We propose and experimentally demonstrate an optical steganography method in which a data signal is transmitted using amplified spontaneous emission (ASE) noise as a carrier. The ASE serving as a carrier for the private signal has an identical frequency spectrum to the existing noise generated by the Erbium doped fiber amplifiers (EDFAs) in the transmission system. The system also carries a conventional data channel that is not private. The so-called “stealth” or private channel is well-hidden within the noise of the system. Phase modulation is used for both the stealth channel and the public channel. Using homodyne detection, the short coherence length of the ASE ensures that the stealth signal can only be recovered if the receiver closely...
A novel all-optical stealth and secured transmission is proposed and demonstrated. Spectral replicas...
We propose a scheme for covert active sensing using floodlight illumination from a terahertz-bandwid...
Traditional security (e.g., encryption) prevents unauthorized access to message content; however, de...
We propose and experimentally demonstrate an optical steganography method in which a data signal is ...
A temporal phase mask encryption method is proposed and experimentally demonstrated to improve the s...
We summarize the principle and experimental setup of optical steganography based on amplified sponta...
One of the challenging real-world problems in the communication network is to secure the communicati...
A temporal phase mask encryption method is proposed and experimentally demonstrated to improve the s...
Physical layer security using optical signal processing in optical networks has been researched over...
A limitation of free-space optical communications is the ease with which the information can be inte...
[[abstract]]This paper presents a public-key-based optical image cryptosystem with adaptive steganog...
Digital images are encrypted onto a chaotic carrier in a Bragg cell under hybrid nonlinear feedback ...
This paper presents a new method of audio steganography that allows character data to be encoded int...
Covert communications can be a force for good, such as providing a means of message authentication t...
A new optical steganography scheme is proposed that transmits a stealth optical code-division multip...
A novel all-optical stealth and secured transmission is proposed and demonstrated. Spectral replicas...
We propose a scheme for covert active sensing using floodlight illumination from a terahertz-bandwid...
Traditional security (e.g., encryption) prevents unauthorized access to message content; however, de...
We propose and experimentally demonstrate an optical steganography method in which a data signal is ...
A temporal phase mask encryption method is proposed and experimentally demonstrated to improve the s...
We summarize the principle and experimental setup of optical steganography based on amplified sponta...
One of the challenging real-world problems in the communication network is to secure the communicati...
A temporal phase mask encryption method is proposed and experimentally demonstrated to improve the s...
Physical layer security using optical signal processing in optical networks has been researched over...
A limitation of free-space optical communications is the ease with which the information can be inte...
[[abstract]]This paper presents a public-key-based optical image cryptosystem with adaptive steganog...
Digital images are encrypted onto a chaotic carrier in a Bragg cell under hybrid nonlinear feedback ...
This paper presents a new method of audio steganography that allows character data to be encoded int...
Covert communications can be a force for good, such as providing a means of message authentication t...
A new optical steganography scheme is proposed that transmits a stealth optical code-division multip...
A novel all-optical stealth and secured transmission is proposed and demonstrated. Spectral replicas...
We propose a scheme for covert active sensing using floodlight illumination from a terahertz-bandwid...
Traditional security (e.g., encryption) prevents unauthorized access to message content; however, de...