Optical Data Security
Optical Data Security
ABSTRACT
CAS Puthuppally 1
Seminar Report 2004 Optical Data Security
TABLE OF CONTENTS
Acknowledgement……………………………………………………………………………(i)
Abstract……………………………………………………………………………………… 1
Table of contents……………………………………………………………………………. 2
1.Introduction………………………………………………………………………………… 3
2.Optial data storage principle. ……………………………………………………………… 5
3.Basic components …………………………………………………………………………. 6
3.1.LASER…………………………………………………………………………… 7
3.2.Lens and Mirrors………………………………………………………………… .7
3.2.1.Lens as Fourier transform……………………………………………… 8
3.3.Spatial light modulators………………………………………………………….. 9
3.4.Photosensitive materials………………………………………………………….10
3.4.1.Photorefractive crystals………………………………………………...10
3.4.2.Photopolymers………………………………………………………… 11
3.5.Charge coupled devices………………………………………………………… .12
3.6.Phase masks for encryption…………………………………………………… 13
4.Recording and reading of data …………………………………………………………… 15
4.1.Optical recording of data ……………………………………………………… 15
4.2.Optical reading of data ………………………………………………………… 16
5.Encryption techniques……………………………………………………………………. 16
5.1.Encryption using double random phase masks………………………………... 17
5.2.Encryption using 3-d keys in the Fresnel domain…………………………… 23
5.3.Encryption using wavelength code and random phase masks…………………. 25
6.Applications……………………………………………………………………………… 27
6.1.Applications in ultra short communications…………………………………… 27
6.2.Applications in optical drive …………………………………………………… 28
7.Conclusions………………………………………………………………………………... 29
8.References………………………………………………………………………………… 30
CAS Puthuppally 2
Seminar Report 2004 Optical Data Security
1. INTRODUCTION
As processors and buses roughly double their data capacity every three years (Moore’s
law), data storage has struggled to close the gap. CPUs can perform an instruction execution
every nanosecond, which is six orders of magnitude faster than a single magnetic disk access.
As the computer evolves, so do the applications that computers are used for. Recently large
binary files containing sound or image data have become commonplace, greatly increasing the
need for high capacity data storage and data access. A new high capacity form of data storage
must be developed to handle these large files quickly and efficiently.
CAS Puthuppally 3
Seminar Report 2004 Optical Data Security
Optical memory uses the basic principles of holography for the recording purposes and hence it
is also called as holographic memory system. Optical memory is a promising technology for
data storage because it is true three dimensional storage system, data can be accessed an entire
page at a time instead of sequentially, and there are very few moving parts so that the
limitations of mechanical motion are minimized. Optical memory uses a photosensitive material
to record interference patterns of a reference beam and a signal beam of coherent light, where
the signal beam is reflected off of an object or it contains data in the form of light and dark
areas. The nature of the photosensitive material is such that the recorded interference pattern
can be reproduced by applying a beam of light to the material that is identical to the reference
beam. The resulting light that is transmitted through the medium will take on the recorded
interference pattern and will be collected on a laser detector array that encompasses the entire
surface of the holographic medium. Many holograms can be recorded in the same space by
changing the angle or the wavelength of the incident light. An entire page of data is accessed in
this way.
Currently, optical memory techniques are very close to becoming technologically and
economically feasible. The major obstacles to implementing optical data storage are recording
rate, pixel sizes, laser output power, degradation of holograms during access, temporal decay of
holograms, and sensitivity of recording materials. At an estimated cost of between $161and
$236 for a complete optical memory system, this may become a feasible alternative to magnetic
disk in the near future.
CAS Puthuppally 4
Seminar Report 2004 Optical Data Security
The basic principle of optical data storage is that of holography. Holography was invented by
Deni Gabour in 1948.Holographic method was a two step coherent image forming process in
which a record is made of the interference pattern produced by the interaction of the waves
diffracted by the object and a coherent background or a reference wave. When this hologram is
illuminated, the original wave front is reconstructed. Hence we get an image of the original
diffracting object as a real 3 dimensional object.
CAS Puthuppally 5
Seminar Report 2004 Optical Data Security
When two light beams one from the object whose image is to be recorded and the other being a
reference beam, interference in space then form an interference pattern of alternate bright and
dark fringes as shown in the diagram. Now if a photosensitive material or medium is placed at
the position of the interference then these interference patterns are recorded on the material in
the form of change in refractive index or the absorption property. Now, in order to regenerate
the original beam i.e. the source beam from the object, the reference beam alone is
Made to be incident on the photosensitive material. The material in turn diffracts this beam
inside its structure so as to replicate the original beam. This is the basic principle used to record
and read data in the case of optical storage system.
CAS Puthuppally 6
Seminar Report 2004 Optical Data Security
3.Basic Components
Optical data storage system requires certain important materials for its data storage and retrieval
processes. The important components required for the optical data storage are:
1.LASER
2.Lens and Mirrors
3.Spatial Light Modulators (SLM)
4.Photosensitive materials
4.1.Photorefractive crystals
4.2.Photopolymers
5.Charge Coupled Devices (CCD)
6.Phase masks for encryption
3.1. LASER
CAS Puthuppally 7
Seminar Report 2004 Optical Data Security
Mirrors are used to reflect laser beams to the desired direction. Lenses are
usually used to converge the laser to a point. A special type of lens is used in the case of optical
recording called the Fourier lens. The lens has the property of obtaining the Fourier transform
and the inverse transform system is described below.
CAS Puthuppally 8
Seminar Report 2004 Optical Data Security
CAS Puthuppally 9
Seminar Report 2004 Optical Data Security
is difficult to adapt into alternative kinds of filters and so is not very versatile .The aperture of
the lens limits the resolution of the Fourier transform. The second lens forms the inverse
transform and recovers the original signal.
If the input signal is a sinusoidal grating, figure2, there will be two spots
either side of the central DC component. The two spots correspond to the spatial frequency
content of the input signal. The radial distance between these spots and the DC term represents
the spatial frequency of the input signal. Ther3e will be a row of spots in the transform plane of
the square wave bar grating, indicating the presence of harmonics of the fundamental frequency.
SLM is an optical device that is used to convert the real image or data into a
single beam of light that will intersect with the reference beam during recording. It basically
consists of an array of pixels which are usually microscopic shutters or LCD displays. These
can be controlled by a computer. The computer sends binary data to the SLM. Each pixel of the
SLM corresponds to bit of data. So depending on whether the bit is a 1 or a 0 the pixel will go
dark or transparent in the case of a LCD, or will be open or shut in the case of microscopic
shutters.
3.4.Photosensitive materials
CAS Puthuppally 10
Seminar Report 2004 Optical Data Security
3.4.1.Photorefractive crystals
There are two main classes of materials used for the holographic storage medium. These
are photo refractive crystals and photo polymers. The recording medium usually used is a photo
refractive crystal such as LiNbO3 or BaTiO3 that has certain optical characteristics.
These characteristics include high diffraction efficiency, high resolution, permanent storage
until erasure, and fast erasure on the application of external stimulus such as UV light. One
characteristic of the recording medium that limit the usefulness of holographic storage is the
property that every time the crystal is read with the reference beam the stored hologram at that
location is disturbed by the reference beam and some of the data integrity is lost. With current
technology, recorded holograms in Fe-and Tb-doped LiNbO3 that use UV light to activate the
Tb atoms can be preserved without significant decay for two years.
The most commonly used photo refractive crystals used are LiNbO3 and
BaTiO3.During hologram recording, the refractive index of the crystal is changed by migration
of electron charge in responds to imprinted three-dimensional interference pattern of the
reference and signal beams. In a photo refractive crystal, illumination with a sufficient
wavelength content excites the electrons in the conduction band from the donor level between
the valence band and conduction band. The donor level is created by impurity ions or defects.
The photo-excited electrons can move in the crystal by the diffusion, the drift, and the
photovoltaic effect and then get trapped in the ionized donors. At the steady state, the space
charge density is proportional to the interference pattern in the diffusion-dominant region. This
space charge density creates the space charge field that can cause the refractive index change
via the electro optic effect. The created refractive index distribution is proportional to the
interference pattern and can be stored for along time (more than two months) in the dark in
LiNbO3 crystal. As more and more holograms are superimposed into the crystal, the more
decay of the holograms occurs due to the interference from the superimposed holograms. Also
holograms are degraded every time they are read out because the reference beam used to read
out the hologram alters the refractive nature of the crystal in that region. Photo refractive
crystals are suitable for random access memory with periodic refreshing of data, and can be
erased and written to many times.
3.4.2. Photopolymers
Photopolymers have been developed that can also be used as a holographic storage
medium. Typically the thickness of the photopolymers is much less than the thickness of photo
refractive crystals because the photopolymers are limited by mechanical stability and optical
quality. An example of a photopolymer is DuPont’s HRF-150.This film can achieve12bits/ μm2
with a 100 m thickness, which is greater than DVD-ROM by a factor of two. When a hologram
is recorded, the interference pattern is imprinted into the photopolymer by inducing
photochemical changes in the film.The refractive index modulation is changed by changing the
density of exposed areas of the film. Stored holograms are permanent and do not degrade over
time or by read out of the hologram, so photopolymers are suited for read only memory (ROM).
Photopolymers are systems of organic molecules that rely on photo-initiated polymerization to
record volume phase holograms. Characteristics such as good light sensitivity, real time image
CAS Puthuppally 11
Seminar Report 2004 Optical Data Security
development, large dynamic range, good optical properties, format flexibility, good image
stability and relatively low cost, make photopolymers promising materials for write once, read
many times (WORM) optical data storage applications. Vinyl monomers that polymerize
through a free radical mechanism, such as acrylate esters, are used in most photopolymer
systems. Unfortunately volume shrinkage during optical recording is a series problem for many
free-radical-based photopolymer systems. Each time a monomer adds to a growing polymer
chain, the volume of the system decreases as a covalent chemical bond replaces a non-bonded
contact. In severe cases, volume shrinkage distorts the recorded interference pattern and
prevents accurate recovery of the data.
The charge-coupled device is, by far, the most common mechanism for
converting optical images to electrical signals. CCD’s are silicon devices, which contain an
array of potential wells created through a series of column, implants (for vertical confinement).
A CCD is a silicon-based semiconductor arranged as an array of photosensitive elements, each
one of which generates photoelectrons and stores them as a small bucket of charge or potential
wells. Each pixel is typically 15 to 30 μm square. Current CCD’s have formats or resolution
better than 2048 *2048 pixels, with a size of about 25mm square.
Signal
Amplifier
Special cell used for read out
CAS Puthuppally 12
Seminar Report 2004 Optical Data Security
When requested the elements form a bucket brigade; each row of charges is passed
from element to element, a process which is known as clocking, down the columns and
horizontally along the final row. The value in each pixel is measured in turn and recorded
digitally, to ensure that only positive numbers result from this analog to digital conversion
process a fixed offset known as the bias level is introduced, the charge transfer process is
essentially noise-free and all most all of the noise contributed to the signal by the CCD is from
the out put stage.
There is wide spread interest in the development of encryption systems, which operate
in the optical domain. The advantages inherent in the optical approach to encryption, such as a
high space-bandwidth product, the difficulty of accessing, copying or falsification and the
possibility of including biometrics are widely recognized. In an encryption system, we wish to
encode information in such a fashion that even if it is viewed or copied only the application of
the correct key will reveal the original information. Presently encryption approach is based on
the direct mapping of an encrypted phase-mask and a decrypting phase key, resulting in the
decryption of information completely within a phase-only domain.
In the case of encryption, a plane polarized monochromatic wave front illuminates
the encrypted phase mask, which consists of a random array of phase-shifting pixels. These
phase-masks are produced by electronically scrambling the original information, to be
encrypted, with a random pattern and using this to generate an encrypted phase mask. The
decrypting key effectively reverses the scrambling operation in the optical domain and results in
the production of a wave front in which the information of interest is encoded as a relative
phase shift between different sections of the wave front, in this case corresponding to the pixels.
The mask and key can be placed, either directly in contact with one another so that
the decryption takes place in the same image plane, or alternatively they can be imaged on to
one another with an optical system. By using a spatial light modulator the phase key can be
scrolled electronically until it overlies the phase pattern of the encrypted mask removing the
necessity for precise mechanical positioning in the optical system.
CAS Puthuppally 13
Seminar Report 2004 Optical Data Security
In holographic data storage, light from a coherent laser source is split into two
beams, signal (data-carrying) and reference beams. Digital data to be stored are “ encoded” onto
the signal beam via a spatial light modulator. The data or strings of bits are first arranged into
pages or large arrays. The o’s and 1’s of the data pages are translated into pixels of the spatial
light modulator that either or transmit light . The light of signal beam traverses through the
modulator and is therefore encoded with the “checkerboard” pattern of the data page. This
encoded beam then interferes with the reference beam through the volume of a photosensitive
recording medium, storing the digital data pages.
CAS Puthuppally 14
Seminar Report 2004 Optical Data Security
The interference pattern induces modulations in the refractive index of the recording
material yielding diffractive volume gratings. The reference beam is used during readout to
diffract off of the recorded gratings, reconstructing the stored array of bits. The reconstructed
array is projected onto a pixilated detector that reads the data in parallel. This parallel readout of
data provides holography with its fast transfer rates.
The readout of data depends sensitively upon the characteristics of the reference
beam .By varying the reference beam, for example by changing its angle of incidence or
wavelength, Many different data pages can be recorded in the same volume of material and
read out by applying a reference beam identical to that used during writing. This process of
multiplexing data yields the enormous storage capacity of holography.
5. Encryption Techniques
There are many different types of encryption techniques available. Here three main techniques
used for encryption has been described. They are :
CAS Puthuppally 15
Seminar Report 2004 Optical Data Security
Si(v,)=Gi(v,)Hi(v,)…………………………………………………………………(1)
Where
Gi(v, )=F[gi(x,y)exp{-jn(x,y)}]
In Eq . (2),F[] denotes the Fourier transform operation ,is the wavelength of the light,
And is the focal length of the Fourier-transform lens. Each encrypted data frame is
obtained by taking another Fourier transform:
Where denotes the convolution .Equation (3) shows that the two phase functions,
I(x,y) And hi(,),convert the original data into stationary-white-noise-like data.
The Fourier-Transformed pattern of the encrypted data that is described in Eq-(1)
CAS Puthuppally 16
Seminar Report 2004 Optical Data Security
Is stored hollographically together with a reference beam in a photo refractive material.To store
many frames of data,angular multiplexing is employed. The interference pattern (,) to be
stored in a photo refractive material is written as
(,)=i=1 to m|Si(,)+Ri (,)|2………….(4)
where M is the total number of stored images and is a reference at specific angle used to
record the ith encrypted data .In a photorefractive crystal illumination with a sufficient
wavelength content excites the electrons in the conduction band in the donor level between the
valence band and the conduction bands. At the steady states, the space charge density is
proportional to the interference pattern in the diffusion-dominant region.This space charge
density creates the space charged field that can cause the refractive- index change via the
electro-optic effect. The created refractive index distribution is proportional to the interference
pattern and can be stored for a long time(more than 2 months) in the dark in LiNbO3 crystal.
In the descryption process,the read out beam is the conjugate of the reference beam.
The read out using the conjugate of the reference beam offers advantages.It is able to use the
same random phase mask in the encryption and decryption process, and it eleiminates
aberration of the optical system.The data of the ith stored image can be reconstructed and the
read out beam is incident at the correct angle. The reconstructed data in the Fourier-
Plane(FP),Di (,) is written as
Di (,)={Gi(,) Hi (,)}* Ki (,)……………(5)
Where
Ki (,)=exp{-jki (,)}……………….(6)
The asterisk in EQ-(5) denotes the complex conjugate and Ki (,) is a phase key used in the
decryption process. We can reconstruct the image by Fourier transforming Eq-(5).The
reconstructed ith image Di(x,y) is written as di(x,y)=[g*(x,y)exp{jni(x,y)}]Ci(x,y)
……………(7)
Where
Ci(x,y)=F[exp{-jhi(,)}] F[exp{-jki(,)}]………(8)
In Eq-(8) denotes correlation.When phase key Ki(,)=Hi(,), the conjugation of the
original data is successfully recovered because Eq-(8) becomes a delta function. The random
phase function in the input plane,exp{-jni(x,y)},may be removed by an intensity sensitive
device such as charge coupled device (CCD) camera.In a practical system the oprating at a high
speed detection of the reconstructed data, the parallel detection at each pixel of two-dimensional
data is desirable.When one uses an incorrect phase key,key ki(,) hi(,), the original data
cannot be recovered.
Experimental Setup
CAS Puthuppally 17
Seminar Report 2004 Optical Data Security
Figure 1. Experimental setup. RPM denotes random phase mask; BS denotes beam splitter; L
denotes lens; M denotes mirror; BE denotes beam expander; SH denotes shutter; CCD denotes
CCD camera.
In the decryption process, the readout beam is the conjugate of the reference beam
used for recording. Shutters SH1 and SH2 are closed, while SH3 is open. If the same mask is
located at the same place as the one used to write the hologram, the original image is
reconstructed at CCD2.This is because the ideal reconstructed beam read out by using the
conjugate of the reference beam eliminates the phase modulation caused by the random phase
mask. Otherwise, the original data may not be recovered. In the experiments we use a pair of
counter propagating plane waves as the reference and the conjugate beams.
CAS Puthuppally 18
Seminar Report 2004 Optical Data Security
CAS Puthuppally 19
Seminar Report 2004 Optical Data Security
incorrect keys were used.No part of the original image can be seen.The average bit error rate
obtained using incorrect keys was 0.384.
One can make the memory system more secure by using random phase masks in the Fresnel
Domain.In addition to the phase information,the positions of two phase masks are used as
encryption keys.Even if the phase masks are stolen,the unknown positions of the masks can
protect the data.The positions of the masks have as many as three degrees of freedom.We have
demonstrated encryption and decryption of three binary images by using angle
multiplexing.The experimental setup is the same as that shown in fig(5).Fig(8a) shows one of
the three original images.RPM1&RPM2 were located at a distance of 100mm from L1& at the
center of L1 &FP,respectievely,as shown in fig(5).Fig(8b)shows an encrypted image of
fig(8a).Random –noise- like images were observed.In the recording process the optical powers
of the object and the reference beams were 4mW/cm2 and 500mW/cm2 respectievely.
Experimental results (a) Original image ,(b) encrypted image,(c) and (d) are reconstructed
images when positions of the phase masks are correct and incorrect respectively.
The exposure time was 110s.Fig(8c) shows one of the reconstructed images
obtained by using the same masks located at the same positions used in the recording.This result
shows that the original image was successfully reconstructed.Fig(8d) shows the reconstructed
image when the two phase masks were incorrectly located.We can see that the reconstructed
image is still a white- noise –like image.
We estimate the available number of three dimensional positions of two random
phase masks.Let the dimensions of random phase masks be L x x Ly.and Δx and Δy be the
correlation lengths of the random phase masks along the X & Y axes,respectievely.The
X,y&z axes are defined as shown in fig(5).When a number of Nz resolvable positions along the
optical axis can be used for the encryption key,the total number of three dimensional positions
to be examined in a three dimensional key,P, is written by
CAS Puthuppally 20
Seminar Report 2004 Optical Data Security
Whereƒ is the focal length of L1 in fig(5) & Δz is computed according to the sensitivity of the
decryption to the shifts of the keys along the Z axis.Since two three dimensional keys are used
in this system,the total number of three dimensional positions to be examined is given by
N=P2…………………………………..(11)
In the memory system shown in fig(5) ,N=3x1018 when
Lx=Ly=25mm,L=400mm,Δx=Δy=6Δm & Δz=4mm.Note that Δx&Δy were calculated from
the measurement of an auto correlation fuction of the phase masks used in the
experiments.When one searches 106 position/s,it takes 95 years to finish the whole search.It is
practically impossible to decrypt without the knowing position of two three dimensional keys.
CAS Puthuppally 21
Seminar Report 2004 Optical Data Security
Fig 9(a) & fig 9(b) show an original and an encrypted image.The encrypted image is
stored hollographically using recording beams at a wavelength of 514.5 nm. In the dcryption
process,we use two read out beams at wave length of 514.5nm and 632.8 nm. Note that in both
cases th Bragg conditions are satisfied.Fig 9(c) & (d) shows the reconstructed images when
wavelengths of 514.5 nm &632.8 nm are used recpectievely.When the wavelength of the read
out beam is same as that of the recording beam and when the same masks is located at the sae
place as that used to record the hologram , we can obtain the rconstructed original image.The
wave length selectivity depends on the pixel size of the random phase masks at the Fourier
plane .One can use many wavelengths by utilizing the small pixel size of the random phase
masks.
6.Applications
CAS Puthuppally 22
Seminar Report 2004 Optical Data Security
one dimensional temporal pulse using the space to time converter and then is transmitted to
users via optical fibers. At the receivers the temporal signal is converted again into a spatial
signal by the time to space converter. The authorized users can decrypt the data using the
correct key. This system can be expected to communicate at an ultra high speed of more than 1
Tb/s.
Conclusions
Three encrypted optical memory systems have been discussed here. These
systems are secure because the total number of mathematical possibilities of the
multidimensional keys, which consists of two dimensional phase masks, their three dimensional
positions, and wavelengths of light, is extremely large. The experimental results are very
encouraging. It is expected that the encrypted memory system is to play an important role in
ultra-fast secure communication systems using the spatial temporal converters with ultra short
pulse that enable communication at ultra high speed of more than Tb/s.
It is believed that the substantial advances in recording media, recording methods and
the demonstrated densities of > 30 channel Gbits/in2 coupled with the recent commercial
availability of system components remove many of the obstacles that previously prevented the
practical consideration of optical data storage and greatly enhance the prospects for
Hollography to become a next generation storage technology.
CAS Puthuppally 23
Seminar Report 2004 Optical Data Security
8. References
1. www.bell-labs.com
2. www.ieee.org
3. www.laser2000.co.uk
4. www.ing.iac.es
5. www.src.le.ac.uk
Journals
1. O.Matoba &B.Javidi , “ENCRYPTED OPTICAL STORAGE WITH
ANGULAR MULTIPLEXING” , Applications of Optics Vol.38
CAS Puthuppally 24
Seminar Report 2004 Optical Data Security
CAS Puthuppally 25