The Looking-Glass System: A Unidirectional Network for Secure Data Transfer Using an Optic Medium

  • Gal OrenEmail author
  • Lior Amar
  • David Levy-Hevroni
  • Guy Malamud
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 670)


The Looking-Glass system is a unidirectional network for data transfer using an optic medium, base on the principle of transferring information digitally between two stations without an electric connection. The implementation of this idea includes one side encoding and projecting the information to a screen in high speed, and a receiving side, which decodes the information image back to its original form. The decoding is done using a unique algorithm. Also, in order to synchronize between the transmitter and the receiver sides a separate synchronization system base on video pattern recognition is used. This technique can be useful whenever there is a need to transfer information from a closed network – especially sensitive one – to an open network, such as the Internet network, while keeping the information in its original form, and without any fear of an uncontrolled bidirectional flow of information – either by a leakage or a cyber attack.


Confidential networks Information security Unidirectional systems Encrypted data transmission 



This work was supported by the Lynn and William Frankel Center for Computer Science.


  1. 1.
    Shabtai, A., Elovici, Y., Rokach, L.: A Survey of Data Leakage Detection and Prevention Solutions. Springer Science & Business Media, New York (2012)CrossRefGoogle Scholar
  2. 2.
    Okhravi, H., Sheldon, F.T.: Data diodes in support of trustworthy cyber infrastructure. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, p. 23. ACM, April 2010Google Scholar
  3. 3.
    Kang, M.H., Moskowitz, I.S., Chincheck, S.: The pump: A decade of covert fun. In: Computer Security Applications Conference, 21st Annual, p. 7. IEEE, December 2005Google Scholar
  4. 4.
    Kuhn, M.G., Anderson, R.J.: Hidden data transmission using electromagnetic emanations. In: Kuhn, M.G., Anderson, R.J. (eds.) Information Hiding. LNCS, vol. 1525, pp. 124–142. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  5. 5.
    Kramer, F.D., Starr, S.H.: Cyberpower and National Security. Potomac Books Inc, Lincoln (2009)Google Scholar
  6. 6.
    Zhao, N., et al.: EMI Spy: harnessing electromagnetic interference for low-cost, rapid prototyping of proxemic interaction. In: 2015 IEEE 12th International Conference on Wearable and Implantable Body Sensor Networks (BSN), IEEE (2015)Google Scholar
  7. 7.
    Suarez, O.D., Carrobles, M.D.M.F., Enano, N.V., García, G.B., Gracia, I.S., Incertis, J.A.P., Tercero, J.S.: OpenCV Essentials. Packt Publishing Ltd., Mumbai (2014)Google Scholar
  8. 8.
    Petrou, M., Petrou, C.: Image Processing: The Fundamentals. Wiley, New York (2010)CrossRefzbMATHGoogle Scholar
  9. 9.
    Goldberg, N.: Camera Technology: the Dark Side of the Lens. Academic Press, Boston (1992)Google Scholar
  10. 10.
    Furht, B. (ed.): Handbook of Augmented Reality. Springer Science & Business Media, New York (2011)Google Scholar

Copyright information

© Springer International Publishing AG 2016

Authors and Affiliations

  • Gal Oren
    • 1
    • 2
    Email author
  • Lior Amar
    • 3
  • David Levy-Hevroni
    • 2
  • Guy Malamud
    • 2
  1. 1.Department of Computer ScienceBen-Gurion University of the NegevBeershebaIsrael
  2. 2.Department of PhysicsNuclear Research Center-NegevBeershebaIsrael
  3. 3.Parallel Machines - Information Technology and Services Ltd.Tel-AvivIsrael

Personalised recommendations