IEEE PHOTONICS TECHNOLOGY LETTERS, VOL. 17, NO. 9, SEPTEMBER 2005 1995 Optical Chaos Masking of Video Signals Valerio Annovazzi-Lodi, Senior Member, IEEE, Mauro Benedetti, Member, IEEE, Sabina Merlo, Senior Member, IEEE, Michele Norgia, Member, IEEE, and Biagio Provinzano Abstract—In this letter, we report on what we believe is the first demonstration of a cryptographic technique, based on optical chaos, applied to “real world” high-frequency signals. A standard TV signal at 2.4 GHz has been transmitted through an optical fiber link. The output from a chaotic laser, added to the signal at the transmitter side, strongly reduces its signal-to-noise ratio, and prevents an eavesdropper tapping the fiber from decoding the message. At the receiver side, the signal is extracted from chaos using a master–slave synchronization scheme. This requires a pair of lasers with strictly matched parameters, which represent the hardware cryptographic key of the method. Index Terms—Chaos, communication systems, cryptography, optical fibers. I. INTRODUCTION O PTICAL chaotic cryptography is a technique for secure transmission, implemented at the physical layer, which has been studied for over a decade, though it has been experimentally demonstrated only recently. This technique [1]–[11] makes use of a couple of lasers routed to chaos, usually by back-reflection from a remote mirror. A chaotic distributed feedback (DFB) laser generates a very complex, apparently random, modulation waveform, which is highly sensitive to starting conditions and to system parameters, and can, however, be predicted by a deterministic model. In the cryptographic schemes, two chaotic lasers are used: one (called “master”) at the transmitter, to hide the signal to be sent (the message) within the chaotic waveform; the other (called “slave”), at the receiver, for message extraction. In most cases, chaos is simply added to the message to strongly reduce its signal-to-noise (S/N) ratio, thus implementing the so-called “chaotic masking.” To this purpose, different solutions are possible [1], [3], [8]. If, as shown in Fig. 1, the message modulates the pump current of a third laser, whose emission is combined to that of the master, the scheme is called “additive chaos masking” (ACM). Extraction of the hidden message from chaos is based on synchronization of transmitter and receiver, i.e., on the generation of the same chaotic waveform at both ends of the channel. Synchronization is obtained by injection of a part of the output of Manuscript received April 22, 2005; revised May 24, 2005. This work was supported by the European Union under Contract ST-2000 29683 (OCCULT Project). V. Annovazzi-Lodi, M. Benedetti, S. Merlo, and B. Provinzano are with the Dipartimento di Elettronica, Universita’ di Pavia, Pavia I-27100, Italy (e-mail: valerio.annovazzi@unipv.it; mauro.benedetti@unipv.it; sabina.merlo@unipv.it; biagio.provinzano@unipv.it). M. Norgia is with with the Dipartimento di Elettronica, Universita’ di Pavia, Pavia I-27100, Italy, and also with the Dipartimento di Elettronica e Informazione, Politecnico di Milano, Milan I-20133, Italy (e-mail: michele.norgia@unipv.it). Digital Object Identifier 10.1109/LPT.2005.853267 Fig. 1. Setup for transmission with ACM cryptographic scheme. the master laser into the slave laser, which, under suitable conditions, replicates the chaotic regime of the master but not the message. Thus, message extraction can be simply performed by making the difference between the signal coming from the transmitter (message chaos), and the chaotic waveform replicated at the receiver. However (and this is the core of the method), it is very difficult for an eavesdropper to obtain synchronization even holding a system similar to that of the authorized listener. In fact, effective synchronization relies on the two lasers being closely matched, and, typically, the two devices must be selected from the same wafer. The cryptographic key, in this case, consists of the parameters of the two matched lasers. It is worth noting that the knowledge of the key, by itself, is not sufficient to extract the message, because to do that one should also select (or build) the laser. An important characteristic of this method is its compatibility, in principle, with a standard network. Though optical chaotic cryptography has been widely studied theoretically [1], [2], [4], [5], and already demonstrated experimentally, [1], [3], [6]–[9], as far as we know, no cases of transmission of a real-world message have appeared in the literature. In the following, we report on experiments of secure transmission of a composite TV signal, generated by a standard surveillance camera, along a 1.2-km fiber span including splitters, joints, couplers, and an optical amplifier. II. EXPERIMENTAL SETUP Experiments have been performed on the ACM setup of Fig. 1. The master laser at the transmitter is driven to chaos 1041-1135/$20.00 © 2005 IEEE 1996 IEEE PHOTONICS TECHNOLOGY LETTERS, VOL. 17, NO. 9, SEPTEMBER 2005 by back-reflection from the fiber tip positioned in front of its launching lens [8], which defines an external cavity of about 3 cm. This short-cavity scheme [5] is compact and suitable to future integration, and offers a continuous and flat chaotic spectrum, where the message can be easily hidden. The characteristics of the chaotic regime of the laser depend on working conditions, such as supply current, cavity length, and back-injected power, which can be varied by changing the alignment. The slave laser at the receiver is also routed to chaos by building an external cavity identical to that of the master. This is the so-called closed-loop (or symmetric) configuration [2], which ensures a robust synchronization, for efficient masking. The fiber path between transmitter and receiver is of about 1.2 km and, besides splitters, couplers, and joints, it includes also a semiconductor optical amplifier to increase the maximum injection level from master into slave. To prevent undesired back-reflection into the master, photodiode PD1 has been slightly tilted, and the fiber facing it has been angled cleaved at 10 ; this also prevents injection from the message laser into the master. The optical isolator in Fig. 1 ensures unidirectional injection. Polarizers in front of the lasers select, for both reflection and injection, the same polarization of the laser emission. Moreover, the polarizer on the slave is used, together with the polarization controller, to trim the injection level. The laser pair consists of standard DFB telecommunication lasers, which have been selected between first neighbors on the same wafer. Their difference of threshold and of differential efficiency is less than 1%. Both external cavities have been also trimmed in length with a resolution of a fraction of wavelength. Master–slave synchronization is obtained by adjusting the working point, the alignment, and the temperature of both lasers, as well as the injection level. The regimes of the two lasers can be compared from PD1, PD2 with a fast oscilloscope or with a radio frequency (RF) spectrum analyzer. Synchronization is better checked by observing the spectrum of the difference between master and slave, obtained by amplifying the outputs of PD2 and PD3 by one inverting and one noninverting amplifier (Fig. 1), and then passively summing their outputs. The difference should be minimized for optimum synchronization. To compensate the differential propagation delay of master and slave fields to PD3, PD2, respectively (mainly due to the fiber pigtail from the slave to its coupler), an RF delay line has been introduced. III. EXPERIMENTAL RESULTS In Fig. 2, time series of the chaotic waveforms of synchronized master and slave are shown. For both lasers, supply currents were 50% above threshold (master: 8 mA; slave: 8.5 mA). Both back-injection and master–slave injection levels were of the order of 1% of the laser output power ( 1 mW). The waveforms have been observed by a 4-GHz real-time oscilloscope, reading the outputs of PD2, PD3; their correlation coefficient is of about 0.8. In Fig. 3, the RF spectra of master and of the master–slave difference are also reported, showing good chaos cancellation over a large bandwidth. It is worth noting that the chaotic spectrum in Fig. 3 is limited to 5 GHz because of photodiode and amplifier limitations; however, the actual chaos bandwidth, as measured by an optical spectrum analyzer, is of about Fig. 2. Time series of synchronized master and slave lasers. Fig. 3. RF chaos spectra: master with hidden signal (upper trace) and difference between synchronized master and slave (lower trace) with extracted signal. 50 GHz. In Fig. 3, a 3-GHz sinusoidal signal applied to the system input, and detected at the output, is also shown: it is completely hidden in the master spectrum and, however, after synchronization, it becomes visible in the difference signal at the system output. During alignment, all lasers were first tuned in temperature at the same wavelength, within the resolution of our spectrum analyzer (200 pm). Then, temperature was slightly changed for optimum synchronization. Perturbation effects on the slave by the message laser (injecting a power about five times lower than the master) were also minimized by a small temperature change, which resulted in a wavelength variation lower than the instrument resolution. Later, preliminary transmission experiments have been performed with an amplitude-modulated carrier at 2.4 GHz applied to the system input. The quality of the received signal has been evaluated after synchronous detection and baseband filtering at the receiver output node. The signal amplitude has been adjusted as a compromise between efficient masking, low signal distortion, and good quality of the recovered message. For example, in Fig. 4, the first diagram shows a message (a 1-kHz sinusoid) as received at the system output without added chaos (master and slave OFF). The second diagram is the encrypted message ANNOVAZZI-LODI et al.: OPTICAL CHAOS MASKING OF VIDEO SIGNALS 1997 the picture hidden within chaos, and represents the message as it would be recovered by an eavesdropper. Fig. 5(c) shows the extracted message after synchronization. Again, the signal level has been adjusted as a tradeoff between sufficient image masking by chaos and acceptable image quality after chaos cancellation. Fig. 5(b) was obtained by setting the AM sideband level at about 4 dB over chaos (a rapid deterioration of the image quality was observed below 5 dB, probably due to threshold in AM detection and to loss of TV synchronism). – dB for the decoded In these conditions, we get S/N message [Fig. 5(c)]. We finally observe that the system performance is presently limited by the chaos amplitude, which determines the allowable RF signal amplitude. Increasing the chaos amplitude, by using suitable lasers, would result in a larger S/N ratio of the decoded signal. Fig. 4. Transmission of a 1-kHz sinusoidal signal over a 2.4-GHz carrier: (a) no encryption; (b) encrypted; (c) decrypted. ACKNOWLEDGMENT The authors would like to thank W. Hunziker and J. Shumaker of Optospeed (CH) for supplying matched laser pairs, and Tektronix (Italy) for supplying the fast real-time oscilloscope. REFERENCES Fig. 5. TV frames of a still image transmitted with the setup of Fig. 1: (a) no encryption; (b) encrypted; (c) decrypted. (master ON, slave OFF); it has been obtained by setting the amplitude of the amplitude modulation (AM) sidebands (which carry the information) at the same level as chaos. The third diagram is the decrypted message (master and slave ON, and synchronized), as measured without changing either message or master chaos amplitude. The obtained S/N ratio of the decoded signal is of about 10 dB. Finally, the cryptographic setup has been inserted in a transmission link connecting a standard surveillance TV camera and its receiver. The camera output is a composite TV signal at the carrier frequency of 2.4 GHz, and has been connected to the cryptographic system input. The output of the system was sent to the TV receiver to be displayed on a monitor. In Fig. 5, three photographs of the monitor screen are shown, taken while the camera was aimed at a still picture. Fig. 5(a) is relative to transmission with no added chaos. Fig. 5(b) shows [1] Feature Section on Optical Chaos and Applications to Cryptography, IEEE J. Quantum Electron., vol. 38, no. 9, pp. 1138–1196, Sep. 2002. [2] J. Ohtsubo, “Chaos synchronization and chaotic signal masking in semiconductor lasers with optical feedback,” IEEE J. Quantum Electron., vol. 38, no. 9, pp. 1141–1154, Sep. 2002. [3] J. Liu, H. Chen, and S. Tang, “Synchronized chaotic optical communications at high bit rates,” IEEE J. Quantum Electron., vol. 38, no. 9, pp. 1184–1196, Sep. 2002. [4] A. Sanchez-Diaz, C. Mirasso, P. Colet, and P. Garcia-Fernandez, “Encoded Gbit/s digital communications with synchronized chaotic semiconductor lasers,” IEEE J. Quantum Electron., vol. 35, no. 3, pp. 292–297, Mar. 1999. [5] V. Annovazzi-Lodi, S. Donati, and A. Scire’, “Synchronization of chaotic lasers by optical feedback for chryptographic applications,” IEEE J. Quantum Electron., vol. 33, no. 9, pp. 1449–1454, Sep. 1997. [6] A. Argyris, D. Kanakidis, A. Bogris, and D. Syvridis, “Experimental evaluation of an open-loop all-optical chaotic communication system,” IEEE J. Sel. Topics Quantum Electron., vol. 10, no. 5, pp. 927–935, Sep./Oct. 2004. [7] Special Number on “Criptography Using Optical Chaos,” Comptes Rendus de l’Academie des Sciences-Dossier de Physique, vol. 6, no. 5, pp. 609–681, 2004. [8] V. Annovazzi-Lodi, M. Benedetti, S. Merlo, and M. Norgia, “Fiberoptics setup for chaotic cryptographic communications,” Comptes Rendus de l’Academie des Sciences-Dossier de Physique, vol. 6, no. 5, pp. 623–631, 2004. [9] M. Peil, I. Fisher, and W. Elsasser, “A short cavity semiconductor laser cryptosystem,” Comptes Rendus de l’Academie des Sciences-Dossier de Physique, vol. 6, no. 5, pp. 632–642, 2004. [10] E. Genin, L. Larger, J.-P. Goedgebuer, M. W. Lee, R. Ferriere, and X. Bavard, “Chaotic oscillations of the optical phase for multigigahertzbandwidth secure communications,” IEEE J. Quantum Electron., vol. 40, no. 3, pp. 294–298, Mar. 2004. [11] G. D. Vanwiggeren and R. Roy, “Chaotic communication using timedelayed optical systems,” Int. J. Bifurcation and Chaos, vol. 9, no. 11, pp. 2129–2156, 1998.