Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

High-security optical transmission system with multi-dimensional multiplexing based on quaternion chaotic encryption

Open Access Open Access

Abstract

In this paper, we propose a multi-dimensional multiplexing scheme for space division multiplexing optical transmission systems based on quaternion chaotic encryption. A constellation compression shaping mapping method is designed to replace the traditional 2n mapping scheme, which leads to flexible encoding modulation. In order to achieve orthogonality between data symbols and effectively suppress crosstalk, the spectrally superposed transmission of three-dimensional (3D) constellation data is carried out by code division multiplexing and 4D carrier-less amplitude phase joint modulation techniques based on orthogonal basis. The Chen's chaotic model is utilized to generate the rotation angle of the constellation points, which enables data encryption without changing the transmitted power, enhancing system’s security. The feasibility and superiority of the proposed scheme are successfully verified by constructing an experimental platform for a seven-core fiber transmission system.

© 2023 Optica Publishing Group under the terms of the Optica Open Access Publishing Agreement

1. Introduction

The large-scale use of 5 G has spawned many burgeoning applications and industries, such as the meta-universe, intelligent industrial parks, and Internet of Things (IoT). The smart industry, smart society and smart home of the future cannot be separated from the support of fiber backbone networks with higher speeds and larger capacity. In recent years, space division multiplexing (SDM) optical transmission has been regarded as the second revolution of optical fiber transmission technology after wavelength division multiplexing (WDM) technology, which has been accorded great importance by various national scientific research institutions [1,2]. Theoretical models, coding modulation techniques, system hardware, optoelectronic materials, system algorithms, and other areas have seen significant advancements in the study up to this point [16]. While the advent of new sectors like IoT has simplified people’s lives, its rapid growth has raised some complex data security concerns. How to prevent the theft or destruction of the data generated, shared, and collected by more than 10 billion smart devices is, however, a complex and challenging problem to resolve.

To further facilitate the transmission capacity of space division multiplexing optical transmission system, only in terms of coding modulation, it is necessary to use high-order modulation format, orthogonal multiplexing schemes, and high-dimension coding as many as possible to apply all available degrees of freedom on optical fiber transmission systems [7]. The best way to improve optical transmission rate, capacity, or spectral efficiency of space division multiplexing is to employ multi-dimensional multiplexing and high-dimensional constellations. To transmit data at Tbit/s, 16-ary quadrature amplitude and phase modulation (16-QAM) was implemented in a THz-over-Fiber wireless communication system that combines WDM and SDM [8]. Chen et al. reported a 25-channel WDM system with polarization division multiplexing 16-QAM transmitting over 800 km standard single-mode fiber, utilizing nonlinear frequency division multiplexing and artificial neural network-based nonlinear spectrum equalization [9]. A four-dimensional constellation was established by gradually decomposing and superimposing the low-dimensional constellation, which was successfully demonstrated in seven-core optical fiber transmission [10]. However, to data, there has been no consummate design scheme for high-dimensional or multi-dimensional modulation format for space division multiplexing optical transmission systems. Therefore, the multi-dimensional multiplexing and high-dimensional constellation-coded modulation schemes must be further investigated.

Information resources are a source of strength to promote the high-quality development of the social digital economy. The safe and efficient circulation and use of information resources can stimulate the potential of information elements, energize the real economy and comprehensively promote the progress of various industries. Thus, the secure optical transmission of data is a major challenge facing the world [11]. Physical layer encryption is often utilized as a high-security optical transmission scheme in optical fiber transmission systems. Chaotic encryption is the most commonly used data encryption method due to its superior characteristics such as noise-like, high parameter key based sensitivity, and large bandwidth [1218]. In most cases, it immediately affects either the phase or amplitude. One is to randomly swap the locations of the constellation points, and the other is to randomly compensate or rotate the phase of the constellation points. Bowen Zhu et al. used random interleaving to encrypt probabilistic shaping 64-QAM signals in the intensity modulation and direct detection (IM/DD) discrete multi-tone transmission system [12]. Chaotic neural network and nonlinear encryption were applied to the orthogonal frequency division multiplexing (OFDM) WDM-PON system. A key sensitivity of 10−15 and a key space of more than 10279 were achieved [13]. It can be seen that physical layer high-dimensional constellation encryption has the potential to become a research hotspot [14,15].

This paper proposes a multi-dimensional multiplexed high-security transmission scheme based on quaternion chaotic encryption. Three-dimensional (3D) 24-ary constellation mapping is designed by constellation compression shaping (CCS), and three-dimensional constellation points are encrypted by quaternion chaotic encryption, eliminating the singularity of rotation of 3D constellation points and reducing redundancy. Quaternion chaotic encryption is a unique encryption method that involves constellation perturbation and rotation. This method utilizes the chaotic sequences generated by the Chen’s chaos model to rotate the three-dimensional constellation points, resulting in the encryption of data. The encrypted data are formed into data to be sent through code division multiplexing and four-dimensional carrier-less amplitude phase (4D-CAP) joint modulation to implement orthogonal multiplexing and dimensionality reduction transmission. Incidentally, the orthogonal basis of code division multiplexing and 4D-CAP also has the characteristics of data encryption, which can be considered as secondary encryption. A multi-core optical transmission experimental system has successfully demonstrated the viability and security of multi-dimensional multiplexing transmission systems.

2. Principle

The multi-dimensional multiplexed high-security optical transmission scheme based on quaternion chaotic encryption is shown in a block diagram in Fig. 1. A pseudo-random binary sequence generates original data on the transmitting side. The original data $\{ {b_i}\}$ becomes a parallel data stream after series-to-parallel (S/P) conversion. The sequence of 3D constellations is obtained from a parallel data stream of 3D constellation compression shaping modulation. More specifically, Chen's chaotic circuit generates 3D chaotic sequences (X, Y, Z), which is transformed into a set of rotational angles ${\{ \phi ,\theta ,\varphi \} _i}$ during quaternion rotational encryption. Namely, quaternion encryption consists of rotating the 3D constellation points around the three axes x, y and z, respectively, and setting the angle as $\phi ,\theta ,\varphi$. Chen's chaotic circuit’s parameters and initial values are set as keys here. The training sequence is then added to the encrypted data to get the data stream $\{ {m_{ij}}\}$ generated from the CCS-16-8 constellation mapping table, which can be considered a reference standard for equalization compensation of received data. The data stream $\{ {m_{ij}}\}$ is multiplied by the orthogonal matrix H of the code division multiplexing to obtain a multiplexed parallel data stream. A 4D-CAP technique based on orthogonal basis is employed to stack multiplexed parallel data streams to implement the transmitted data $\{ {s_i}\}$. The transmitted data arrives at the receiver via a multi-core fiber transmission link. For the received data, 4D-CAP demodulation and code division demodulation are performed first, and then the training sequence is removed from the received data. To balance and compensate for the separated information at the receiver, the training sequence is required due to the presence of phase noise and power loss. Then the quaternion decryption, 3D constellation de-mapping, and decompression are performed on the compensated data successively to recover the binary data at the receiver. Finally, the bit error rate (BER) is calculated as the evaluation parameter of system transmission performance.

 figure: Fig. 1.

Fig. 1. Block diagram of multi-dimensional multiplexing high-security optical transmission scheme based on quaternion chaotic encryption.

Download Full Size | PDF

2.1 Three-dimensional constellation compression shaping modulation and demodulation methods

The constellation compression shaping modulation is designed to construct a 3D non-2n constellation model. Figure 2(a), (b) show the flow diagram of 3D CCS modulation and demodulation. As shown in Fig. 2(a), the constellation compression modulation [19] is adopted to convert 32-ary modulation format into 16-ary and 16-ary into 8-ary, respectively. The resulting data are marked as CCS-32-16 and CCS-16-8. In addition, the encoding diagram of constellation compression modulation of CCS-32-16 is illustrated in Fig. 2(c). The squares represent a symbol, and the squares with different colors represent different symbols. After that, convert one or more $\{ {b_1}{b_2}{b_3}{b_4}{b_5}\}$ to $\{ b_1^{\prime}b_2^{\prime}b_3^{\prime}b_4^{\prime}\}$, and then label $\{ {m_1}{m_2}\}$ to get the final data $\{ b_1^{\prime}b_2^{\prime}b_3^{\prime}b_4^{\prime}{m_1}{m_2}\}$. The CCS modulation also has the effect of probabilistic shaping. The probability ratio of “0” and “1” of CCS data is about 0.64:0.36. Afterwards, CCS-32-16 and CCS-16-8 are mapped to 3D constellation points, respectively.

 figure: Fig. 2.

Fig. 2. The flow diagram of 3D constellation compression shaping: (a) modulation and (b) demodulation, (c) schematic diagram of CCS-32-16 encoding.

Download Full Size | PDF

Additionally, Table 1 provides the mapping relationships between constellation point coordinates and binary data. The average energy of the 3D data stream after CCS data mapping is about 2.31. The demodulation flow diagram of 3D constellation compression shaping is shown in Fig. 2(b). After constellation de-mapping, data recovery employs constellation decompression.

Tables Icon

Table 1. Mapping relations between binary data and coordinates of 3D constellation points

The 3D constellation map procedure proposed in this paper is shown in Fig. 3.

  • 1) The CCS-16-8 symbols are mapped to the eight vertices of the cube centered on the origin in the three-dimensional constellation diagram, as shown in Fig. 3(a);
  • 2) To create four vertices, take four CCS-32-16 symbols and transfer them to the cube’s four sides like a standard tetrahedron. Connecting lines have nicely finished off shown in Fig. 3(b);
  • 3) The other twelve CCS-32-16 symbols are mapped respectively to the vertices of an equilateral triangle with the twelve sides of the cube as the base and an angle of 45 degrees to get the final three-dimensional constellation diagram like in Fig. 3(e).

 figure: Fig. 3.

Fig. 3. (a)-(e) The 3D constellation design flow chart, (f)-(h) different views of the 3D constellation.

Download Full Size | PDF

If only the twelve constellation points are connected, Fig. 3(c) is finished. To observe the three-dimensional constellation map more directly, we connect all constellation points differently, and Fig. 3(d) and (e) are represented, respectively. Moreover, Fig. 3(f) and (g) are the front view and top view of (e), respectively. And the left view of (e) is the same as the front view (f). Figure 3(h) is a top view of (d).

2.2 Quaternion Chen's chaotic encryption method

To increase data transmission security, we propose a quaternion chaotic encryption method. The main application of quaternions is to rotate the 3D constellation coordinates. In contrast to a rotation matrix, rotation vector, and Euler angle, quaternions are compact, have no singularities, and do not lose freedom. At first, chaotic sequences (X, Y, Z) are generated by Chen's circuit, and its mathematical model [20] is as follows:

$$\left\{ \begin{array}{l} \frac{{dx}}{{dt}} = a[y - x]\\ \frac{{dy}}{{dt}} = (c - a)x - xz + cy\\ \frac{{dz}}{{dt}} = xy - bz \end{array} \right.$$
where a, b, and c are constants, and their values are 35, 3, and 28, respectively [2122]. These values can give the system a unique chaotic attractor and present a chaotic state. $\frac{{d\cdot }}{{dt}}$ is the derivative of a variable. Figure 4 gives Chen's chaotic data diagram and different Poincare cross sections. Chen's chaotic system has the characteristics of non-topological equivalence and is more complex. As seen from Fig. 4(b),(c), the points in the section are dense and have certain levels, so we consider that the generated data is chaotic.

 figure: Fig. 4.

Fig. 4. Phase diagram of chaotic model: (a) about xyz axis, (b) about variables xy axis, and (c) about yz axis; constellation diagram: (d) before quaternion chaotic encryption, (e) after quaternion rotation encryption, (f) a quaternion rotation example.

Download Full Size | PDF

The rotation encryption angle ${\{ \phi ,\theta ,\varphi \} _i}$ of three-dimensional constellation points is transformed from chaotic sequences ${\{ X,Y,Z\} _i}$:

$$\left\{ \begin{array}{l} {\phi_i} = {X_i}/180\ast \pi \\ {\theta_i} = {Y_i}/180\ast \pi \\ {\varphi_i} = {Z_i}/180\ast \pi \end{array} \right.$$

The quaternion form of rotation angles ${\{ \phi ,\theta ,\varphi \} _i}$ are:

$$\left\{ \begin{array}{l} {q_i} = [\cos (\theta /2),0,0,\sin (\theta /2)]\\ {q_j} = [\cos (\phi /2),0,\sin (\phi /2),0]\\ {q_k} = [\cos (\varphi /2),\sin (\varphi /2),0,0] \end{array} \right.$$
where, ${q_i}$, ${q_j}$, and ${q_k}$ are quaternions of the x-axis, y-axis, and z-axis, respectively. To implement the rotation of the 3D constellation points, we set the constellation coordinate (x, y, z) of information data to be pure quaternion vectors: $v = [0,x,y,z]$, and encrypt them by quaternion rotation using the following formula:
$$\left\{ \begin{array}{l} q = {q_i}{q_j}{q_k}\\ h = {q^{ - 1}}vq \end{array} \right.$$
where h is the quaternion encrypted matrix, and the second to fourth bits of h is the new coordinate (x’, y’, z’) value obtained after rotation of constellation point (x, y, z). The obtained coordinate (x’, y’, z’) value is used for the input of next modulation. Moreover, the constellation diagram before and after quaternion encryption is displayed in Fig. 4(d),(e). The constellation diagram after quaternion chaos encryption is disordered. Figure 4(f) reveals the schematic diagram of the new constellation point (0.29289, 1.20711, 1.20711) after constellation point (1,1,1) rotated by quaternion (45, 45, 45) degrees.

2.3 Code division multiplexing and 4D-CAP joint modulation method based on orthogonal basis

To reduce the symbolic crosstalk during 3D data transmission, we apply the code division multiplexing and 4D-CAP joint modulation based on orthogonal basis to modulate the data. First, an orthogonal transformation is applied to the data stream after quaternion encryption:

$$\begin{array}{l} H = {[1,1,1,1; - 1,1, - 1,1; - 1,1,1, - 1]^T} = [{{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over c} }_0},{{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over c} }_1},{{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over c} }_2}]\\ {s_{code}} = H \times {[{{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over m} }_x},{{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over m} }_y},{{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over m} }_z}]^T} = {{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over c} }_0}{{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over m} }_x} + {{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over c} }_1}{{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over m} }_x} + {{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over c} }_2}{{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over m} }_z} \end{array}$$
here, H is the orthogonal matrix, ${s_{code}}$ contains four groups of orthogonal data streams after modulation, and $\{ {m_i}\}$ is the data stream after adding the training sequence. The illegal receiver cannot get the information correctly if the orthogonal matrix H is unknown. Based on the principle of reuse and related theories of trigonometric orthogonal functions, the following functions can be selected as the orthogonal basis of 4D-CAP modulation [10]:
$$\left\{ \begin{array}{l} {f_1} = \cos ({\beta_1} \cdot (1 + \alpha ) \cdot t) \cdot r\cos (t)\\ {f_2} = \sin ({\beta_1} \cdot (1 + \alpha ) \cdot t) \cdot r\cos (t)\\ {f_3} = \cos ({\beta_2} \cdot (1 + \alpha ) \cdot t) \cdot r\cos (t)\\ {f_4} = \sin ({\beta_2} \cdot (1 + \alpha ) \cdot t) \cdot r\cos (t) \end{array} \right.$$
where, ${f_ \bullet }$ stands for orthogonal basis function, ${\beta _ \bullet }$ for positive integer, $\alpha = 0.2$ for filter bank-roll down coefficient, $r\cos ({\bullet} )$ for raised cosine square root function, t for discrete interpolation within a period of the trigonometric function in the range of symmetric phase. The convergence of the inner product of a function can be insufficient due to the influence of orthogonal function sampling points, necessitating the iterative selection of orthogonal functions via different $\beta$-values until a satisfactory orthogonal basis function is reached. The system of trigonometric functions can be expanded to obtain the extended term radical raised cosine function, which guarantees orthogonality between carriers through its symmetry and enables signal carrier loading and filtering correction. Essentially, the orthogonal basis function falls under wavelength division multiplexing, wherein pairwise orthogonal function is achieved through the orthogonal isolation between different carriers. The waveforms of the 4D-CAP filters are shown in Fig. 5. Eventually, the sent data can be obtained by convolving and superimposing the orthogonal data streams with the 4D-CAP orthogonal basis.

 figure: Fig. 5.

Fig. 5. Waveform of the 4D-CAP forming filter.

Download Full Size | PDF

3. Experiments and results

We construct a seven-core optical fiber transmission system, shown in Fig. 6, to verify the feasibility of multi-dimensional multiplexing optical transmission based on quaternion chaotic encryption. At the transmitter, offline digital signal processing (DSP) performs constellation compression shaping modulation, chaotic encryption, adding training sequences, code division multiplexing, and 4D-CAP joint modulation on the original data to generate the encryption data for transmission. The transmitted digital data is converted to analog data by an arbitrary waveform generator (AWG, TekAWG70002A) with a sampling rate of 25 GSa/s. The radio frequency signal is amplified by an electric amplifier and fed into a Mach-Zehnder modulator (MZM) for intensity modulation. In this experiment system, an external cavity laser is employed to produce 193.4 THz, 1550 nm, 14.5 dBm output light as the optical input of MZM. After that, the output data is amplified by an erbium-doped fiber amplifier to ensure that the seven-core fiber has enough input optical power. The seven-core fiber adopted is a commercial weak-coupled multi-core fiber with single core, coating and cladding diameters of 8 µm, 245 µm and 150 µm, respectively, and core spacing of 41.5 µm. The amplified data is coupled by an optical coupler and then transmitted through a fan-in the device to a 2 km seven-core weakly coupled fiber for transmission. The fan-out device separates the seven cores of the data and transmits them separately through a single-core optical fiber. A variable optical attenuator is adopted to adjust the received optical power for measurement. The received data is converted into digital data by a photodiode, and then collected by a mixed signal oscilloscope (MSO, TekMSO73304DX) with a sampling rate of 50 GSa/s. Finally, the offline DSP is used to demodulate, decrypt, and recover the data in the receiving end.

 figure: Fig. 6.

Fig. 6. Experimental setups (DSP: digital signal processing, ECL: external cavity laser, AWG: arbitrary waveform generator, EA: electrical amplifier, MZM: Mach-Zehnder modulator, EDFA: erbium-doped fiber amplifier, OC: optical coupler, MCF: multi-core fiber, VOA: variable optical attenuator, PD: photodiode, MSO: mixed signal oscilloscope).

Download Full Size | PDF

Figure 7 illustrates the BER of multidimensional multiplexed data with quaternion chaotic encryption after transmission through a seven-core fiber as a function of the received optical power. As can be seen in Fig. 7, the measured BER curves of seven fiber cores after the transmission follow the same trend, and the transmitted BER curves are consistent with the principles of information theory. When the BER is 3.8×10−3, the maximum difference of received optical power between fiber cores is about 1.14 dB. As the received optical power increases, the difference in the receiving sensitivity between the fiber cores increases. This phenomenon is because, in addition to a non-uniform core loss per core during the fabrication of a multi-core fiber, there is also a large amount of information carried by the 3D signal, resulting in a large contribution of symbol discrimination to the BER. Besides, Fig. 7 also shows that the BER received by the illegal receiver is around 0.5, and the illegal receiver cannot get the correct information under regular interception. In addition, when the received optical power is further increased to -6 dBm or even greater, the system always measures a BER of 0. This is because the initial information bit is around 104, hence the lowest achievable BER is only on the order of 10−4. By increasing the amount of initial information bit, we can achieve a smaller BER. Figure 8 gives the constellation obtained by illegal and legitimate reception of core 4 after transmission, when the received optical power is -8 dBm. Figure 8(a)-(c) shows the 3D constellation image received illegally and its projection on the x-y and x-z planes, while Fig. 8(d)-(f) shows the 3D constellation obtained normally and its projection on the x-y and x-z planes. This also indicates that our proposed quaternion chaotic encryption method is efficient and viable, and can make transmission more secure.

 figure: Fig. 7.

Fig. 7. The BER varies with received optical power after a 2 km seven-core optical transmission.

Download Full Size | PDF

 figure: Fig. 8.

Fig. 8. Constellations of illegal and legal reception: (a) illegal constellation, (b) x-y plane projection of (a), (c) x-z plane projection of (a), (d) legal constellation, (e) x-y plane projection of (d), (f) x-z plane projection of (d).

Download Full Size | PDF

We thoroughly investigate the sensitively of the initial values and circuit parameters to determine the proposed system’s encryption security level. After multi-core fiber transmission, when the received optical power is -7 dBm, the initial value (x0, y0, z0) of core 7 is set to (0.20, -0.10, 0.20). As shown in Fig. 9(a), when x0 changes by 10−17, or y0 changes by 10−18, or z0 changes by 10−16, the BER obtained is the same as that under the correct key, but once it is greater than this critical value, BER will be increased significantly, even close to 0.5, and this means that the information cannot be recovered correctly. The subfigure in Fig. 9(a) shows the difference between the chaotic sequence at the initial value of x0 and the chaotic sequence when x0 is varied by 10−16. The two lines are different; hence, it can be found that our proposed quaternion chaotic encryption method is hypersensitive to the initial values. It can be seen from Fig. 9(b) that the system is also highly sensitive to the circuit parameters (a, b, c) of Chen's chaotic model. When a changes to 10−16, or b changes to 10−17, or c changes to 10−16, there is no obvious change in the BER compared to the original correct parameter value. When the change of the circuit parameter a is larger than 10−15, the BER of system is dramatically increased and has no significant change when it continues to increase. Similar conclusions can be drawn for circuit parameters b and c.

 figure: Fig. 9.

Fig. 9. Chaotic system sensitivity: (a) initial values and (b) circuit parameters.

Download Full Size | PDF

We send a picture of a dog standing on grass into the proposed system in order to further investigate the efficacy of our encryption approach in information transfer. Figure 10(a), (d) present the image and its histogram before encryption. Following encryption, the illegally received image and histogram are shown in Fig. 10(b), (e), while the normally received image and histogram are displayed in Fig. 10(c), (f). It is evident that the illegal receiver fails to properly receive the image compared to the normal receiver. Additionally, the histograms of illegal decryption differ significantly from those of normal decryption, resulting in blurry images. This demonstrates the illegal receiver’s inability to decipher any meaningful information. Furthermore, Fig. 11 showcases the normal and illegal information bit stream received before and after encryption. It is also apparent that illegal reception fails to retrieve the correct information, underscoring the importance of accurate decryption operations.

 figure: Fig. 10.

Fig. 10. Images: (a) before encryption, (b) after illegal reception, (c) after normal reception, and histograms: (d) before encryption, (e) after illegal reception, (f) after normal reception.

Download Full Size | PDF

 figure: Fig. 11.

Fig. 11. The information bit stream: (a) before encryption, (b) after illegal reception, and (c) after normal reception.

Download Full Size | PDF

4. Conclusions

The paper proposes a high-security multi-core optical transmission method based on quaternion encryption. 3D coded modulation is used in conjunction with constellation compression shaping, constellation design recombination, and mapping to make high-dimensional constellation construction formation easier. The 3D constellation points are mixed up in quaternion chaotic encryption, which increases the information’s chaos and security. The 4D-CAP signal is successfully transmitted over a seven-core optical fiber. The experimental results demonstrated that under legal reception, when the BER is 3.8×10−3, the maximum difference of the received optical power between the fiber cores is 1.14 dB. Since the illegal receiver cannot get the correct information, the proposed scheme is feasible and has strong security. Multi-dimensional multiplexed coded modulation based on quaternion chaotic encryption has broad application prospects in multi-dimensional multi-core optical transmission in the future.

Funding

National Key Research and Development Program of China (2018YFB1800901); National Natural Science Foundation of China (61835005, 61935005, 62171227, 62205151, 62225503); Jiangsu Provincial Key Research and Development Program (BE2022055-2, BE2022079); The Natural Science Foundation of the Jiangsu Higher Education Institutions of China (22KJB510031); The Startup Foundation for Introducing Talent of NUIST.

Disclosures

The authors declare no conflicts of interest.

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

References

1. B. J. Puttnam, G. Rademacher, and R. S. Luís, “Space-division multiplexing for optical fiber communications,” Optica 8(9), 1186–1203 (2021). [CrossRef]  

2. D. J. Richardson, J. M. Fini, and L. E. Nelson, “Space-division multiplexing in optical fibers,” Nat. Photonics 7(5), 354–362 (2013). [CrossRef]  

3. Z. Yang, W. Yu, G. Peng, Y. Liu, and L. Zhang, “Recent progress on novel DSP techniques for mode division multiplexing systems: a review,” Appl. Sci. 11(4), 1363 (2021). [CrossRef]  

4. D. L. Butler, M. J. Li, S. Li, Y. Geng, R. R. Khrapko, R. A. Modavis, V. N. Nazarov, and A. V. Koklyushkin, “Space division multiplexing in short reach optical interconnects,” J. Lightwave Technol. 35(4), 677–682 (2017). [CrossRef]  

5. S. N. Khonina, N. L. Kazanskiy, M. A. Butt, and S. V. Karpeev, “Optical multiplexing techniques and their marriage for on-chip and optical fiber communication: a review,” Opto-Electron. Adv. 5(8), 210127 (2022). [CrossRef]  

6. H. Hu and L. K. Oxenløwe, “Chip-based optical frequency combs for high-capacity optical communications,” Nanophotonics 10(5), 1367–1385 (2021). [CrossRef]  

7. A. Yi, L. Yan, Y. Pan, L. Jiang, Z. Chen, W. Pan, and B. Luo, “Transmission of multi-dimensional signals for next generation optical communication systems,” Opt. Commun. 408, 42–52 (2018). [CrossRef]  

8. H. Zhang, L. Zhang, S. Wang, Z. Lu, Z. Yang, S. Liu, M. Qiao, Y. He, X. Pang, X. Zhang, and X. Yu, “Tbit/s multi-dimensional multiplexing THz-over-fiber for 6 G wireless communication,” J. Lightwave Technol. 39(18), 5783–5790 (2021). [CrossRef]  

9. X. Chen, X. Fang, F. Yang, and F. Zhang, “10.83 Tb/s over 800 km nonlinear frequency division multiplexing WDM transmission,” J. Lightwave Technol. 40(16), 5385–5394 (2022). [CrossRef]  

10. X. Wu, B. Liu, Y. Ma, X. Zhu, J. Ren, Y. Mao, Q. Zhong, S. Chen, Y. Bai, J. Zhao, L. Jiang, and X. Song, “4-D constellation construction and encryption scheme based on bit-level dimension dissecting and reorganization,” Opt. Express 31(3), 3638–3650 (2023). [CrossRef]  

11. B. Wu, B. J. Shastri, P. Mittal, A. N. Tait, and P. R. Prucnal, “Optical signal processing and stealth transmission for privacy,” IEEE J. Sel. Top. Signal Process. 9(7), 1185–1194 (2015). [CrossRef]  

12. B. Zhu, F. Wang, and J. Yu, “A chaotic encryption scheme in DMT for IM/DD intra-datacenter interconnects,” IEEE Photon. Technol. Lett. 33(8), 383–386 (2021). [CrossRef]  

13. M. Li, J. Ren, Y. Mao, X. Song, S. Chen, S. Han, J. Zhao, Y. Wan, F. Tian, and B. Liu, “Flexible non-linear physical security coding scheme combined with chaotic neural network for OFDM-WDM-PON,” Opt. Express 29(16), 25848–25858 (2021). [CrossRef]  

14. Y. Chen, J. Chen, M. Zhang, W. Li, D. Liu, and M. Tang, “High-security constellation shaped self-homodyne coherent system with 4-D joint encryption,” Opt. Express 31(2), 3153–3167 (2023). [CrossRef]  

15. S. Chen, B. Liu, J. Ren, Y. Mao, R. Ullah, X. Song, Y. Bai, L. Jiang, S. Han, J. Zhao, Y. Wan, X. Zhu, and J. Shen, “A 7D cellular neural network based OQAM-FBMC encryption scheme for seven core fiber,” J. Lightwave Technol. 39(22), 7191–7198 (2021). [CrossRef]  

16. M. R. Chatterjee, A. Mohamed, and F. S. Almehmadi, “Secure free-space communication, turbulence mitigation, and other applications using acousto-optic chaos,” Appl. Opt. 57(10), C1–C13 (2018). [CrossRef]  

17. F. S. Almehmadi and M. R. Chatterjee, “Secure chaotic transmission of electrocardiography signals with acousto-optic modulation under profiled beam propagation,” Appl. Opt. 54(2), 195–203 (2015). [CrossRef]  

18. A. Mohamed and M. R. Chatterjee, “Image intensity recovery with mitigation in the presence gamma–gamma atmospheric turbulence using encrypted chaos,” Opt. Eng. 58(03), 1 (2019). [CrossRef]  

19. L. Jiang, B. Liu, Y. Mao, X. Wu, J. Ren, X. Xu, S. Han, J. Zhao, L. Zhao, T. Sun, and L. Zhang, “A novel multi-level constellation compression modulation for GFDM-PON,” IEEE Photonics J. 11(2), 1–11 (2019). [CrossRef]  

20. G. Chen and T. Ueta, “Yet another chaotic attractor,” Int. J. of Bifurcat. and Chaos 09(07), 1465–1466 (1999). [CrossRef]  

21. X. Liang and G. Qi, “Mechanical analysis of Chen chaotic system,” Chaos, Solitons Fractals 98, 173–177 (2017). [CrossRef]  

22. G. Li, “Generalized projective synchronization between Lorenz system and Chen’s system,” Chaos, Solitons Fractals 32(4), 1454–1458 (2007). [CrossRef]  

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (11)

Fig. 1.
Fig. 1. Block diagram of multi-dimensional multiplexing high-security optical transmission scheme based on quaternion chaotic encryption.
Fig. 2.
Fig. 2. The flow diagram of 3D constellation compression shaping: (a) modulation and (b) demodulation, (c) schematic diagram of CCS-32-16 encoding.
Fig. 3.
Fig. 3. (a)-(e) The 3D constellation design flow chart, (f)-(h) different views of the 3D constellation.
Fig. 4.
Fig. 4. Phase diagram of chaotic model: (a) about xyz axis, (b) about variables xy axis, and (c) about yz axis; constellation diagram: (d) before quaternion chaotic encryption, (e) after quaternion rotation encryption, (f) a quaternion rotation example.
Fig. 5.
Fig. 5. Waveform of the 4D-CAP forming filter.
Fig. 6.
Fig. 6. Experimental setups (DSP: digital signal processing, ECL: external cavity laser, AWG: arbitrary waveform generator, EA: electrical amplifier, MZM: Mach-Zehnder modulator, EDFA: erbium-doped fiber amplifier, OC: optical coupler, MCF: multi-core fiber, VOA: variable optical attenuator, PD: photodiode, MSO: mixed signal oscilloscope).
Fig. 7.
Fig. 7. The BER varies with received optical power after a 2 km seven-core optical transmission.
Fig. 8.
Fig. 8. Constellations of illegal and legal reception: (a) illegal constellation, (b) x-y plane projection of (a), (c) x-z plane projection of (a), (d) legal constellation, (e) x-y plane projection of (d), (f) x-z plane projection of (d).
Fig. 9.
Fig. 9. Chaotic system sensitivity: (a) initial values and (b) circuit parameters.
Fig. 10.
Fig. 10. Images: (a) before encryption, (b) after illegal reception, (c) after normal reception, and histograms: (d) before encryption, (e) after illegal reception, (f) after normal reception.
Fig. 11.
Fig. 11. The information bit stream: (a) before encryption, (b) after illegal reception, and (c) after normal reception.

Tables (1)

Tables Icon

Table 1. Mapping relations between binary data and coordinates of 3D constellation points

Equations (6)

Equations on this page are rendered with MathJax. Learn more.

{ d x d t = a [ y x ] d y d t = ( c a ) x x z + c y d z d t = x y b z
{ ϕ i = X i / 180 π θ i = Y i / 180 π φ i = Z i / 180 π
{ q i = [ cos ( θ / 2 ) , 0 , 0 , sin ( θ / 2 ) ] q j = [ cos ( ϕ / 2 ) , 0 , sin ( ϕ / 2 ) , 0 ] q k = [ cos ( φ / 2 ) , sin ( φ / 2 ) , 0 , 0 ]
{ q = q i q j q k h = q 1 v q
H = [ 1 , 1 , 1 , 1 ; 1 , 1 , 1 , 1 ; 1 , 1 , 1 , 1 ] T = [ c 0 , c 1 , c 2 ] s c o d e = H × [ m x , m y , m z ] T = c 0 m x + c 1 m x + c 2 m z
{ f 1 = cos ( β 1 ( 1 + α ) t ) r cos ( t ) f 2 = sin ( β 1 ( 1 + α ) t ) r cos ( t ) f 3 = cos ( β 2 ( 1 + α ) t ) r cos ( t ) f 4 = sin ( β 2 ( 1 + α ) t ) r cos ( t )
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.