首页 > 最新文献

Optics/Photonics in Security and Defence最新文献

英文 中文
Continuous QKD and high speed data encryption 连续QKD和高速数据加密
Pub Date : 2013-10-29 DOI: 10.1117/12.2032731
H. Zbinden, N. Walenta, O. Guinnard, Raphael Houlmann, Charles Lim Ci Wen, B. Korzh, T. Lunghi, N. Gisin, A. Burg, J. Constantin, M. Legre, P. Trinkler, Dario Caselunghe, N. Kulesza, Gregory Trolliet, F. Vannel, P. Junod, Olivier Auberson, Yoan Graf, G. Curchod, Gilles Habegger, Etienne Messerli, C. Portmann, L. Henzen, C. Keller, C. Pendl, Michael Mühlberghuber, C. Roth, N. Felber, Frank K. Gürkaynak, Daniel Schöni, Beat Muheim
We present the results of a Swiss project dedicated to the development of high speed quantum key distribution and data encryption. The QKD engine features fully automated key exchange, hardware key distillation based on finite key security analysis, efficient authentication and wavelength division multiplexing of the quantum and the classical channel and one-time pas encryption. The encryption device allows authenticated symmetric key encryption (e.g AES) at rates of up to 100 Gb/s. A new quantum key can uploaded up to 1000 times second from the QKD engine.
我们提出了一个致力于高速量子密钥分发和数据加密开发的瑞士项目的结果。QKD引擎具有全自动密钥交换,基于有限密钥安全分析的硬件密钥蒸馏,量子和经典信道的高效认证和波分复用以及一次性通过加密。该加密设备允许以高达100gb /s的速率进行身份验证的对称密钥加密(例如AES)。一个新的量子密钥每秒可以从QKD引擎上传1000次。
{"title":"Continuous QKD and high speed data encryption","authors":"H. Zbinden, N. Walenta, O. Guinnard, Raphael Houlmann, Charles Lim Ci Wen, B. Korzh, T. Lunghi, N. Gisin, A. Burg, J. Constantin, M. Legre, P. Trinkler, Dario Caselunghe, N. Kulesza, Gregory Trolliet, F. Vannel, P. Junod, Olivier Auberson, Yoan Graf, G. Curchod, Gilles Habegger, Etienne Messerli, C. Portmann, L. Henzen, C. Keller, C. Pendl, Michael Mühlberghuber, C. Roth, N. Felber, Frank K. Gürkaynak, Daniel Schöni, Beat Muheim","doi":"10.1117/12.2032731","DOIUrl":"https://doi.org/10.1117/12.2032731","url":null,"abstract":"We present the results of a Swiss project dedicated to the development of high speed quantum key distribution and data encryption. The QKD engine features fully automated key exchange, hardware key distillation based on finite key security analysis, efficient authentication and wavelength division multiplexing of the quantum and the classical channel and one-time pas encryption. The encryption device allows authenticated symmetric key encryption (e.g AES) at rates of up to 100 Gb/s. A new quantum key can uploaded up to 1000 times second from the QKD engine.","PeriodicalId":344928,"journal":{"name":"Optics/Photonics in Security and Defence","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124951020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An approach to experimental photonic quantum digital signatures in fiber 光纤中光子量子数字签名的实验方法
Pub Date : 2013-10-29 DOI: 10.1117/12.2028720
R. Donaldson, R. Collins, V. Dunjko, Partick J. Clarke, E. Andersson, J. Jeffers, G. Buller
As society becomes more reliant on electronic communication and transactions, ensuring the security of these interactions becomes more important. Digital signatures are a widely used form of cryptography which allows parties to certify the origins of their communications, meaning that one party, a sender, can send information to other parties in such a way that messages cannot be forged. In addition, messages are transferrable, meaning that a recipient who accepts a message as genuine can be sure that if it is forwarded to another recipient, it will again be accepted as genuine. The classical digital signature schemes currently employed typically rely on computational complexity for security. Quantum digital signatures offer the potential for increased security. In our system, quantum signature states are passed through a network of polarization maintaining fiber interferometers (a multiport) to ensure that recipients will not disagree on the validity of a message. These signatures are encoded in the phase of photonic coherent states and the choice of photon number, signature length and number of possible phase states affects the level of security possible by this approach. We will give a brief introduction into quantum digital signatures and present results from our experimental demonstration system.
随着社会越来越依赖电子通信和交易,确保这些互动的安全变得更加重要。数字签名是一种广泛使用的密码学形式,它允许各方证明其通信的来源,这意味着一方(发送方)可以以无法伪造的方式向其他各方发送信息。此外,消息是可转移的,这意味着接受消息为真实消息的收件人可以确保,如果将消息转发给另一个收件人,它将再次被接受为真实消息。目前采用的经典数字签名方案通常依赖于计算复杂度来保证安全性。量子数字签名提供了提高安全性的潜力。在我们的系统中,量子签名状态通过保持偏振的光纤干涉仪(多端口)网络传递,以确保接收方不会对信息的有效性产生分歧。这些签名在光子相干态的相位中编码,光子数、签名长度和可能的相位数的选择影响了这种方法可能的安全级别。我们将简要介绍量子数字签名,并介绍我们的实验演示系统的结果。
{"title":"An approach to experimental photonic quantum digital signatures in fiber","authors":"R. Donaldson, R. Collins, V. Dunjko, Partick J. Clarke, E. Andersson, J. Jeffers, G. Buller","doi":"10.1117/12.2028720","DOIUrl":"https://doi.org/10.1117/12.2028720","url":null,"abstract":"As society becomes more reliant on electronic communication and transactions, ensuring the security of these interactions becomes more important. Digital signatures are a widely used form of cryptography which allows parties to certify the origins of their communications, meaning that one party, a sender, can send information to other parties in such a way that messages cannot be forged. In addition, messages are transferrable, meaning that a recipient who accepts a message as genuine can be sure that if it is forwarded to another recipient, it will again be accepted as genuine. The classical digital signature schemes currently employed typically rely on computational complexity for security. Quantum digital signatures offer the potential for increased security. In our system, quantum signature states are passed through a network of polarization maintaining fiber interferometers (a multiport) to ensure that recipients will not disagree on the validity of a message. These signatures are encoded in the phase of photonic coherent states and the choice of photon number, signature length and number of possible phase states affects the level of security possible by this approach. We will give a brief introduction into quantum digital signatures and present results from our experimental demonstration system.","PeriodicalId":344928,"journal":{"name":"Optics/Photonics in Security and Defence","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130122610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a high-speed quantum random number generator 一个高速量子随机数发生器
Pub Date : 2013-10-29 DOI: 10.1117/12.2029287
D. Stucki, Samuel Burri, E. Charbon, C. Chunnilall, Alessio Meneghetti, F. Regazzoni
Randomness is of fundamental importance in various fields, such as cryptography, numerical simulations, or the gaming industry. Quantum physics, which is fundamentally probabilistic, is the best option for a physical random number generator. In this article, we will present the work carried out in various projects in the context of the development of a commercial and certified high speed random number generator.
随机性在密码学、数值模拟或游戏行业等各个领域都具有重要的基础意义。量子物理基本上是概率性的,是物理随机数生成器的最佳选择。在本文中,我们将介绍在开发商业和认证高速随机数生成器的背景下在各种项目中进行的工作。
{"title":"Towards a high-speed quantum random number generator","authors":"D. Stucki, Samuel Burri, E. Charbon, C. Chunnilall, Alessio Meneghetti, F. Regazzoni","doi":"10.1117/12.2029287","DOIUrl":"https://doi.org/10.1117/12.2029287","url":null,"abstract":"Randomness is of fundamental importance in various fields, such as cryptography, numerical simulations, or the gaming industry. Quantum physics, which is fundamentally probabilistic, is the best option for a physical random number generator. In this article, we will present the work carried out in various projects in the context of the development of a commercial and certified high speed random number generator.","PeriodicalId":344928,"journal":{"name":"Optics/Photonics in Security and Defence","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115318116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Essential elements lacking in security proofs for quantum key distribution 量子密钥分发缺乏安全证明的基本要素
Pub Date : 2013-10-29 DOI: 10.1117/12.2032082
H. Yuen
All the currently available unconditional security proofs on quantum key distribution, in particular for the BB84 protocol and its variants including continuous-variable ones, are invalid or incomplete at many points. In this paper we discuss some of the main known problems, particularly those on operational security guarantee and error correction. Most basic are the points that there is no security parameter in such protocols and it is not the case the generated key is perfect with probability ≥ 1 - ϵ under the trace distance criterion d ≤ ϵ, which is widely claimed in the technical and popular literature. The many serious security consequences of this error about the QKD generated key would be explained, including practical ramification on achievable security levels. It will be shown how the error correction problem alone may already defy rigorous quantitative analysis. Various other problems would be touched upon. It is pointed out that rigorous security guarantee of much more efficient quantum cryptosystems may be obtained by abandoning the disturbance-information tradeoff principle and utilizing instead the known KCQ (keyed communication in quantum noise) principle in conjunction with a new DBM (decoy bits method) principle that will be detailed elsewhere.
目前所有关于量子密钥分发的无条件安全证明,特别是BB84协议及其包括连续变量协议在内的变体,在许多点上都是无效或不完整的。本文讨论了目前已知的一些主要问题,特别是操作安全保障和纠错问题。最基本的是,在这样的协议中没有安全参数,并且在跟踪距离准则d≤λ下,生成的密钥不是概率≥1 - λ的完美密钥,这在技术和流行文献中被广泛声称。将解释关于生成的QKD密钥的这个错误的许多严重的安全后果,包括对可实现的安全级别的实际影响。它将表明,仅仅是纠错问题可能已经无法进行严格的定量分析。还会涉及到其他各种问题。本文指出,放弃干扰-信息权衡原理,利用已知的KCQ(量子噪声中的键控通信)原理与新的DBM(诱饵比特法)原理相结合,可以获得更有效的量子密码系统的严格安全保证,该原理将在其他地方详细介绍。
{"title":"Essential elements lacking in security proofs for quantum key distribution","authors":"H. Yuen","doi":"10.1117/12.2032082","DOIUrl":"https://doi.org/10.1117/12.2032082","url":null,"abstract":"All the currently available unconditional security proofs on quantum key distribution, in particular for the BB84 protocol and its variants including continuous-variable ones, are invalid or incomplete at many points. In this paper we discuss some of the main known problems, particularly those on operational security guarantee and error correction. Most basic are the points that there is no security parameter in such protocols and it is not the case the generated key is perfect with probability ≥ 1 - ϵ under the trace distance criterion d ≤ ϵ, which is widely claimed in the technical and popular literature. The many serious security consequences of this error about the QKD generated key would be explained, including practical ramification on achievable security levels. It will be shown how the error correction problem alone may already defy rigorous quantitative analysis. Various other problems would be touched upon. It is pointed out that rigorous security guarantee of much more efficient quantum cryptosystems may be obtained by abandoning the disturbance-information tradeoff principle and utilizing instead the known KCQ (keyed communication in quantum noise) principle in conjunction with a new DBM (decoy bits method) principle that will be detailed elsewhere.","PeriodicalId":344928,"journal":{"name":"Optics/Photonics in Security and Defence","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116634237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Quantum key distribution: vulnerable if imperfectly implemented 量子密钥分发:如果实现不完美,容易受到攻击
Pub Date : 2013-10-29 DOI: 10.1117/12.2033066
G. Leuchs
We report several vulnerabilities found in Clavis2, the flagship quantum key distribution (QKD) system from ID Quantique. We show the hacking of a calibration sequence run by Clavis2 to synchronize the Alice and Bob devices before performing the secret key exchange. This hack induces a temporal detection efficiency mismatch in Bob that can allow Eve to break the security of the cryptosystem using faked states. We also experimentally investigate the superlinear behaviour in the single-photon detectors (SPDs) used by Bob. Due to this superlinearity, the SPDs feature an actual multi-photon detection probability which is generally higher than the theoretically-modelled value. We show how this increases the risk of detector control attacks on QKD systems (including Clavis2) employing such SPDs. Finally, we review the experimental feasibility of Trojan-horse attacks. In the case of Clavis2, the objective is to read Bob's phase modulator to acquire knowledge of his basis choice as this information suffices for constructing the raw key in the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol. We work in close collaboration with ID Quantique and for all these loopholes, we notified them in advance. Wherever possible, we or ID Quantique proposed countermeasures and they implemented suitable patches and upgrade their systems.
我们报告了在ID Quantique的旗舰量子密钥分发(QKD)系统Clavis2中发现的几个漏洞。我们展示了在执行密钥交换之前,由Clavis2运行的校准序列的黑客攻击,以同步Alice和Bob设备。这种攻击导致Bob的时间检测效率不匹配,从而允许Eve使用伪造状态破坏密码系统的安全性。我们还实验研究了Bob使用的单光子探测器(SPDs)的超线性行为。由于这种超线性,SPDs具有实际的多光子探测概率,通常高于理论模拟值。我们将展示这如何增加对使用此类spd的QKD系统(包括Clavis2)的检测器控制攻击的风险。最后,我们回顾了木马攻击的实验可行性。在Clavis2的情况下,目标是读取Bob的相位调制器以获取他的基选择的知识,因为该信息足以构建Scarani-Acin-Ribordy-Gisin 2004 (SARG04)协议中的原始密钥。我们与ID Quantique密切合作,对于所有这些漏洞,我们都提前通知了他们。在可能的情况下,我们或ID Quantique提出了对策,他们实施了合适的补丁并升级了他们的系统。
{"title":"Quantum key distribution: vulnerable if imperfectly implemented","authors":"G. Leuchs","doi":"10.1117/12.2033066","DOIUrl":"https://doi.org/10.1117/12.2033066","url":null,"abstract":"We report several vulnerabilities found in Clavis2, the flagship quantum key distribution (QKD) system from ID Quantique. We show the hacking of a calibration sequence run by Clavis2 to synchronize the Alice and Bob devices before performing the secret key exchange. This hack induces a temporal detection efficiency mismatch in Bob that can allow Eve to break the security of the cryptosystem using faked states. We also experimentally investigate the superlinear behaviour in the single-photon detectors (SPDs) used by Bob. Due to this superlinearity, the SPDs feature an actual multi-photon detection probability which is generally higher than the theoretically-modelled value. We show how this increases the risk of detector control attacks on QKD systems (including Clavis2) employing such SPDs. Finally, we review the experimental feasibility of Trojan-horse attacks. In the case of Clavis2, the objective is to read Bob's phase modulator to acquire knowledge of his basis choice as this information suffices for constructing the raw key in the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol. We work in close collaboration with ID Quantique and for all these loopholes, we notified them in advance. Wherever possible, we or ID Quantique proposed countermeasures and they implemented suitable patches and upgrade their systems.","PeriodicalId":344928,"journal":{"name":"Optics/Photonics in Security and Defence","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131889166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of infrared uncooled cameras in surveillance systems 红外非制冷摄像机在监控系统中的应用
Pub Date : 2013-10-25 DOI: 10.1117/12.2028507
R. Dulski, J. Barela, P. Trzaskawka, T. Pia̧tkowski
The recent necessity to protect military bases, convoys and patrols gave serious impact to the development of multisensor security systems for perimeter protection. One of the most important devices used in such systems are IR cameras. The paper discusses technical possibilities and limitations to use uncooled IR camera in a multi-sensor surveillance system for perimeter protection. Effective ranges of detection depend on the class of the sensor used and the observed scene itself. Application of IR camera increases the probability of intruder detection regardless of the time of day or weather conditions. It also simultaneously decreased the false alarm rate produced by the surveillance system. The role of IR cameras in the system was discussed as well as technical possibilities to detect human being. Comparison of commercially available IR cameras, capable to achieve desired ranges was done. The required spatial resolution for detection, recognition and identification was calculated. The simulation of detection ranges was done using a new model for predicting target acquisition performance which uses the Targeting Task Performance (TTP) metric. Like its predecessor, the Johnson criteria, the new model bounds the range performance with image quality. The scope of presented analysis is limited to the estimation of detection, recognition and identification ranges for typical thermal cameras with uncooled microbolometer focal plane arrays. This type of cameras is most widely used in security systems because of competitive price to performance ratio. Detection, recognition and identification range calculations were made, and the appropriate results for the devices with selected technical specifications were compared and discussed.
最近有必要保护军事基地、车队和巡逻队,这严重影响了用于周边保护的多传感器安全系统的发展。在这种系统中使用的最重要的设备之一是红外摄像机。本文讨论了在多传感器周界保护监控系统中使用非制冷红外摄像机的技术可能性和局限性。检测的有效范围取决于所使用的传感器的类别和所观察到的场景本身。红外摄像机的应用增加了入侵者检测的可能性,而不管一天中的时间或天气条件。同时也降低了监控系统产生的虚警率。讨论了红外摄像机在该系统中的作用以及检测人体的技术可能性。比较了市售红外相机,能够达到所需的范围。计算了检测、识别和识别所需的空间分辨率。利用目标任务性能(Targeting Task performance, TTP)指标,建立了一种预测目标捕获性能的新模型,对探测距离进行了仿真。像它的前身,约翰逊标准,新模型限制范围性能与图像质量。本文的分析范围仅限于非冷却微热计焦平面阵列的典型热像仪的检测、识别和识别范围的估计。这种类型的摄像机由于具有竞争力的性价比,在安防系统中应用最为广泛。进行了检测、识别和识别距离的计算,并对所选技术指标的器件的适宜结果进行了比较和讨论。
{"title":"Application of infrared uncooled cameras in surveillance systems","authors":"R. Dulski, J. Barela, P. Trzaskawka, T. Pia̧tkowski","doi":"10.1117/12.2028507","DOIUrl":"https://doi.org/10.1117/12.2028507","url":null,"abstract":"The recent necessity to protect military bases, convoys and patrols gave serious impact to the development of multisensor security systems for perimeter protection. One of the most important devices used in such systems are IR cameras. The paper discusses technical possibilities and limitations to use uncooled IR camera in a multi-sensor surveillance system for perimeter protection. Effective ranges of detection depend on the class of the sensor used and the observed scene itself. Application of IR camera increases the probability of intruder detection regardless of the time of day or weather conditions. It also simultaneously decreased the false alarm rate produced by the surveillance system. The role of IR cameras in the system was discussed as well as technical possibilities to detect human being. Comparison of commercially available IR cameras, capable to achieve desired ranges was done. The required spatial resolution for detection, recognition and identification was calculated. The simulation of detection ranges was done using a new model for predicting target acquisition performance which uses the Targeting Task Performance (TTP) metric. Like its predecessor, the Johnson criteria, the new model bounds the range performance with image quality. The scope of presented analysis is limited to the estimation of detection, recognition and identification ranges for typical thermal cameras with uncooled microbolometer focal plane arrays. This type of cameras is most widely used in security systems because of competitive price to performance ratio. Detection, recognition and identification range calculations were made, and the appropriate results for the devices with selected technical specifications were compared and discussed.","PeriodicalId":344928,"journal":{"name":"Optics/Photonics in Security and Defence","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115101142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trends in infrared imaging detecting technology 红外成像探测技术的发展趋势
Pub Date : 2013-10-25 DOI: 10.1117/12.2032443
J. Fan, Jianyu Yang
In this paper, the current status of infrared imaging detecting technology was introduced briefly. The impact of changes of target, environment and mission on the development of infrared imaging detecting technology was analyzed. The main innovation strategies of infrared imaging detecting technology–modifying information acquisition mode, enhancing realization ability and increasing resources utilization were discussed. The promoting effects of the advancement of basic theories and the revolution of relevant technologies on the development of infrared imaging detecting technology were analyzed. The fundamental law of the development of infrared imaging detecting technology was summarized as stepwise evolution from low into high dimension detection. And the developing trends and main characteristics of future infrared imaging detecting technology were deduced based on this fundamental law. Furthermore, technology directions that should be concerned were introduced according to the development of new concept and technologies for infrared imaging detecting, especially, meeting the new requirements through new concept imaging mechanism such as novel optical technology and computing imaging.
本文简要介绍了红外成像探测技术的现状。分析了目标、环境和任务的变化对红外成像探测技术发展的影响。探讨了红外成像探测技术的主要创新策略——改进信息获取方式、提高实现能力和提高资源利用率。分析了基础理论的进步和相关技术的变革对红外成像探测技术发展的促进作用。红外成像探测技术发展的基本规律是由低维探测逐步向高维探测发展。并在此基础上推导了未来红外成像探测技术的发展趋势和主要特点。根据红外成像探测新概念和新技术的发展,介绍了红外成像探测应关注的技术方向,特别是通过新型光学技术和计算成像等新概念成像机制来满足红外成像探测的新要求。
{"title":"Trends in infrared imaging detecting technology","authors":"J. Fan, Jianyu Yang","doi":"10.1117/12.2032443","DOIUrl":"https://doi.org/10.1117/12.2032443","url":null,"abstract":"In this paper, the current status of infrared imaging detecting technology was introduced briefly. The impact of changes of target, environment and mission on the development of infrared imaging detecting technology was analyzed. The main innovation strategies of infrared imaging detecting technology–modifying information acquisition mode, enhancing realization ability and increasing resources utilization were discussed. The promoting effects of the advancement of basic theories and the revolution of relevant technologies on the development of infrared imaging detecting technology were analyzed. The fundamental law of the development of infrared imaging detecting technology was summarized as stepwise evolution from low into high dimension detection. And the developing trends and main characteristics of future infrared imaging detecting technology were deduced based on this fundamental law. Furthermore, technology directions that should be concerned were introduced according to the development of new concept and technologies for infrared imaging detecting, especially, meeting the new requirements through new concept imaging mechanism such as novel optical technology and computing imaging.","PeriodicalId":344928,"journal":{"name":"Optics/Photonics in Security and Defence","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122351356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
InGaAs infrared detector development for SWIR imaging applications 用于SWIR成像应用的InGaAs红外探测器的开发
Pub Date : 2013-10-25 DOI: 10.1117/12.2026879
F. Rutz, P. Kleinow, R. Aidam, W. Bronner, L. Kirste, M. Walther
We report on materials and technology development for short-wave infrared photodetectors based on InGaAs p-i-n and avalanche photodiodes (APDs). Using molecular beam epitaxy for the growth of thin layers with abrupt interfaces, which are required for optimized APD structures, excellent crystalline quality has been achieved for detector structures grown on 3-inch InP substrates. For the fabrication of focal plane detector arrays, we employed a mesa etching technology in order to compare the results with the commonly utilized planar technology. Camera detector arrays as well as test structures with various sizes and geometries for materials and process characterization are processed using a dry-etch mesa technology. Aspects of the process development are presented along with measured dark-current and photo-current characteristics of the detector devices.
本文报道了基于InGaAs - p-i-n和雪崩光电二极管(APDs)的短波红外探测器的材料和技术进展。利用分子束外延技术生长具有突变界面的薄层(这是优化APD结构所必需的),在3英寸InP衬底上生长的探测器结构获得了优异的晶体质量。对于焦平面探测器阵列的制作,我们采用了台面刻蚀技术,以便与常用的平面刻蚀技术的结果进行比较。相机探测器阵列以及具有各种尺寸和几何形状的材料和工艺表征的测试结构使用干蚀刻平台技术进行处理。介绍了该工艺发展的各个方面,并测量了探测器器件的暗电流和光电流特性。
{"title":"InGaAs infrared detector development for SWIR imaging applications","authors":"F. Rutz, P. Kleinow, R. Aidam, W. Bronner, L. Kirste, M. Walther","doi":"10.1117/12.2026879","DOIUrl":"https://doi.org/10.1117/12.2026879","url":null,"abstract":"We report on materials and technology development for short-wave infrared photodetectors based on InGaAs p-i-n and avalanche photodiodes (APDs). Using molecular beam epitaxy for the growth of thin layers with abrupt interfaces, which are required for optimized APD structures, excellent crystalline quality has been achieved for detector structures grown on 3-inch InP substrates. For the fabrication of focal plane detector arrays, we employed a mesa etching technology in order to compare the results with the commonly utilized planar technology. Camera detector arrays as well as test structures with various sizes and geometries for materials and process characterization are processed using a dry-etch mesa technology. Aspects of the process development are presented along with measured dark-current and photo-current characteristics of the detector devices.","PeriodicalId":344928,"journal":{"name":"Optics/Photonics in Security and Defence","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114881236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Two-lens designs for modern uncooled and cooled IR imaging devices 现代非冷却和冷却红外成像设备的双镜头设计
Pub Date : 2013-10-25 DOI: 10.1117/12.2028716
N. Schuster, J. Franks
In recent years, thermal detectors with a 17 μm pixel pitch have become well-established for use in various applications, such as thermal imaging in cars. This has allowed the civilian infrared market to steadily mature. The main cost for these lens designs comes from the number of lenses used. The development of thermal detectors, which are less sensitive than quantum detectors, has compelled camera manufacturers to demand very fast F-numbers such as f/1.2 or faster. This also minimizes the impact of diffraction in the 8-12 μmm waveband. The freedom afforded by the choice of the stop position in these designs has been used to create high-resolution lenses that operate near the diffraction limit. Based on GASIR®1, a chalcogenide glass, two-lens designs have been developed for all pixel counts and fields of view. Additionally, all these designs have been passively athermalized, either optically or mechanically. Lenses for cooled quantum detectors have a defined stop position called the cold stop (CS) near the FPA-plane. The solid angle defined by the CS fixes not only the F-number (which is less fast than for thermal detectors), but determines also the required resolution. The main cost driver of these designs is the lens diameter. Lenses must be sufficiently large to avoid any vignetting of ray bundles intended to reach the cooled detector. This paper studies the transfer of approved lens design principles for thermal detectors to lenses for cooled quantum detectors with CS for same pixel count at three horizontal fields of view: a 28° medium field lens, an 8° narrow field lens, and a 90° wide field lens. The lens arrangements found for each category have similar lens costs.
近年来,具有17 μm像素间距的热探测器已经在各种应用中得到了广泛的应用,例如汽车热成像。这使得民用红外市场稳步成熟。这些镜头设计的主要成本来自所用镜头的数量。热探测器的发展不如量子探测器灵敏,迫使相机制造商要求非常快的f值,如f/1.2或更快。这也使衍射在8-12 μmm波段的影响最小化。在这些设计中,由选择止光位置所提供的自由已被用于创建接近衍射极限的高分辨率镜头。基于GASIR®1,一种硫系玻璃,双镜头设计已开发用于所有像素计数和视野。此外,所有这些设计都是被动热化的,无论是光学的还是机械的。用于冷却量子探测器的透镜在fpa平面附近有一个定义的停止位置,称为冷停止(CS)。CS定义的立体角不仅确定了f值(比热探测器要慢),而且还确定了所需的分辨率。这些设计的主要成本驱动因素是镜头直径。透镜必须足够大,以避免到达冷却探测器的射线束的任何渐晕。本文研究了在28°中视场透镜、8°窄视场透镜和90°宽视场透镜三种水平视场条件下,热探测器透镜设计原理在CS冷却量子探测器透镜上的应用。每种类型的镜头安排都有类似的镜头成本。
{"title":"Two-lens designs for modern uncooled and cooled IR imaging devices","authors":"N. Schuster, J. Franks","doi":"10.1117/12.2028716","DOIUrl":"https://doi.org/10.1117/12.2028716","url":null,"abstract":"In recent years, thermal detectors with a 17 μm pixel pitch have become well-established for use in various applications, such as thermal imaging in cars. This has allowed the civilian infrared market to steadily mature. The main cost for these lens designs comes from the number of lenses used. The development of thermal detectors, which are less sensitive than quantum detectors, has compelled camera manufacturers to demand very fast F-numbers such as f/1.2 or faster. This also minimizes the impact of diffraction in the 8-12 μmm waveband. The freedom afforded by the choice of the stop position in these designs has been used to create high-resolution lenses that operate near the diffraction limit. Based on GASIR®1, a chalcogenide glass, two-lens designs have been developed for all pixel counts and fields of view. Additionally, all these designs have been passively athermalized, either optically or mechanically. Lenses for cooled quantum detectors have a defined stop position called the cold stop (CS) near the FPA-plane. The solid angle defined by the CS fixes not only the F-number (which is less fast than for thermal detectors), but determines also the required resolution. The main cost driver of these designs is the lens diameter. Lenses must be sufficiently large to avoid any vignetting of ray bundles intended to reach the cooled detector. This paper studies the transfer of approved lens design principles for thermal detectors to lenses for cooled quantum detectors with CS for same pixel count at three horizontal fields of view: a 28° medium field lens, an 8° narrow field lens, and a 90° wide field lens. The lens arrangements found for each category have similar lens costs.","PeriodicalId":344928,"journal":{"name":"Optics/Photonics in Security and Defence","volume":"8896 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131287235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on laser protection: an overview of 20 years of activities at Fraunhofer IOSB 激光防护研究:弗劳恩霍夫IOSB 20年活动综述
Pub Date : 2013-10-25 DOI: 10.1117/12.2029083
G. Ritt, D. Walter, B. Eberle
Since the advent of the laser in 1960, the protection of human eyes and sensors against intended or unintended damage by laser radiation is a hot research topic. As long as the parameters of a laser source such as the wavelength and the output power are known, adequate laser safety can be ensured simply by utilizing conventional laser protection filters which are based on absorption or interference effects. This is typically the case in cooperative environments like a laboratory or industrial facilities. A very different situation prevails in military defense or civil security. There, the parameters of encountering laser threats are usually unknown. Protection measures, helping against all types of laser threats, are the long desired objective of countless research activities. The biggest challenge in finding an effective measure arises from single laser pulses of unknown wavelength. The problem demands for a passive protection concept and may be based for example on intensity dependent effects. Moreover, the requested solutions shall comprise add-on possibilities like thin films to be put on existing optics, windshields or glasses. Unfortunately, such an all-embracing solution is still far out of reach. The Fraunhofer IOSB has been working on the evaluation and development of non-conventional laser protection methods for more than 20 years. An overview of the past and present research activities shall be presented, comprising protection measures against laser damaging and laser dazzling.
自1960年激光问世以来,保护人眼和传感器免受激光辐射有意或无意的伤害一直是一个热门的研究课题。只要一个激光源的参数,如波长和输出功率是已知的,充分的激光安全可以确保简单地利用传统的激光保护滤波器,这是基于吸收或干扰效应。这在实验室或工业设施等合作环境中是典型的情况。军事防御或民事安全的情况则截然不同。在那里,遇到激光威胁的参数通常是未知的。保护措施,帮助抵御各种类型的激光威胁,是无数研究活动长期以来所期望的目标。寻找有效测量方法的最大挑战来自波长未知的单个激光脉冲。这个问题需要一种被动保护概念,例如可以基于强度依赖效应。此外,所要求的解决方案应包括附加的可能性,如将薄膜放在现有的光学器件,挡风玻璃或玻璃上。不幸的是,这样一个包罗万象的解决方案仍然遥不可及。20多年来,Fraunhofer IOSB一直致力于非常规激光防护方法的评估和开发。概述了过去和现在的研究活动,包括激光损伤和激光眩光的防护措施。
{"title":"Research on laser protection: an overview of 20 years of activities at Fraunhofer IOSB","authors":"G. Ritt, D. Walter, B. Eberle","doi":"10.1117/12.2029083","DOIUrl":"https://doi.org/10.1117/12.2029083","url":null,"abstract":"Since the advent of the laser in 1960, the protection of human eyes and sensors against intended or unintended damage by laser radiation is a hot research topic. As long as the parameters of a laser source such as the wavelength and the output power are known, adequate laser safety can be ensured simply by utilizing conventional laser protection filters which are based on absorption or interference effects. This is typically the case in cooperative environments like a laboratory or industrial facilities. A very different situation prevails in military defense or civil security. There, the parameters of encountering laser threats are usually unknown. Protection measures, helping against all types of laser threats, are the long desired objective of countless research activities. The biggest challenge in finding an effective measure arises from single laser pulses of unknown wavelength. The problem demands for a passive protection concept and may be based for example on intensity dependent effects. Moreover, the requested solutions shall comprise add-on possibilities like thin films to be put on existing optics, windshields or glasses. Unfortunately, such an all-embracing solution is still far out of reach. The Fraunhofer IOSB has been working on the evaluation and development of non-conventional laser protection methods for more than 20 years. An overview of the past and present research activities shall be presented, comprising protection measures against laser damaging and laser dazzling.","PeriodicalId":344928,"journal":{"name":"Optics/Photonics in Security and Defence","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127870287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
Optics/Photonics in Security and Defence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1