, such as linear system theory and the theory of stochastic processes.
Abstract: Course Description This is an advanced course in which we explore the field of Statistical Optics. Topics covered include such subjects as the statistical properties of natural (thermal) and laser light, spatial and temporal coherence, effects of partial coherence on optical imaging instruments, effects on imaging due to randomly inhomogeneous media, and a statistical treatment of the detection of light. Development of this more comprehensive model of the behavior of light draws upon the use of tools traditionally available to the electrical engineer, such as linear system theory and the theory of stochastic processes.

1,364 citations

Journal Article
TL;DR: In this article, a self-scanned 1024 element photodiode array and a minicomputer are used to measure the phase (wavefront) in the interference pattern of an interferometer to lambda/100.
Abstract: A self-scanned 1024 element photodiode array and minicomputer are used to measure the phase (wavefront) in the interference pattern of an interferometer to lambda/100. The photodiode array samples intensities over a 32 x 32 matrix in the interference pattern as the length of the reference arm is varied piezoelectrically. Using these data the minicomputer synchronously detects the phase at each of the 1024 points by a Fourier series method and displays the wavefront in contour and perspective plot on a storage oscilloscope in less than 1 min (Bruning et al. Paper WE16, OSA Annual Meeting, Oct. 1972). The array of intensities is sampled and averaged many times in a random fashion so that the effects of air turbulence, vibrations, and thermal drifts are minimized. Very significant is the fact that wavefront errors in the interferometer are easily determined and may be automatically subtracted from current or subsequent wavefrots. Various programs supporting the measurement system include software for determining the aperture boundary, sum and difference of wavefronts, removal or insertion of tilt and focus errors, and routines for spatial manipulation of wavefronts. FFT programs transform wavefront data into point spread function and modulus and phase of the optical transfer function of lenses. Display programs plot these functions in contour and perspective. The system has been designed to optimize the collection of data to give higher than usual accuracy in measuring the individual elements and final performance of assembled diffraction limited optical systems, and furthermore, the short loop time of a few minutes makes the system an attractive alternative to constraints imposed by test glasses in the optical shop.

1,300 citations

Journal ArticleDOI
TL;DR: The last volume of the Progress in Optics series as discussed by the authors contains seven chapters on widely diverging topics, written by well-known authorities in their fields, including laser selective photophysics and photochemistry, laser phase profile generation, laser beamforming, and laser laser light emission from high-current surface spark discharges.
Abstract: Have you ever felt that the very title, Progress in Optics, conjured an image in your mind? Don’t you see a row of handsomely printed books, bearing the editorial stamp of one of the most brilliant members of the optics community, and chronicling the field of optics since the invention of the laser? If so, you are certain to move the bookend to make room for Volume 16, the latest of this series. It contains seven chapters on widely diverging topics, written by well-known authorities in their fields. These are: 1) Laser Selective Photophysics and Photochemistry by V. S. Letokhov, 2) Recent Advances in Phase Profiles (sic) Generation by J. J. Clair and C. I. Abitbol, 3 ) Computer-Generated Holograms: Techniques and Applications by W.-H. Lee, 4) Speckle Interferometry by A. E. Ennos, 5 ) Deformation Invariant, Space-Variant Optical Pattern Recognition by D. Casasent and D. Psaltis, 6) Light Emission from High-Current Surface-Spark Discharges by R. E. Beverly, and 7) Semiclassical Radiation Theory within a QuantumMechanical Framework by I. R. Senitzkt. The breadth of topic matter spanned by these chapters makes it impossible, for this reviewer at least, to pass judgement on the comprehensiveness, relevance, and completeness of every chapter. With an editorial board as prominent as that of Progress in Optics, however, it seems hardly likely that such comments should be necessary. It should certainly be possible to take the authority of each author as credible. The only remaining judgment to be made on these chapters is their readability. In short, what are they like to read? The first sentence of the first chapter greets the eye with an obvious typographical error: “The creation of coherent laser light source, that have tunable radiation, opened the . . . .” Two pages later we find: “When two types of atoms or molecules of different isotopic composition ( A and B ) have even one spectral line that does not overlap with others, it is pos-

1,071 citations