Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Spectral and temporal stealthy fiber-optic communication using sampling and phase encoding

Open Access Open Access

Abstract

We propose a method for covert fiber-optic communication in both frequency and time domains. The power spectral density of the pulse sequence bearing the information is spread in the frequency domain below the noise level by means of sampling. In addition, temporal phase encryption prevents the coherent addition of the various pulses in the frequency domain, further reducing the signal power spectral density. Thus, there is no need to transmit the signal within the bandwidth of a public user in order to spectrally conceal the signal. Temporal spreading of the pulse sequence is achieved by spectral phase encoding, resulting in a stealthy temporal and spectral transmission.

©2011 Optical Society of America

1. Introduction

The rapid spread of optical communication systems has increased the need for proper security solutions in order to prevent eavesdropping and jamming. Spread spectrum encryption techniques seem to be appropriate for optical communication systems due to their large bandwidth which enables to achieve high processing gain [1].

Methods for covert transmission using coherent optical code-division multiple-access (OCDMA) are proposed in [24]. In these methods, the signal is encrypted in the time domain using a dispersive element which encodes the spectral phase of the signal. Implementing the approaches presented in [5,6], the temporal phase of the dispersed signal is encoded, hence assigning different phase to each spectral component. However, using these encryption methods when transmitting outside the bandwidth of a public channel, the spectral concealment of the signal is not promised since the signal is not necessarily spectrally hidden under the noise level. If the signal is not concealed in the frequency domain, an adversary that coherently detects and samples the signal can perform Discrete Fourier Transform, therefore disclosing the spectral amplitude of the signal. Hence, the transmitted signal is not spectrally stealthy.

In the encryption method which is proposed in this work, the spectral amplitude of the signal is deliberately spread wide, essentially enabling to transmit a signal with low power spectral density (PSD), keeping the signal below the noise level in the frequency domain. The spectral spreading is achieved by sampling the signal. At the receiver, all the spectral replicas of the signal are folded to the baseband, therefore the PSD of the signal is reconstructed and in turn, the signal to noise ratio (SNR) is improved. This is achieved by coherently adding all the signal's spectral replicas at the baseband (hence the signal is reinforced) whereas the spectral replicas of the noise are added incoherently (consequently they are averaged to a low value).

The proposed covert communication system performances are analytically derived and shown to be supported by those accomplished by simulating the communication system. Finally, the encryption strength is estimated.

2. System description

Suppose an information source generating a bit sequence which modulates an optical carrier with frequency fc. The modulation results in the pulse sequence s(t) which we would like to encrypt in both time and frequency domains. Each pulse p(t) in the sequence has pulse width Tand double sided bandwidth Δf. The gap between two sequential pulses in the time domain is Δt, satisfying ΔtT. A digital implementation of the proposed communication system is illustrated in Fig. 1 . For the simplicity of the mathematical analysis we discuss an equivalent analog system presented in Fig. 2 .

 figure: Fig. 1

Fig. 1 Digital covert communication system. TPE-Temporal Phase Encoder, FFT- Fast Fourier Transform, SPE-Spectral Phase Encoder, IFFT-Inverse Fast Fourier Transform, D/A-Digital to Analog converter, Mod.-Modulator, EDFA – Erbium Doped Fiber Amplifier, AWGN-Additive White Gaussian Noise, SPD-Spectral Phase Decoder, A/D-Analog to Digital converter, MF-Matched Filter, TPD-Temporal Phase Decoder.

Download Full Size | PDF

 figure: Fig. 2

Fig. 2 Proposed covert communication system. Mod.-Modulator, TPE-Temporal Phase Encoder, SPE-Spectral Phase Encoder, EDFA-Erbium Doped Fiber Amplifier, AWGN-Additive White Gaussian Noise, SPD-Spectral Phase Decoder, MF-Matched Filter, TPD-Temporal Phase Decoder.

Download Full Size | PDF

First, each pulse is multiplied by a different temporal phase term. Accordingly, the addition of the Fourier Transform (FT) of the various pulses in the signal bandwidth is incoherent, thus reducing the PSD of s(t). Then, a sampler with sampling frequency Δf is applied to have M=BW/Δf spectral replicas of the signal in the frequency domain, BW being the communication system bandwidth. An analog sampler can be implemented by a modulator transmitting a burst of the optical signal each 1/Δf seconds. In addition, the spectral phase of the signal is optically encoded, spreading the signal in the time domain. Finally, the signal's amplitude is amplified by M in order to compensate for the attenuation of the spectral amplitude of the signal stemming from the spectral spreading of the signal due to the sampling. White Gaussian noise n(t) is added due to amplification and channel noises. The signal spreading in the time and frequency domains keeps it below the noise level in both domains.

The decryption process begins with optical spectral phase decoding followed by coherent detection. The signal is subsequently sampled at sampling frequency Δf in order to fold all its spectral replicas to the baseband where they are coherently added. Then, a filter matched to p(t) is applied. Finally, the temporal phase of the signal is decoded and the signal is sampled with sampling interval Δt. The original bit sequence is recovered by a decision circuit.

2.1 Encoder configuration

Suppose a bit sequence modulating an optical carrier, generating a pulse sequence represented by the analytical signal:

s(t)=n=1Nanp(tnΔt)ej2πfct=b(t)ej2πfct
where {an}n=1N are statistically independent Bernoulli distributed random variables with equally probable values 0 and 1, p(t) is real and:
b(t)=n=1Nanp(tnΔt)
is the baseband pulse sequence carried by the optical carrier.

The temporal phase of the signal is encoded with the following phase:

ρ(t)=n=1NΦnrect(tnΔtΔt)
Hence, the analytical signal at point 1 in Fig. 2 resulting from the temporal phase encoding is:
s1(t)=s(t)ejρ(t)=n=1NanejΦnp(tnΔt)ej2πfct=b1(t)ej2πfct
where the phases {Φn}n=1N encoding the temporal phase of the pulse sequence can get Qt possible values equally spaced between 0 and 2π, and:
b1(t)=n=1NanejΦnp(tnΔt)
is the temporal phase encoded baseband pulse sequence having FT B1(f). The FT of s1(t) is S1(f)=B1(ffc).

The signal is subsequently sampled, yielding the analytical signal s2(t) at point 2. Supposing the bandwidth of the communication system is BW, the sampled signal has the following FT:

S2(f)=1Mm=(M1)/2(M1)/2S1(fmΔf)=1Mm=(M1)/2(M1)/2B1(fmΔffc)
where M=BW/Δf is the number of spectral replicas of S1(f)/M in the frequency domain, generated due to the sampling.

Then, the spectral phase of the signal is encoded. The phase encoding has two goals. The first is signal spreading in the time domain in order to conceal it under the noise level. The second goal is to prevent reconstruction of the signal spectral amplitude by an eavesdropper that samples the signal in order to coherently add its spectral replicas at the baseband while the spectral replicas of the noise are added incoherently. The spectral phase encryption turns the addition of the spectral replicas to incoherent addition, thus the signal is kept bellow the noise level in the frequency domain.

The phase encrypting the spectral frequency of the signal has the following form in the positive frequency domain:

ψ(f)=k=(K1)/2(K1)/2φkrect(fkδffcδf)
Where K=BW/δf is the number of phase bins in the communication system bandwidth and {φk}k=(K1)/2(K1)/2 getting Qf possible values equally spaced between 0 and 2π. In addition:
rect(f)={1|f|1/20|f|>1/2
Various methods for spectral phase encoding are available [711]. Sub-GHz spectral resolution is expected to be available as commercial tunable wavelength-division multiplexing (WDM) lasers already reach 1GHz resolution using Bragg gratings for optical filtering. Using sub-GHz optical filters enables spectral phase encoding at this resolution. The phase encoding can be either spatial, using a spatial light modulator (SLM) as performed in [7,8], or in-fiber by using in-fiber phase modulators.

Consequently, the spectral phase encoded analytical signal at point 3, s3(t) has FT:

S3(f)=S2(f)ejψ(f)=ejψ(f)Mm=(M1)/2(M1)/2S1(fmΔf)
An Erbium doped fiber amplifier is then used to amplify the signal by M in order to compensate for the attenuation of the signal's spectral amplitude stemming from the spectral spreading of the signal due to the sampling.

After transmission, white Gaussian noise n(t) with autocorrelation Rn(t)=σ2δ(t) and FT N(f) is added to the signal due to amplifier and channel noises. It should be noted that N(f) is a white Gaussian noise with autocorrelation RN(f)=σ2δ(f). The noise is represented by the analytical signal nA(t) having FT 2u(f)N(f) where u(f) is the step function:

u(f)={1f00f<0
Thus, the analytical signal s4(t) at point 4 is:
s4(t)=Ms3(t)+nA(t)
with FT:
S4(f)=MS3(f)+2u(f)N(f)=ejψ(f)m=(M1)/2(M1)/2S1(fmΔf)+2u(f)N(f)
The signal spreading in the time and frequency domains keeps the signal below the noise level, resulting in a stealthy signal in both domains.

2.2 Decoder configuration

The decryption process begins with dispersion compensation followed by spectral phase decoding. Chromatic dispersion can be either compensated by dispersion compensating fibers or avoided by using dispersion shifted fibers for transmission. Polarization mode dispersion (PMD) can be compensated using the coherent method offered in [12]. It should be mentioned that the PMD compensation dynamics is in the sub-MHz rate, thus much slower than the on-line decryption process. Spectral phase decoding can be optically implemented by a spectral phase decoder (SPD) multiplying the FT of the analytical signal with ejψ(f). The bandwidth of the SPD is BW, giving rise to the analytical signal s5(t) at point 5, with FT:

S5(f)=S4(f)rect(ffcBW)ejψ(f)=m=(M1)/2(M1)/2S1(fmΔf)+2N(f)rect(ffcBW)ejψ(f)

The signal is then coherently detected and passed through a low pass filter with bandwidth BW, yielding the electrical analytical signal s6(t) at point 6 which has FT:

S6(f)=12S5(f+fc)=12[m=(M1)/2(M1)/2B1(fmΔf)+2N(f+fc)rect(fBW)ejψ(f+fc)]
Using the following notations for the detected noise and spectral phase encoding:
Nd(f)=N(f+fc)
and:
ψd(f)=ψ(f+fc)
Equation (14) can be written as:
S6(f)=S5(f+fc)=12[m=(M1)/2(M1)/2B1(fmΔf)+2Nd(f)rect(fBW)ejψd(f)]
A sampler having a transfer function with bandwidth BW and sampling frequency Δf is subsequently applied to fold the spectral replicas of the signal to the baseband, resulting in the analytical signal s7(t) at point 7. The FT of the signal is:
S7(f)=S6(f)*1Ml=(M1)/2(M1)/2δ(flΔf)==12Ml=(M1)/2(M1)/2m=(M1)/2(M1)/2B1(fmΔflΔf)++12Ml=(M1)/2(M1)/22Nd(flΔf)rect(flΔfBW)ejψd(flΔf)
where * denotes the convolution operator.

Then, a filter matched to p(t) filters s7(t). Consequently, the signal s8(t) is achieved at point 8 having FT:

S8(f)=S7(f)P*(f)==P*(f)2Ml=(M1)/2(M1)/2m=(M1)/2(M1)/2B1(fmΔflΔf)++P*(f)2Ml=(M1)/2(M1)/22Nd(flΔf)rect(flΔfBW)ejψd(flΔf)
Since the bandwidth of P*(f) is limited to the baseband, all the cross terms in Eq. (19) zero, therefore, only the terms with l=m are left. Thus, Eq. (19) turns to:
S8(f)=P*(f)2Mm=(M1)/2(M1)/2B1(f)++P*(f)2Mm=(M1)/2(M1)/22Nd(fmΔf)rect(fmΔfBW)ejψd(fmΔf)
Hence:
S8(f)=P*(f)2MMB1(f)++P*(f)2Mm=(M1)/2(M1)/22Nd(fmΔf)rect(fmΔfBW)ejψd(fmΔf)
The first term at the right wing of Eq. (21) denotes the signal whereas the right term denotes the noise. Multiplying these terms by M, the first term linearly increases with M since it comprises M spectral replicas of the signal which are coherently added at the baseband and filtered by the matched filter. The noise term does not linearly increase with M since the spectral noise shifts are added incoherently. This distinction between the decoded signal and the noise will be further expressed later when the SNR of the decoded signal is derived.

The temporal phase of the signal is then decoded. Hence, the analytical signal at point 9 is:

s9(t)=ejρ(t)S8(f)ej2πftdf==ejρ(t)P*(f)2MB1(f)ej2πftdf+ejρ(t)P*(f)2Mm=(M1)/2(M1)/22Nd(fmΔf)rect(fmΔfBW)ejψd(fmΔf)ej2πftdf
We use the following notations:
s˜A(t)=ejρ(t)P*(f)2MB1(f)ej2πftdf
and:
n˜A(t)=ejρ(t)P*(f)2Mm=(M1)/2(M1)/22Nd(fmΔf)rect(fmΔfBW)ejψd(fmΔf)ej2πftdf
where s˜A(t) and n˜A(t) are the analytical signal and noise terms at point 9 respectively.

Equation (23) can be further developed to yield:

s˜A(t)=ejρ(t)P*(f)2MB1(f)ej2πftdf=M2ejρ(t)p*(τt)n=1NanejΦnp(τnΔt)dτ
It should be noted that:
s˜A(nΔt)=M2ejρ(t)p*(τnΔt)k=1NakejΦkp(τkΔt)dτ==M2l=1NejΦlrect(nΔtlΔtΔt)p*(τnΔt)k=1NakejΦkp(τkΔt)dτ==M2anEp
where:
Ep|p(t)|2dt
The signal s9(t) is sampled each temporal interval Δt, generating the sampled signal s10(t) at point 10:
s10(t)={s9(nΔt)=s˜A(nΔt)+n˜A(nΔt)t=nΔt0otherwise
where n is an integer. A decision circuit is then applied to recover the original bit sequence.

3. System expected performances

Having the signal and noise expressed in Eq. (26) and Eq. (24) respectively, the SNR and the bit error rate (BER) measured by an authorized user after signal decryption are subsequently derived.

3.1 SNR after decryption

The SNR of the decrypted signal is given by:

SNR=(s˜(nΔt))2E[(n˜(nΔt))2]
where the following notations are used:
s˜(t)=Re{s˜A(t)}
and:
n˜(t)=Re{n˜A(t)}
From Eq. (26) it can be seen that:
s˜(nΔt)=Re[s˜A(nΔt)]=M2anEp
Assuming the SNR is measured at time t=nΔt for which an=1, Eq. (32) gives:
s˜(nΔt)=M2Ep
Therefore, the signal power is:
(s˜(nΔt))2=(M2Ep)2=M4Ep2
In addition:
E[(n˜(t))2]=E[(Re{n˜A(t)})2]==E[(12{n˜A(t)+n˜A*(t)})2]==14E[(n˜A(t))2]+12E[n˜A(t)n˜A*(t)]+14E[(n˜A*(t))2]
Using Eq. (24), it can be shown that E[(n˜A(t))2]=E[(n˜A*(t))2]=0. Hence:
E[(n˜(t))2]=12E[n˜A(t)n˜A*(t)]=σ22Mm=(M1)/2(M1)/2|P(f)|2df=σ22Ep
Therefore, the SNR measured after decryption is:
SNR=|s˜(nΔt)|2E[(n˜(nΔt))2]=M4Ep2σ22Ep=MEp2σ2
The term Ep/σ2 is the SNR for the case of a baseband pulse sequence transmitted without going through the encoder, and simply detected by a matched filter followed by a sampler and a decision circuit. This term is multiplied by factor M since the M spectral replicas of the signal are added coherently while the addition of the M spectral shifts of the noise is incoherent. The factor 2 at the denominator is due to the modulation of the baseband signal with the optical carrier having frequency fc which doubles the transmission bandwidth, therefore doubling the noise power.

There are two effects enabling to conceal the signal below the noise level in the time domain. The first is the processing gain which is shown in Eq. (37) to increase the SNR by factor M=BW/Δf where BW is the bandwidth of the encrypted signal and Δf is the bandwidth of the unencrypted signal. This gain stems from the coherent addition of the signal's M spectral replicas at the decryption process. Hence, a low power signal can be transmitted, relying on the processing gain.

The second effect is the signal spreading in the time domain resulting from the spectral phase encryption. The unencrypted signal has bandwidth Δf, which is widened to bandwidth BW at point 2 in Fig. 2 due to the sampling. The spectral phase encoder (SPE) generates BW/δf chips in the frequency domain at point 3, δf being the spectral resolution of the spectral phase code. Hence, each of the signal's samples is spread by factor BW/δf. Since the unencrypted signal is wider than its samples in the time domain by M=BW/Δf, the encrypted signal is temporally spread by factor BW/(Mδf) relatively to the unencrypted signal. Assuming BW = 80GHz, Δf=5GHz and δf=100MHz, the encrypted signal contains M=80GHz/5GHz=16 spectral replicas and it is spread by factor 80GHz/(16100MHz)=50 in the time domain.

3.2 BER after decryption

Since the decoder is a linear system the noise after the decryption process remains Gaussian. The average of the sampled noise at point 10 in Fig. 2 is:

E[n˜(t)]=12E[n˜A(t)+n˜A*(t)]=0
The variance of the noise is given by Eq. (36).

The BER for the case of a Gaussian noise is given by:

BER=12erfc(SNR22)
Using Eq. (37), the BER is:

BER=12erfc(SNR22)=12erfc(122MEp2σ2)=12erfc(14MEpσ2)

4. Signal hiding in the frequency domain

Suppose an optical signal processed by a spectrum analyzer. Coherent detection yields the electrical signal v(t), measured in Volts. The FT of v(t)is V(f). The PSD of v(t) is:

Gv(f)=1T˜|V(f)|2
The motivation for this definition is that df=1/T˜ is the spectral resolution of the signal v(t). Hence, the voltage content of the signal in frequency f can be found by locating a BPF with bandwidth 1/T˜ at frequency f. The amplitude of the filtered signal passed through an envelope detector will be V(f)df=V(f)/T˜, measured in Volts. Its power will be Pv(f)=|V(f)df|2=|V(f)/T˜|2, measured in Watts (assuming that the load over which the voltage of the signal was measured has 1Ω resistance). Pv(f) is the power content of v(t) within bandwidth df=1/T˜ in frequency f which is measured by the spectrum analyzer. The PSD in frequency f is therefore Gv(f)=Pv(f)/df=1T˜|V(f)|2. |V(f)|2 is the energy spectral density (ESD) of v(t), with units of J/Hz. When v(t) is a random process, its ESD is defined as the ensemble average of |V(f)|2.

We would like to estimate the PSD of the signal and the noise measured by an adversary trying to reveal the cloaked signal in the frequency domain by means of coherently detecting and sampling the signal in order to fold its spectral replicas to the baseband. Ensuring a stealthy transmission in the frequency domain is an advantage of the proposed method over the methods described in [26]. According to Eq. (1), the duration of the pulse sequence is T˜=NΔt.

The encrypted signal was shown in Eq. (12) to be:

S4(f)=ejψ(f)m=(M1)/2(M1)/2S1(fmΔf)+2u(f)N(f)
Applying a band pass filter (BPF) with bandwidth BW at the carrier frequency, the analytical signal becomes:
S4(f)=ejψ(f)m=(M1)/2(M1)/2S1(fmΔf)+2rect(ffcBW)N(f)
Considering the finite duration of the noise in the time domain, Eq. (42) becomes:
S4(f)=ejψ(f)m=(M1)/2(M1)/2S1(fmΔf)++2rect(ffcBW){N(f)*[NΔtsinc(fNΔt)exp(j2πfNΔt/2)]}
Coherently detecting s4(t) and applying a low pass filter with bandwidth BW without spectral phase decryption yields the signal s5(t) with FT:
S5(f)=12ejψ(f+fc)m=(M1)/2(M1)/2B1(fmΔf)++{rect(ffcBW)[N(f)*(NΔtsinc(fNΔt)ejπfNΔt)]}*δ(f+fc)
Sampling the detected signal yields the signal s6(t) with FT:
S6(f)=S5(f)*1Ml=(M1)/2(M1)/2δ(flΔf)==12Mm=(M1)/2(M1)/2l=(M1)/2(M1)/2B1(fmΔflΔf)ejψ(f+fclΔf)+NΔtMl=(M1)/2(M1)/2rect(flΔfBW)N(f1)sinc((f+fclΔff1)NΔt)ejπ(f+fclΔff1)NΔtdf1
Finally, applying a matched filter results in the signal s7(t) having FT:
S7(f)=S6(f)P*(f)==P*(f)2Mm=(M1)/2(M1)/2B1(f)ejψ(f+fcmΔf)++NΔtP*(f)Ml=(M1)/2(M1)/2N(f1)sinc((f+fclΔff1)NΔt)ejπ(f+fclΔff1)NΔtdf1
The PSD of the signal is therefore:
Gs(f)=1NΔtE[|P*(f)2MB1(f)m=(M1)/2(M1)/2ejψ(f+fcmΔf)|2]==|P(f)|24MNΔt|m=(M1)/2(M1)/2ejψ(f+fcmΔf)|2n=1Nl=1NE[anal]ej(ΦnΦl)ej2πf(nl)Δt==|P(f)|48MNΔt[m=(M1)/2(M1)/2lmej[ψ(f+fcmΔf)ψ(f+fclΔf)]+M][n=1Nln12ej(ΦnΦl)ej2πf(nl)Δt+N]
When {φk}k=(K1)/2(K1)/2 and {Φn}n=1N are statistically independent and uniformly distributed between 0 and 2π, the following approximation is done:
Gs(f)18MNΔt|P(f)|4MN=18Δt|P(f)|4
The PSD of the noise is:
Gn(f)=1NΔtE(|{rect(ffcBW)[N(f)*(NΔtsinc(fNΔt)ejπfNΔt)]}*δ(f+fc)|2)==1NΔtE[|NΔtP*(f)Ml=(M1)/2(M1)/2N(f1)sinc((f+fclΔff1)NΔt)ejπ(f+fclΔff1)NΔtdf1|2]==(NΔt)2|P(f)|2σ2MNΔtl=(M1)/2(M1)/2m=(M1)/2(M1)/2sinc((f+fclΔff1)NΔt)sinc((f+fcmΔff1)NΔt)ejπ(lm)ΔfNΔtdf1
In addition, Δf>>(NΔt)1. Hence, noting f˜f+fc, the following approximation is used:
sinc((f˜mΔff1)NΔt)sinc((f˜lΔff1)NΔt)sinc2[(f˜mΔff1)NΔt]δm,l
Thus, Eq. (49) becomes:
Gn(f)NΔt|P(f)|2σ2Mm=(M1)/2(M1)/21NΔt=σ2|P(f)|2
Consequently, the spectral SNR measured by the eavesdropper is:

SNRE(f)=Gs(f)Gn(f)18Δt|P(f)|4σ2|P(f)|2=|P(f)|28σ2Δt

The spectral SNR experienced by the adversary increases with |P(f)|2. Having M spectral replicas of the signal, this term can be attenuated by factor M due to the processing gain resulting from the coherent addition of the spectral replicas. Hence, taking a large number of spectral replicas enables to reduce the power of the pulses in the transmitted pulse sequence. In addition, the spectral SNR decreases with σ2 which is the white Gaussian noise double sided PSD and with Δt, which is the temporal interval between two sequential pulses. Enlarging this interval immerses the signal more deeply in the spectral noise.

Equation (52) implies that the spectral SNR measured by the adversary depends neither on the number of pulses in the pulse sequence, nor in the number of the signal spectral replicas. The independence in the number of pulses is achieved due to the temporal phase encryption, which prevents the coherent addition of the various pulses in the pulse sequence at the baseband. In addition, the independence in the number of spectral replicas results from the spectral phase encryption which prevents the coherent addition of the signal's spectral replicas at the baseband.

5. Simulation and results

5.1 Simulated system configuration

The generated simulation realizes the system described in Fig. 2 with the following parameters:

  • • Number of pulses in a single analyzed pulse sequence - N=500.
  • • Pulse sequence duration - 1μsec.
  • • Temporal gap between two sequential pulses - Δt=2nsec.
  • • Temporal pulse width - T=0.5nsec. Taking T=Δt results in degradation of the SNR and BER after decoding due to inter-symbol interference.
  • • Pulse bandwidth - Δf=5GHz.
  • • Transmission bandwidth - BW=80GHz (unless noted otherwise). Current analog to digital converters used for coherent detection are limited to bandwidth of about 50GHz.
  • • Additive white Gaussian noise double sided PSD - σ2=0.2mw/Hz.
  • • Quantization level of the temporal phase encoding - Qt = 64.
  • • Quantization level of the spectral phase encoding - Qf = 64.
  • • Spectral resolution of spectral phase encoding - δf=200MHz.

The modulating format of the pulse sequence was on-off-keying. Each pulse in the sequence has a raised cosine shape in the time domain with rolloff factor α=0.25 [13]. The temporal and spectral phases encoding the pulse sequence are uniformly distributed between 0 and 2π.

A sequence of one million pulses (which is composed of 2000 pulse sequences, each having N=500 pulses) was run in order to evaluate the BER after decryption.

5.2 Results

The SNR used for the original baseband pulse passing through a matched filter was Ep/σ2=10. The SNR and BER of the decoded pulse sequence were examined for various values of the transmission bandwidth BW. Their expected values are given in Eq. (37) and Eq. (40) respectively.

Figure 3 presents the SNR after decoding. The theoretical SNR matches the one measured by the simulation. In addition, an opponent trying to recover the signal with randomly chosen temporal and spectral encoding phases, having the same quantization, temporal and spectral resolution as the authorized user was simulated. It is shown that the eavesdropper experiences very low SNR since signal is spread below the noise level. The SNR measured by the adversary varies with the transmission bandwidth since various spectral slices of the spectral phase encoder (SPE) are used, therefore influencing the matching between the SPD of the authorized user and the eavesdropper.

 figure: Fig. 3

Fig. 3 SNR after decoding.

Download Full Size | PDF

The BER after decoding is illustrated in Fig. 4 . Three graphs are used for the authorized user. The first denotes the theoretical BER. The second graph exhibits the BER calculated by substituting the measured SNR from Fig. 3 in Eq. (40). The third one is the BER measured by the simulation. It should be noted that the deviation of the measured BER from the two other BER graphs (the theoretical graph and the one calculated from the SNR) for the case of an authorized user with transmission bandwidth of 80GHz stems from the limited statistics of the simulation. While the expected BER is about 10-5.5, only 106 pulses are run by the simulation, hence the number of measured erroneous bits is lower than that expected by the two other graphs. The BER measured by the adversary is very high (about 0.5). The threshold chosen for the eavesdropper is half the maximal power of its received noiseless signal.

 figure: Fig. 4

Fig. 4 BER after decoding.

Download Full Size | PDF

Figure 5 shows the decoded pulse sequence in time and frequency domains for the authorized user and the adversary. The transmission bandwidth is BW = 80GHz. Figure 5(a) and Fig. 5(b) present a 5nsec interval of the noiseless original pulse sequence and the noisy decoded pulse sequence passed through a matched filter for the authorized user and the eavesdropper respectively. The eavesdropper cannot observe the signal while the authorized user can easily detect it. Figure 5(c) and Fig. 5(d) exhibit the PSD normalized by 1/(NΔt), measured by the authorized user and the adversary respectively for a single pulse sequence consisting of 500 pulses. In the first case, the signal is well raised above the noise level while being significantly lower than the noise PSD for the latter due to the incoherent addition of the spectral replicas and incorrect temporal phase decoding, which prevents the coherent addition of the various temporal pulses in the frequency domain.

 figure: Fig. 5

Fig. 5 Decoded signal, authorized user and eavesdropper. (a) Original noiseless pulse sequence and authorized user noisy decoded pulse sequence. (b) Original noiseless pulse sequence and eavesdropper noisy decoded pulse sequence. (c) Authorized user pulse sequence and noise power spectral density. (d) Eavesdropper pulse sequence and noise power spectral density.

Download Full Size | PDF

5.3 Encryption strength estimation

In order to evaluate the encryption strength the following assumptions are made:

  • • The SNR used for the original baseband pulse passing through a matched filter was Ep/σ2=4 (corresponding to SNR = 18dB and BER = 10-4.5 after authorized decryption).
  • • The goal of the eavesdropper is to raise the signal above the noise level in either time or frequency domain.
  • • The eavesdropper has a-priory knowledge about the encryption and decryption method. The only parameters that should be guessed are the temporal and spectral phase codes.
  • • The eavesdropper tries to deduce the spectral and temporal phase codes by working with roughly quantized temporal and spectral phase codes.
  • • The eavesdropper needs to properly guess at least Nt and Nf temporal and spectral phases in order to reveal the signal in either time or frequency domain.
  • • When observing the signal, the adversary tries to refine the phase quantization of the guessed phases in order to improve the measured SNR and BER.
  • • The encryption strength is defined as the time interval needed to accomplish the goal of the eavesdropping process.
  • • The eavesdropper has the same spectral and temporal phase decoders as the authorized user. The maximal SPD's SLM update frequency of the eavesdropper is:fSLM=1MHz.
First, we assume that the adversary begins with binary quantized temporal and spectral phases and that the temporal phase code is already known. Tries are made by the adversary to get SNR>0dB in the time domain. Second, temporal phase quantization Qt = 64 is assumed.

Using the simulation it was observed that the spectral resolution of the spectral phase code has major influence over the number of spectral phases needed for the eavesdropper to properly guess in order to reveal the signal in the time domain. Larger spectral resolution results in a higher Nf. For example, using 100 different randomly chosen spectral phase codes for the authorized user and the eavesdropper with Qf = 256 (which are already commercial) and δf=100MHz, the mean value observed for Nf was 158 with standard deviation of 33.33. Reducing the spectral phase code resolution to δf=200MHz, the average Nf became 76 with standard deviation of 23.14.

Nf is also affected by the number of spectral phase code quantization levels Qf. A larger Qf results in a larger Nf. For instance, when working with δf=200MHz, Qf = 2, the average required Nf reduced to 51.1 with standard deviation of 21.07.

The time interval required for the adversary to get SNR>0dB in the time domain is give by:

Teav=(Qf,eav)NffSLM
where Qf,eav is the spectral phase quantization level of the spectral phase code used by the eavesdropper. The assumed value is Qf,eav=2 (having no prior knowledge about the spectral phase code of the authorized user, it was observed that eavesdropping with larger Qf,eav only increases Teav, hence the eavesdropper is assumed to start with binary quantization).

For the case of δf=100MHz and Qf = 256, substituting Nf=125, Eq. (53) gives:

TE=2Nf/fSLM=2125/106Hz=1.351024years
While for δf=200MHzand Qf = 256, substituting Nf=53, yields:
TE=2Nf/fSLM=253/106Hz=285.6years
And δf=200MHz,Qf = 2, resulting in Nf=30gives:
TE=2Nf/fSLM=230/106Hz=3.4105years
Thus, the spectral resolution and quantization level of the phase code strongly affect the encryption strength. It should be noted that the above estimated Nf is actually a lower bound for the number of spectral phases needed to be properly guessed in order to accomplish positive SNR in the time domain since it was assumed that the temporal phase code is completely known to the adversary.

Nt can be found by estimating the number of temporal phases needed to be properly guessed by an adversary using a binary quantized temporal phase decoder in order to raise the signal above the noise level in the frequency domain after properly guessing Nf spectral phases with the binary quantized SPD. For example, a spectral phase code and an adversary SPD yielding Nf=210 were chosen (δf=100MHz). The peak of the spectral SNR became positive at Nt=320.

Hence, using high resolution and highly quantized phase decoding, the encryption system can cause the eavesdropping process involving a “brute force” attack in which the temporal and spectral phase codes are randomly guessed to last a very long time interval in order to raise the signal above the noise level in time and frequency domains. This time interval is irrelevant for the eavesdropper.

A second kind of possible attack is such that the eavesdropper is assumed to determine the original unencrypted signal known as “Chosen-plaintext attack” [14]. The encryption methods proposed in [24] enable the spectral phase code disclosure when the eavesdropper sends a known pulse sequence from the encoder of the authorized user when the signal is not concealed under the transmission of a public WDM user. The spectral phase of the sent pulse sequence is known to the eavesdropper, hence, the spectral phase code is revealed. The temporal phase encrypting the signal in the methods described in [5,6] can be disclosed by sending a narrowband pulse for which the effect of the dispersion is insignificant. The resulting encoded signal is the original signal having its temporal phase encoded. This way, the temporal phase code can be measured by the adversary. The spectral phase code can then be disclosed similarly to methods [24]. However, using the encryption method proposed in this work, the pulse sequence is well spread below the noise level in the frequency domain as well as in the time domain, therefore making the recovery of the spectral phase code much more difficult.

6. Conclusion

A method for spectral and temporal covert communication is presented. The encryption is based on encrypting the temporal phase of the pulse sequence, therefore reducing its power spectral density. The pulse sequence is subsequently spread in the frequency domain by means of sampling, therefore enabling to transmit a signal with low power spectral density. Spectral phase encryption is subsequently applied to spread the signal in the time domain and prevent the eavesdropper from observing the signal in the frequency domain by coherently adding its spectral replicas at the baseband. Hence, at the end of the encryption process the pulse sequence is spread below the noise level in the time and frequency domains. Mathematical modeling as well as numerical investigations demonstrate the applicability of the proposed approach.

References and links

1. A. J. Viterbi, “Spread spectrum communications – myths and realities,” IEEE Commun. Mag. 17(3), 11–18 (1979). [CrossRef]  

2. B. B. Wu and E. E. Narimanov, “A method for secure communications over a public fiber-optical network,” Opt. Express 14(9), 3738–3751 (2006). [CrossRef]   [PubMed]  

3. K. Kravtsov, B. Wu, I. Glysk, P. R. Prucnal, and E. Narimanov, “Stealth transmission over a WDM network with detection based on an all-optical thresholder,” in Proceedings of IEEE Conference on Lasers and Electro-Optics (IEEE, 2007), pp. 480–481.

4. B. Wu, A. Agarwal, I. Glesk, E. Narimanov, S. Etemad, and P. R. Prucnal, “Steganographic fiber-optic transmission using coherent spectral-phase-encoded optical CDMA,” in Conference on Lasers and Electro-Optics/Quantum Electronics and Laser Science Conference and Photonic Applications Systems Technologies, OSA Technical Digest (CD) (Optical Society of America, 2008), paper CFF5, http://www.opticsinfobase.org/abstract.cfm?URI=CLEO-2008-CFF5.

5. Z. Wang, M. P. Fok, L. Xu, J. Chang, and P. R. Prucnal, “Improving the privacy of optical steganography with temporal phase masks,” Opt. Express 18(6), 6079–6088 (2010). [CrossRef]   [PubMed]  

6. Z. Gao, X. Wang, N. Kataoka, and N. Wada, “Stealth transmission of time-domain spectral phase encoded OCDMA signal over WDM network,” IEEE Photon. Technol. Lett. 22(13), 993–995 (2010). [CrossRef]  

7. D. Sinefeld, C. R. Doerr, and D. M. Marom, “Photonic spectral processor employing two-dimensional WDM channel separation and a phase LCoS modulator,” in Optical Fiber Communication Conference, OSA Technical Digest (CD) (Optical Society of America, 2010), paper OMP5, http://www.opticsinfobase.org/abstract.cfm?URI=OFC-2010-OMP5.

8. D. Sinefeld and D. M. Marom, “Hybrid guided-wave/free-space optics photonic spectral processor based on LCoS phase only modulator,” IEEE Photon. Technol. Lett. 22(7), 510–512 (2010). [CrossRef]  

9. X. Wang, “Novel time domain spectral phase encoding/decoding technique for OCDMA application,” in International Conference on Transparent Optical Networks (IEEE, S. Miguel (Portugal), 2009), paper Th.A3.4.

10. X. Wang and N. Wada, “Spectral phase encoding of ultra-short optical pulse in time domain for OCDMA application,” Opt. Express 15(12), 7319–7326 (2007). [CrossRef]   [PubMed]  

11. D. Miyamoto and H. Tsuda, “Spectral phase encoder employing an arrayed-waveguide grating and phase-shifting structure,” IEEE Photon. Technol. Lett. 19(17), 1289–1291 (2007). [CrossRef]  

12. E. Ip and J. M. Kahn, “Digital equalization of chromatic dispersion and polarization mode dispersion,” J. Lightwave Technol. 25(8), 2033–2043 (2007). [CrossRef]  

13. J. G. Proakis and M. Salehi, Communication Systems Engineering (Prentice Hall, 1994), Chap. 8.

14. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15(16), 10253–10265 (2007). [CrossRef]   [PubMed]  

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (5)

Fig. 1
Fig. 1 Digital covert communication system. TPE-Temporal Phase Encoder, FFT- Fast Fourier Transform, SPE-Spectral Phase Encoder, IFFT-Inverse Fast Fourier Transform, D/A-Digital to Analog converter, Mod.-Modulator, EDFA – Erbium Doped Fiber Amplifier, AWGN-Additive White Gaussian Noise, SPD-Spectral Phase Decoder, A/D-Analog to Digital converter, MF-Matched Filter, TPD-Temporal Phase Decoder.
Fig. 2
Fig. 2 Proposed covert communication system. Mod.-Modulator, TPE-Temporal Phase Encoder, SPE-Spectral Phase Encoder, EDFA-Erbium Doped Fiber Amplifier, AWGN-Additive White Gaussian Noise, SPD-Spectral Phase Decoder, MF-Matched Filter, TPD-Temporal Phase Decoder.
Fig. 3
Fig. 3 SNR after decoding.
Fig. 4
Fig. 4 BER after decoding.
Fig. 5
Fig. 5 Decoded signal, authorized user and eavesdropper. (a) Original noiseless pulse sequence and authorized user noisy decoded pulse sequence. (b) Original noiseless pulse sequence and eavesdropper noisy decoded pulse sequence. (c) Authorized user pulse sequence and noise power spectral density. (d) Eavesdropper pulse sequence and noise power spectral density.

Equations (57)

Equations on this page are rendered with MathJax. Learn more.

s( t )= n=1 N a n p( tnΔt ) e j2π f c t =b( t ) e j2π f c t
b( t )= n=1 N a n p( tnΔt )
ρ( t )= n=1 N Φ n rect( tnΔt Δt )
s 1 ( t )=s( t ) e jρ( t ) = n=1 N a n e j Φ n p( tnΔt ) e j2π f c t = b 1 ( t ) e j2π f c t
b 1 ( t )= n=1 N a n e j Φ n p( tnΔt )
S 2 ( f )= 1 M m=( M1 )/2 ( M1 )/2 S 1 ( fmΔf ) = 1 M m=( M1 )/2 ( M1 )/2 B 1 ( fmΔf f c )
ψ( f )= k=( K1 )/2 ( K1 )/2 φ k rect( fkδf f c δf )
rect( f )={ 1|f|1/2 0|f|>1/2
S 3 ( f )= S 2 ( f ) e jψ( f ) = e jψ( f ) M m=( M1 )/2 ( M1 )/2 S 1 ( fmΔf )
u( f )={ 1 f0 0 f<0
s 4 ( t )= M s 3 ( t )+ n A ( t )
S 4 ( f )= M S 3 ( f )+2u( f )N( f )= e jψ( f ) m=( M1 )/2 ( M1 )/2 S 1 ( fmΔf ) +2u( f )N( f )
S 5 ( f )= S 4 ( f )rect( f f c BW ) e jψ( f ) = m=( M1 )/2 ( M1 )/2 S 1 ( fmΔf ) +2N( f )rect( f f c BW ) e jψ( f )
S 6 ( f )= 1 2 S 5 ( f+ f c )= 1 2 [ m=( M1 )/2 ( M1 )/2 B 1 ( fmΔf ) +2N( f+ f c )rect( f BW ) e jψ( f+ f c ) ]
N d ( f )=N( f+ f c )
ψ d ( f )=ψ( f+ f c )
S 6 ( f )= S 5 ( f+ f c )= 1 2 [ m=( M1 )/2 ( M1 )/2 B 1 ( fmΔf ) +2 N d ( f )rect( f BW ) e j ψ d ( f ) ]
S 7 ( f )= S 6 ( f )* 1 M l=( M1 )/2 ( M1 )/2 δ( flΔf ) = = 1 2 M l=( M1 )/2 ( M1 )/2 m=( M1 )/2 ( M1 )/2 B 1 ( fmΔflΔf ) + + 1 2 M l=( M1 )/2 ( M1 )/2 2 N d ( flΔf )rect( flΔf BW ) e j ψ d ( flΔf )
S 8 ( f )= S 7 ( f ) P * ( f )= = P * ( f ) 2 M l=( M1 )/2 ( M1 )/2 m=( M1 )/2 ( M1 )/2 B 1 ( fmΔflΔf ) + + P * ( f ) 2 M l=( M1 )/2 ( M1 )/2 2 N d ( flΔf )rect( flΔf BW ) e j ψ d ( flΔf )
S 8 ( f )= P * ( f ) 2 M m=( M1 )/2 ( M1 )/2 B 1 ( f ) + + P * ( f ) 2 M m=( M1 )/2 ( M1 )/2 2 N d ( fmΔf )rect( fmΔf BW ) e j ψ d ( fmΔf )
S 8 ( f )= P * ( f ) 2 M M B 1 ( f )+ + P * ( f ) 2 M m=( M1 )/2 ( M1 )/2 2 N d ( fmΔf )rect( fmΔf BW ) e j ψ d ( fmΔf )
s 9 ( t )= e jρ( t ) S 8 ( f ) e j2πft df= = e jρ( t ) P * ( f ) 2 M B 1 ( f ) e j2πft df+ e jρ( t ) P * ( f ) 2 M m=( M1 )/2 ( M1 )/2 2 N d ( fmΔf )rect( fmΔf BW ) e j ψ d ( fmΔf ) e j2πft df
s ˜ A ( t )= e jρ( t ) P * ( f ) 2 M B 1 ( f ) e j2πft df
n ˜ A ( t )= e jρ( t ) P * ( f ) 2 M m=( M1 )/2 ( M1 )/2 2 N d ( fmΔf )rect( fmΔf BW ) e j ψ d ( fmΔf ) e j2πft df
s ˜ A ( t )= e jρ( t ) P * ( f ) 2 M B 1 ( f ) e j2πft df = M 2 e jρ( t ) p * ( τt ) n=1 N a n e j Φ n p( τnΔt ) dτ
s ˜ A ( nΔt )= M 2 e jρ( t ) p * ( τnΔt ) k=1 N a k e j Φ k p( τkΔt ) dτ = = M 2 l=1 N e j Φ l rect( nΔtlΔt Δt ) p * ( τnΔt ) k=1 N a k e j Φ k p( τkΔt ) dτ = = M 2 a n E p
E p | p( t ) | 2 dt
s 10 ( t )={ s 9 ( nΔt )= s ˜ A ( nΔt )+ n ˜ A ( nΔt ) t=nΔt 0 otherwise
SNR= ( s ˜ ( nΔt ) ) 2 E[ ( n ˜ ( nΔt ) ) 2 ]
s ˜ ( t )=Re{ s ˜ A ( t ) }
n ˜ ( t )=Re{ n ˜ A ( t ) }
s ˜ ( nΔt )=Re[ s ˜ A ( nΔt ) ]= M 2 a n E p
s ˜ ( nΔt )= M 2 E p
( s ˜ ( nΔt ) ) 2 = ( M 2 E p ) 2 = M 4 E p 2
E[ ( n ˜ ( t ) ) 2 ]=E[ ( Re{ n ˜ A ( t ) } ) 2 ]= =E[ ( 1 2 { n ˜ A ( t )+ n ˜ A * ( t ) } ) 2 ]= = 1 4 E[ ( n ˜ A ( t ) ) 2 ]+ 1 2 E[ n ˜ A ( t ) n ˜ A * ( t ) ]+ 1 4 E[ ( n ˜ A * ( t ) ) 2 ]
E[ ( n ˜ ( t ) ) 2 ]= 1 2 E[ n ˜ A ( t ) n ˜ A * ( t ) ]= σ 2 2M m=( M1 )/2 ( M1 )/2 | P( f ) | 2 df= σ 2 2 E p
SNR= | s ˜ ( nΔt ) | 2 E[ ( n ˜ ( nΔt ) ) 2 ] = M 4 E p 2 σ 2 2 E p =M E p 2 σ 2
E[ n ˜ ( t ) ]= 1 2 E[ n ˜ A ( t )+ n ˜ A * ( t ) ]=0
BER= 1 2 erfc( SNR 2 2 )
BER= 1 2 erfc( SNR 2 2 )= 1 2 erfc( 1 2 2 M E p 2 σ 2 )= 1 2 erfc( 1 4 M E p σ 2 )
G v ( f )= 1 T ˜ | V( f ) | 2
S 4 ( f )= e jψ( f ) m=( M1 )/2 ( M1 )/2 S 1 ( fmΔf ) +2u( f )N( f )
S 4 ( f )= e jψ( f ) m=( M1 )/2 ( M1 )/2 S 1 ( fmΔf ) +2rect( f f c BW )N( f )
S 4 ( f )= e jψ( f ) m=( M1 )/2 ( M1 )/2 S 1 ( fmΔf ) + +2rect( f f c BW ){ N( f )*[ NΔtsinc( fNΔt )exp( j2πfNΔt/2 ) ] }
S 5 ( f )= 1 2 e jψ( f+ f c ) m=( M1 )/2 ( M1 )/2 B 1 ( fmΔf ) + +{ rect( f f c BW )[ N( f )*( NΔtsinc( fNΔt ) e jπfNΔt ) ] }*δ( f+ f c )
S 6 ( f )= S 5 ( f )* 1 M l=( M1 )/2 ( M1 )/2 δ( flΔf ) = = 1 2 M m=( M1 )/2 ( M1 )/2 l=( M1 )/2 ( M1 )/2 B 1 ( fmΔflΔf ) e jψ( f+ f c lΔf ) + NΔt M l=( M1 )/2 ( M1 )/2 rect( flΔf BW ) N( f 1 ) sinc( ( f+ f c lΔf f 1 )NΔt ) e jπ( f+ f c lΔf f 1 )NΔt d f 1
S 7 ( f )= S 6 ( f ) P * ( f )= = P * ( f ) 2 M m=( M1 )/2 ( M1 )/2 B 1 ( f ) e jψ( f+ f c mΔf ) + + NΔt P * ( f ) M l=( M1 )/2 ( M1 )/2 N( f 1 ) sinc( ( f+ f c lΔf f 1 )NΔt ) e jπ( f+ f c lΔf f 1 )NΔt d f 1
G s ( f )= 1 NΔt E[ | P * ( f ) 2 M B 1 ( f ) m=( M1 )/2 ( M1 )/2 e jψ( f+ f c mΔf ) | 2 ]= = | P( f ) | 2 4MNΔt | m=( M1 )/2 ( M1 )/2 e jψ( f+ f c mΔf ) | 2 n=1 N l=1 N E[ a n a l ] e j( Φ n Φ l ) e j2πf( nl )Δt = = | P( f ) | 4 8MNΔt [ m=( M1 )/2 ( M1 )/2 lm e j[ ψ( f+ f c mΔf )ψ( f+ f c lΔf ) ] +M ][ n=1 N ln 1 2 e j( Φ n Φ l ) e j2πf( nl )Δt +N ]
G s ( f ) 1 8MNΔt | P( f ) | 4 MN= 1 8Δt | P( f ) | 4
G n ( f )= 1 NΔt E( | { rect( f f c BW )[ N( f )*( NΔtsinc( fNΔt ) e jπfNΔt ) ] }*δ( f+ f c ) | 2 )= = 1 NΔt E [ | NΔt P * ( f ) M l=( M1 )/2 ( M1 )/2 N( f 1 ) sinc( ( f+ f c lΔf f 1 )NΔt ) e jπ( f+ f c lΔf f 1 )NΔt d f 1 | 2 ]= = ( NΔt ) 2 | P( f ) | 2 σ 2 MNΔt l=( M1 )/2 ( M1 )/2 m=( M1 )/2 ( M1 )/2 sinc( ( f+ f c lΔf f 1 )NΔt ) sinc( ( f+ f c mΔf f 1 )NΔt ) e jπ( lm )ΔfNΔt d f 1
sinc( ( f ˜ mΔf f 1 )NΔt )sinc( ( f ˜ lΔf f 1 )NΔt )sin c 2 [ ( f ˜ mΔf f 1 )NΔt ] δ m,l
G n ( f ) NΔt | P( f ) | 2 σ 2 M m=( M1 )/2 ( M1 )/2 1 NΔt = σ 2 | P( f ) | 2
SN R E ( f )= G s ( f ) G n ( f ) 1 8Δt | P( f ) | 4 σ 2 | P( f ) | 2 = | P( f ) | 2 8 σ 2 Δt
T eav = ( Q f,eav ) N f f SLM
T E = 2 N f / f SLM = 2 125 / 10 6 Hz=1.35 10 24 years
T E = 2 N f / f SLM = 2 53 / 10 6 Hz=285.6years
T E = 2 N f / f SLM = 2 30 / 10 6 Hz=3.4 10 5 years
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.