EconPapers    
Economics at your fingertips  
 

Temporal spying and concealing process in fibre-optic data transmission systems through polarization bypass

P.Y. Bony, M. Guasoni, P. Morin, D. Sugny, A. Picozzi, H.R. Jauslin, S. Pitois and J. Fatome ()
Additional contact information
P.Y. Bony: Laboratoire Interdisciplinaire Carnot de Bourgogne (ICB), UMR 6303 CNRS-Université de Bourgogne, 9 Avenue Alain Savary
M. Guasoni: Laboratoire Interdisciplinaire Carnot de Bourgogne (ICB), UMR 6303 CNRS-Université de Bourgogne, 9 Avenue Alain Savary
P. Morin: Laboratoire Interdisciplinaire Carnot de Bourgogne (ICB), UMR 6303 CNRS-Université de Bourgogne, 9 Avenue Alain Savary
D. Sugny: Laboratoire Interdisciplinaire Carnot de Bourgogne (ICB), UMR 6303 CNRS-Université de Bourgogne, 9 Avenue Alain Savary
A. Picozzi: Laboratoire Interdisciplinaire Carnot de Bourgogne (ICB), UMR 6303 CNRS-Université de Bourgogne, 9 Avenue Alain Savary
H.R. Jauslin: Laboratoire Interdisciplinaire Carnot de Bourgogne (ICB), UMR 6303 CNRS-Université de Bourgogne, 9 Avenue Alain Savary
S. Pitois: Laboratoire Interdisciplinaire Carnot de Bourgogne (ICB), UMR 6303 CNRS-Université de Bourgogne, 9 Avenue Alain Savary
J. Fatome: Laboratoire Interdisciplinaire Carnot de Bourgogne (ICB), UMR 6303 CNRS-Université de Bourgogne, 9 Avenue Alain Savary

Nature Communications, 2014, vol. 5, issue 1, 1-9

Abstract: Abstract Recent research has been focused on the ability to manipulate a light beam in such a way to hide, namely to cloak, an event over a finite time or localization in space. The main idea is to create a hole or a gap in the spatial or time domain so as to allow for an object or data to be kept hidden for a while and then to be restored. By enlarging the field of applications of this concept to telecommunications, researchers have recently reported the possibility to hide transmitted data in an optical fibre. Here we report the first experimental demonstration of perpetual temporal spying and blinding process of optical data in fibre-optic transmission line based on polarization bypass. We successfully characterize the performance of our system by alternatively copying and then concealing 100% of a 10-Gb s−1 transmitted signal.

Date: 2014
References: Add references at CitEc
Citations: View citations in EconPapers (1)

Downloads: (external link)
https://www.nature.com/articles/ncomms5678 Abstract (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:nat:natcom:v:5:y:2014:i:1:d:10.1038_ncomms5678

Ordering information: This journal article can be ordered from
https://www.nature.com/ncomms/

DOI: 10.1038/ncomms5678

Access Statistics for this article

Nature Communications is currently edited by Nathalie Le Bot, Enda Bergin and Fiona Gillespie

More articles in Nature Communications from Nature
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-19
Handle: RePEc:nat:natcom:v:5:y:2014:i:1:d:10.1038_ncomms5678