Feeds

DVD plus nano-rods equals security, density: researchers

A little light encryption

Secure remote control for conventional and virtual desktops

Swinburne and Taiwanese researchers have demonstrated technology that can use a single laser beam to create 3D polarization in nanomaterials.

What’s cool about this is that they demonstrate that the polarization can be used to encrypt information – as well as expanding the storage capacity of optical media like DVDs.

As is shown in the illustration at the bottom of this story, the polarization technique – in its infancy at the moment – allows different images to be encoded in one place, showing up depending on the polarization the “read” beam uses.

Using polarization to encode information like this isn’t new: however, achieving 3D polarization using a single beam is, according to the researchers.

As the abstract in Nature states, “arbitrary three-dimensional polarization orientation of a beam hasn’t been achieved yet”.

Gold nano-rods tuned to specific wavelengths are added to the surface of the DVD, according to Swinburne’s Professor Min Gu. The rods are sensitive to the polarization of the “write-laser” – so while one polarization will align some particles in the rods, a different polarization will affect a different set of particles.

Professor Gu says the laser can be polarized “in any direction” – yielding the “arbitrary” polarization referred to in the Nature paper. This characteristic of the laser is what provides both the lift in storage density and the technique’s encryption possibilities. ®

Polarisation used as a kind of steganography

Depending on write polarization, the same area can store different images. Source: Nature

Internet Security Threat Report 2014

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.