Skip to main content

Secure Coherence Modulation Telecommunication System

  • Chapter
Applications of Photonic Technology 2
  • 29 Accesses

Abstract

Recently, with the rapid development of optical telecommunications, a considerable interest as been shown for secure optical transmission. Coding techniques which are not based on intensity modulation can potentially be adapted for secure transmission. Among the different techniques available, the most popular are probably based on frequency1, phase2, coherent correlation3, and coherence modulation4. The coherent schemes employ two interferometers illuminated by a Broadband Source (BBS) with a coherence length shorter than the interferometer’s Optical Path Difference (OPD). Information is encoded by modulating the emitter interferometer’s OPD. The constant optical power transmitted in such systems is attractive for secure communication since, “apparently”, a perfectly matched receiving interferometer is required to decode the signal.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. Mathoorasing, C. Kazmierski, Y. Sorel, and J.F. Kerdiles, Distance Transmission Limits ..., Electron. Lett., Vol. 30, No. 17, 1428, (1994)

    Article  Google Scholar 

  2. J.H. Shapiro, On the Performance of Optical PSK ..., IEEE Photon. Tech. Lett., Vol. 4, No. 6, 647, (1992)

    Article  Google Scholar 

  3. R.A. Griffin, D.D. Sampson, and D.A. Jackson, Demonstration of Data Transmission ..., IEEE Phot. Tech. Lett., Vol. 4, No. 5, 513, (1992)

    Article  Google Scholar 

  4. C. Gutierrez-Martinez, H. Porte, and J.P. Goedgebuer, Microwave Integrated ..., Micro, and Opt. Tech. Lett., Vol. 10, No. 1, 66, (1995)

    Article  Google Scholar 

  5. B. Wacogne, and D.A. Jackson, Security Vulnerability ..., IEEE Photon. Tech. Lett., Vol. 8, No. 3, 470, (1996)

    Article  Google Scholar 

  6. W. Wells, R. Stone, and E. Miles, Secure Communications ..., IEEE J. on Selected Areas in Communications, Vol. 11, 770, (1993)

    Article  Google Scholar 

  7. J. Hauden, H. Porte, J.P. Goedgebuer, Quasi-Polarisation Independent...lEEE J. of Quant. Elec, Vol. 30, No. 10, 2325, (1994)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer Science+Business Media New York

About this chapter

Cite this chapter

Wacogne, B., Porte, H., Mollier, P., Jackson, D.A. (1997). Secure Coherence Modulation Telecommunication System. In: Lampropoulos, G.A., Lessard, R.A. (eds) Applications of Photonic Technology 2. Springer, Boston, MA. https://doi.org/10.1007/978-1-4757-9250-8_30

Download citation

  • DOI: https://doi.org/10.1007/978-1-4757-9250-8_30

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4757-9252-2

  • Online ISBN: 978-1-4757-9250-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics