Full Content is available to subscribers

Subscribe/Learn More  >
Proceedings Article

Smart photonic networks and computer security for image data

[+] Author Affiliations
Jorge Campello, John T. Gill, Martin Morf, Michael J. Flynn

Stanford Univ. (USA)

Proc. SPIE 3228, Multimedia Networks: Security, Displays, Terminals, and Gateways, 272 (February 1, 1998); doi:10.1117/12.300897
Text Size: A A A
From Conference Volume 3228

  • Multimedia Networks: Security, Displays, Terminals, and Gateways
  • V. Michael Bove, Jr.; Barbara Derryberry; Clifford R. Holliday; Louis S. Lome; Vishal Markandey; Andrew G. Tescher; Bhaskaran Vasudev
  • Dallas, TX | November 02, 1997

abstract

Work reported here is part of a larger project on 'Smart Photonic Networks and Computer Security for Image Data', studying the interactions of coding and security, switching architecture simulations, and basic technologies. Coding and security: coding methods that are appropriate for data security in data fusion networks were investigated. These networks have several characteristics that distinguish them form other currently employed networks, such as Ethernet LANs or the Internet. The most significant characteristics are very high maximum data rates; predominance of image data; narrowcasting - transmission of data form one source to a designated set of receivers; data fusion - combining related data from several sources; simple sensor nodes with limited buffering. These characteristics affect both the lower level network design and the higher level coding methods.Data security encompasses privacy, integrity, reliability, and availability. Privacy, integrity, and reliability can be provided through encryption and coding for error detection and correction. Availability is primarily a network issue; network nodes must be protected against failure or routed around in the case of failure. One of the more promising techniques is the use of 'secret sharing'. We consider this method as a special case of our new space-time code diversity based algorithms for secure communication. These algorithms enable us to exploit parallelism and scalable multiplexing schemes to build photonic network architectures. A number of very high-speed switching and routing architectures and their relationships with very high performance processor architectures were studied. Indications are that routers for very high speed photonic networks can be designed using the very robust and distributed TCP/IP protocol, if suitable processor architecture support is available.

© (1998) COPYRIGHT SPIE--The International Society for Optical Engineering. Downloading of the abstract is permitted for personal use only.
Citation

Jorge Campello ; John T. Gill ; Martin Morf and Michael J. Flynn
"Smart photonic networks and computer security for image data", Proc. SPIE 3228, Multimedia Networks: Security, Displays, Terminals, and Gateways, 272 (February 1, 1998); doi:10.1117/12.300897; http://dx.doi.org/10.1117/12.300897


Access This Proceeding
Sign in or Create a personal account to Buy this proceeding ($15 for members, $18 for non-members).

Figures

Tables

NOTE:
Citing articles are presented as examples only. In non-demo SCM6 implementation, integration with CrossRef’s "Cited By" API will populate this tab (http://www.crossref.org/citedby.html).

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging & repositioning the boxes below.

Related Book Chapters

Topic Collections

Advertisement
  • Don't have an account?
  • Subscribe to the SPIE Digital Library
  • Create a FREE account to sign up for Digital Library content alerts and gain access to institutional subscriptions remotely.
Access This Proceeding
Sign in or Create a personal account to Buy this proceeding ($15 for members, $18 for non-members).
Access This Proceeding
Sign in or Create a personal account to Buy this article ($15 for members, $18 for non-members).
Access This Chapter

Access to SPIE eBooks is limited to subscribing institutions and is not available as part of a personal subscription. Print or electronic versions of individual SPIE books may be purchased via SPIE.org.