Temporal spying and concealing process in fibre-optic data transmission systems through polarization bypass
P.Y. Bony,
M. Guasoni,
P. Morin,
D. Sugny,
A. Picozzi,
H.R. Jauslin,
S. Pitois and
J. Fatome ()
Additional contact information
P.Y. Bony: Laboratoire Interdisciplinaire Carnot de Bourgogne (ICB), UMR 6303 CNRS-Université de Bourgogne, 9 Avenue Alain Savary
M. Guasoni: Laboratoire Interdisciplinaire Carnot de Bourgogne (ICB), UMR 6303 CNRS-Université de Bourgogne, 9 Avenue Alain Savary
P. Morin: Laboratoire Interdisciplinaire Carnot de Bourgogne (ICB), UMR 6303 CNRS-Université de Bourgogne, 9 Avenue Alain Savary
D. Sugny: Laboratoire Interdisciplinaire Carnot de Bourgogne (ICB), UMR 6303 CNRS-Université de Bourgogne, 9 Avenue Alain Savary
A. Picozzi: Laboratoire Interdisciplinaire Carnot de Bourgogne (ICB), UMR 6303 CNRS-Université de Bourgogne, 9 Avenue Alain Savary
H.R. Jauslin: Laboratoire Interdisciplinaire Carnot de Bourgogne (ICB), UMR 6303 CNRS-Université de Bourgogne, 9 Avenue Alain Savary
S. Pitois: Laboratoire Interdisciplinaire Carnot de Bourgogne (ICB), UMR 6303 CNRS-Université de Bourgogne, 9 Avenue Alain Savary
J. Fatome: Laboratoire Interdisciplinaire Carnot de Bourgogne (ICB), UMR 6303 CNRS-Université de Bourgogne, 9 Avenue Alain Savary
Nature Communications, 2014, vol. 5, issue 1, 1-9
Abstract:
Abstract Recent research has been focused on the ability to manipulate a light beam in such a way to hide, namely to cloak, an event over a finite time or localization in space. The main idea is to create a hole or a gap in the spatial or time domain so as to allow for an object or data to be kept hidden for a while and then to be restored. By enlarging the field of applications of this concept to telecommunications, researchers have recently reported the possibility to hide transmitted data in an optical fibre. Here we report the first experimental demonstration of perpetual temporal spying and blinding process of optical data in fibre-optic transmission line based on polarization bypass. We successfully characterize the performance of our system by alternatively copying and then concealing 100% of a 10-Gb s−1 transmitted signal.
Date: 2014
References: Add references at CitEc
Citations: View citations in EconPapers (1)
Downloads: (external link)
https://www.nature.com/articles/ncomms5678 Abstract (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:nat:natcom:v:5:y:2014:i:1:d:10.1038_ncomms5678
Ordering information: This journal article can be ordered from
https://www.nature.com/ncomms/
DOI: 10.1038/ncomms5678
Access Statistics for this article
Nature Communications is currently edited by Nathalie Le Bot, Enda Bergin and Fiona Gillespie
More articles in Nature Communications from Nature
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().