 Over to you, Joe. Let me stop sharing. Okay. Thanks very much, Marana. Really, really a wonderful overview. And I think you're making a great, great impact there. If anybody has a question, you can, I see Susanna. So, Susanna's right and Melcho. Okay, so I'm just going to go the order I saw them. So, go ahead, Susanna. Are you okay? Are people's hands going down now? No. Yeah. I was just, I just wanted to give compliments to Marana. Thank you, Susanna. Thanks a lot. Okay. Melcho, did you have a question? Okay, there is another person, Henry. Okay. There is a yes, Henry. Okay, Henry, you can unmute and you can ask, please. Thank you. Just want to comment that was a very motivating presentation. In fact, when I joined the course, I didn't have in mind this other role that we should have as a professor to continue. I'm not a radio frequency person, but as I said, I, for my former education, I thought also optics, and I knew that the optics, he also has a lot of support and also perhaps as part of, in one part of the course, I would like to request that maybe you can share some of these opticals back that were offered, I think, in time when I was studying in which they contain many types of experiments or what type of materials you were using. So anybody in other parts of the world can replicate these efforts to promote optics and of course to promote that young students get involved in science. Thank you for motivating and congratulations for this good label in Rana. I really was motivated for your presentation. Thank you so much. You know that for LIDAR, it is your, as you mentioned during the introduction that you are working on LIDAR. So we decided to do a hands on activity on LIDAR, but you know all the equipment is very expensive. We made some models and today we did an activity based on those models. We explained on a board, the working principle of LIDAR, RIDAR, SONAR, everything, but I made a toy kind of models. You can give, and I can share everything with you online. If you use, I will take your email address from Professor Nevela and we can do that. Thanks for your nice comments. Thanks a lot. Okay. Well, thanks. I'm going to take, we can take one more comment from Hannah and then we need to move on. Now, as usual, I want to reiterate in Rana for this wonderful work that she's doing. The question is, do you have the sensation that all this activity has already produced some more feeling of the students for optics and science. Do you see a result? Yes, Rana. Let me comment because there are, we visited Fatma Janal University couple of times. So we repeated and we have the feedback we were doing the follow up of those activities. Similarly, with some government colleges, we did kind of follow up. So now, as I mentioned that in, this was my first activity in last April when we went to a primary school. It is not a right age to enjoy the right kind of optics activities, but that was really, really, we, it was me and Abdul Rehman on me. Those girls, we have, girls were 70 and we have 10 reflect views to draw an image. They wanted to grab one reflect view, the force and everything to learn and hold off those things to do it by themselves. It was really, and we will go to them again by the end of this year to see how they react to us because in the beginning of that activity, those girls were very shy, very close. And after two, three hours, it was fun to be with them. And similarly, with the different girls, it makes a difference. But there are so many schools, so many colleges, so many to do. And we are not able to visit all these institutes every year. Because last two years with pandemic, even I tried hard to reach out to many universities and this thing but it is still not enough. We need to do and move on from lower level to higher level and then see the result. That sounds like a very general theme for all of us. It's so much to do and so little time and resources to do it. Absolutely. So thanks very much and Rana for wonderful presentation and keep up to good work. I can't wait to get back to Pakistan. I'll bring my camera. So, okay, so John Freddie is here and let me let me just introduce it really quickly. So John Freddie Barreira Ramirez. So he's a professor of physics Institute of Antioquia University probably killed that in Columbia. He was I see ICP Galliano Donato awardee. He's a regular associate of the ICP one of the 30 scientists out of under 40 years old that are doing promising research, which was revealed by Latina Latin America science. He's the most optic senior member SPI senior member. And he's part of the young affiliates network of the World Academy of Sciences. He's won many awards in Columbia, National Research Awards. And he's got two patents as well. So he's been very active and he's also coming here to ICP. So I'm looking very much forward to seeing him again in a couple of weeks. So John Freddie. He's going to talk about optical encryption and optics in Columbia. And so anyway, I'm looking very much forward to your talk and I'll hand it over to you. So you can go I think you can share your screen. Yep, I can hear you. Okay, you can see my presentation. Yep. You need to go into presentation mode but. Okay. Me. Okay, sorry. Okay. We're in the afternoon or, or morning, depending on where you are. My name is John Freddie. Professor of the physics Institute at University of Antiochia in Medellin, Columbia. I am also regular associate of ICTP. The purpose of this talk is present the work that we have done in optical encryption, and also I would to present the state of optical research in Columbia. Okay. Okay, I live in Columbia here in the city of Medellin. Here you can see a view of my part of my city. The main campus of my university is here. Near to the Medellin River. And this is part of the metro system of my city. I'm the coordinator and the opposite of the group is taking this this photo was taken recently in the main campus of my university. It was a cloudy day. What a shame. Here we have the most members of my group. We are six teachers with his own undergraduate and graduate students on here. You can see the members of the research line on optical information process. About a system, as you know, including system allowed to, to protect information, but over the years, many of the criticism that we're originally talked to be secure, but by finally rock. Why we talk about optical inclusion because optical inclusion offers some advantages. For example, the processing is performed at the speed of light. An optical system provides several degree of freedom like polarization, whether in our face, and the most important thing we use a physical key, instead of a digital key, like a digital protection systems. The basic definition of a crystal is why it's quite simple. In the process to convert one data in an encrypted image is encrypted image is a nonsense pattern. And this work is done with a decryption system. This encryption system contains a key element called security key. This element allows to convert the information in the encrypted image and also recovered when you have the security key. And the decryption is the process of converting recovering the information from the encrypted data. In that way, you have encrypted information and the security key. Using both data, you can recover the information, the security of the process. And based on the following idea, if one user intercepts the encrypted information but doesn't have the security key, the information cannot be recovered. It still remains hidden. In this way, this is the system protects the information. The fifth proposal of an optical encrypted system was the double random tracing coding technique. It was proposed in 1985. The system was implemented in a 4F architecture. You can see this encryption system contains two lengths of a current F1 and 2, a two random face mask, one random face mask in the input plate and the second random face mask in the first Fourier plane. If we insert the object in the input plate, I illuminate the system with a plane wave. In the output plane, we update the encrypted data. You can notice that the encrypted data is a noisy pattern due to the use of the two random face mask. The encrypted image is then the information, the convolution between the information in the input plate with the Fourier transfer of the security key. Then the decryption system is also a 4F system. It's a 4F system because it contains, because the distance between the input plane at the output plate is 4F, where F is the focal length of the lens. For the encrypted information, as I said, we use the encrypted object, in this case, the complex conjugate, and in the first Fourier plane, we place the security key. With both data in the output plane, we can recover information. In this way, we can use a 4F system with two random face masks to encrypt and then decrypt the information. Once we can encrypt and decrypt one data, the next step is encrypting and decrypting multiple data. How we can do using multiplexing? Suppose that we have n objects for O1 to On, we encrypt each object in the system individually, and then we obtain each encrypted data, E1, E2, Em. And then we add all the encrypted data in only one package. This package is called multiplexing. What is this? They say you have all the encrypted data in only one that's called multiplexing. Now, how we can recover the data? It's simple. If you obtain the multiplexing, when you use key 1, you recover object 1, and the other information remains hidden. And the same if you have the multiplexing and the key 2, you can recover object 2. In this way, you can send this multiplexing to any users, and each user with one only key can recover only one data. This is the purpose. Send all the encrypted information in one package, and each user only recovers one data. But we have a very big problem when you manage multiple encrypted data. For example, in Figure E, you can see one object that was decrypted and encrypted using the 4F system. But in Figure B, you can see one object recovered when we have the multiplexing of 30 objects. If you have the multiplexing data, 30 objects in the multiplexing, and I'm trying to recover one of the objects. First, we obtain the recovery of the audio, so I can see here in the background, but the 29 non-recovered objects introduce noise on the recorded plane. In this case, you can notice, you can distinguish the object because the noise do it to the other objects. This was a very hard problem for optical increases because set a limit on the number of objects that you can encrypt and decrypt successfully. Now, we found that we can solve the problem modulating the encrypted objects. What is modulating? It's quite simple. We have the encrypted data. We multiply this encrypted data by a sinusoidal rating and we obtain an encrypted and modulated data. If we apply a Fourier transfer over this data, we obtain the diffraction orders where the diffraction orders contain the information of the encrypted data. We are going to use this concept of modulation to encrypt and decrypt successfully multiple data. In this case, suppose we apply this process to encrypt a movie. As you know, a movie is a sequence of frames, projectically set a frequency. We have here the frames from F1 or FN and we encrypt all frames using the Fourier system. We obtain U1 is the encrypted frame F1. GN is a rating and we will multiply the encrypted object U1 by the rating GN, G1, we obtain an encrypted and modulated frame. In this case, we can do the same for all the frames and then we add together all these modulated encrypted objects. Then the encrypted movie is only one data. It's the adding of all modulated and encrypted frames. In this case, we have only one data, the package with all the information encrypted and modulated of the video. For recovering the video from this multiplexing, we applied a Fourier transfer operation here and in the Fourier plane, we obtain the diffraction orders. Each diffraction order contains the information of one specific encrypted frame. In this case, we filter each of the diffraction orders here and after a Fourier transfer, we can select each encrypted frame. In this case, we obtain the complex conjugate of each encrypted frame. We can extract from this multiplexing each encrypted frame without the superposition with the other frames. Now, simply, we use the Fourier decryption system and recover all the frames that were encrypted and modulated. In this way, we can encrypt a lot of frames, a lot of data and recover it independently. In that way, you can recognize every object in the movie. Now, in 2011, we published the first video encrypted optically, probably optical means, here you can see the reconstruction of the video. Look at using the right decryption process, but if we use a wrong key, look at this, we cannot recover the object. The movie is still encrypt. This paper was covered for the spoilers on the section of optical society. Then, we extend this procedure for encrypt color movies. You can do it for each channel and encrypt movies in the same way that you can do it for one movie, like that. Look at this. There are several systems. We saw it for a system, but one of the most used encrypt architectures are the JTC. If you look at the system, this is a two F system system is the because 12 is the distance between the input object input plane to the recording plane. We use a single lens F and in the input plane, we have the object multiplied by a random face mask and a random face mask that consists of the encryption key. If you apply if you illuminate a plane wave. In the Fourier plane of the lens, we obtain the jump power spectrum, we can record that spectrum, for example, with a CMOS or CCD camera. And processing this unit jump power spectrum we can obtain the encrypted data. Here the crypto that is the product between the Fourier transfer of the object by a random face mask. And the Fourier the conjugate of the Fourier transfer of the security key. Here we have the encryption information, but when we need the information of the security key for doing so, we block the information of the object, and we use a reference arm to obtain here the hologram of the Fourier transfer of the key. Then we use a single arm to obtain the encrypted data, but we need an interferonical arrangement to obtain the hologram of the Fourier transfer key. The decryption system is also simple is a 12 system in the input plate will put the encrypted image on the Fourier transfer of the key and in the plane key, we obtain the decrypted data. This is another way to encrypt and recovered information. Then we extend the first proposal of one movie to encrypt multiple movies, for example, we have three movies, we encrypt the first and the last movie, we know one key. And then we encrypt a term movie, the second one here with other key. We add all all these encrypted movies together and look at here here in a the recovered with the key one. We can record the first movie. While the second is still hidden. And the last one can be recovered. On the reverse on the contrary. We use the second key. The first movie is still encrypted. The second is recovered. And the third one is still encrypt. We, we, we publish a lot of a practical applications, one of the most interesting is this application where we are protecting messages or of any length. We use one optical key, what we do is is encrypt every character of a keyboard. Then we multiplex all characters and then using the optical key, the security key, we recover the keyboard in this case is the keyboard and using a select selection position key, we can recover any look at here and suggest information security to light. The security is of the system is covered by the optical key by the random key, but this selection position key allows to recover any message of any length. This work was selected like highlights of 2013 for the number of optics, and also was included in IOP select in IOP platform. We demonstrate that this is possible to include from a single character, structured objects, one movie, several movies, color movies, the messages of any length. But you can see here, you can notice that all recovered data has noise. This noise is a very big problem because users, one user requires safety, this is the optical system provides safety, but high fidelity recovering. We need recovered for example, this photo, but without noise. The optical system uses random face mask and does random face mask produce this noise. Some researchers try to reduce this noise, between them also, using optical and digital techniques, but no of the proposed methods allowed to removing this noise. We were working at least 10 years trying to remove this noise, we can reduce this noise, but we can, we couldn't remove it. But the answer was knowing the optical of digital techniques, using for optical, optical digital processing. The answer was in the quick, in the quick response calls, the QR codes. Now they are very popular, but in 2020, they are very popular, but in the past, we're not so popular. Now, they are, they are two dimensional barcodes employed to store information. These QR codes were invented in 1994 to trap vehicles during manufacture and has a lot of advantages. They are fast reading, they are tolerant to noise. Be careful with this, tolerant to noise, loss and misalignment. And the most important thing for us is the use of QR codes is free of any license. You can use it and there are no license. Look at this idea. We have an object, optical encrypts. If you use our system, you can recover, you encrypt and decrypt the data, but the recovered data has noise due to the processing with random face mask. Or the idea is combining optical encryption and QR code. Look at this. Optical encryption was proposed in 1995 and QR code in 1994, but for different purposes. Here, what we will do is the data is converted in a QR code and we encrypt the QR code instead of the information here. In the emergency, we have the encrypted QR code. If we apply the crypto process, you recover the noisy, the cryptid QR code. But as I told you, the reading of these QR codes is tolerant to noise, you can recover from this noisy QR code, the original information without noise. If you apply the conventional procedure, you recover the information that we did this noise. In conclusion, if we use optical encryption and QR codes, you can protect information and also recovered free of any kind of noise. This, this work was published in a business press and was covered by nature photonics in the station research highlights with the, with the article, quick response codes. We also prepared a patent of these of the system called of the physical apparatus and procedures for encrypting information and it's covering, recovering free of noise. In this point, everything was done from the point of view of basic research. Here, you can see a movie of the optical setup in my laboratory in Medellin. Look at the typical elements mirror polarizer, and it's possible to project the information CC most CC most camera on mirror polarizers. And after this work, we decide to make a prototype of this increase the system here is up to view of the prototype will all the elements involved here. And in this video, I'm going to show you the prototype look at here. The optical system is here in this black box. And the idea is that you can control all the system without one software we develop. This is again, at the view of the system. Here you can see the components is the system is a complete version of the setup that we use for basic research with almost the same elements. Here we can see some difference, but in general, it's almost the same setup. The polarizer here, polarizer here, mirror, as a most camera. And there's a change here, the previous system is a digital micro mirror device is the special line modulator is a less costly elements. We construct a generator of an office mask. To register the optical key. As I said, we prepare a software that control the the optical system, we can insert the information for example here for the computer you can insert alternative GTC. This is the message you can protect and the system generates the corresponding QR code. Then, we encrypt the data using the optical system and obtain the security key. Then, with both information, we can record the original data. This works in several domains for your fractional. Here are some parameters you can change, but in general, we decrypted that of the security key. Due to the script, the QR code, after reading the QR code, you can recover the information free of any kind of noise. This has a lot of steps. It wasn't easy from the basic research to a prototype for me was extremely difficult because we never have the experience to things like that and it's very difficult. It was very difficult for us. Okay. On summary, we start to encrypt single data like a character, for example, the letter e to more structure objects like QR codes. Also, we create we create new codes, new codes for recovering information free of noise. Also, great scale information. We pass to color information. And in these days, we were able to encrypt and decrypt color and structure information here. To the right, you can see the record the decryption of a movie or a real movie of a 3D and color object. Look at this. It's a three dimensional object in color. Here, here you can see the evolution from a single letter to a real to a real movie. Our last, our last contribution is a compact increase in system. Take, take attention, look at for the JTC system, we use one setup to obtain the data is only and only one, but if you want to record the security key, you have to use an interferometric arrangement. You have to add this arm, this reference arm to the system. Okay. What is our idea. We want to record encrypted data and the encryption key using a single arm setup for in both cases, look for recording encrypted data and then a recording encrypted key. We propose a published one contribution, then the way we show that it's possible to encrypt and to record the encrypted information at the security key with a need for a reference arm. What we do. What's simple. When we are projecting the information of the security key. One window that acts like, like a reference arm in this way we can record, record encrypted image and security key using the same system. One arm system results in a significant decrease in the size. The quantity of elements, look at this, look at the setup, the size and the, this is all the quantity of elements do it to this reference arm and the setup that has a reference arm. The results that in a decreasing of size, the quantity of elements and the complexity of the system. And I want to say you that you can do basic research with low cost setups. What does mean. It depends of the pocket, but the local setup, for example, you can implement this setup with buying the components in an appropriate place, maybe by 3000 to $4,000 and you can do basic research with this money. But the biggest thing that you need big, big labs with a lot of elements, not always, not always, sometimes it's possible to do good research with local setups is a message that you are going to receive in the next talk with my friend on birth. At this point also I want to, to say that we have a scientific collaboration over group with the ICTP of the laboratory in the frame of the program field is a program for training and research in Italian laboratories under under this this program, one of our students was in the ECTP of the laboratory with Umberto and Joe, they, they, he was there two months, trying to, to combine optical encryption that is work or topic here in Medellin with the topic of Umberto and Joe in ICTP lab, that is, in 2008. And after two months of working there, my students, we were able to publish the GR, this paper in Journal of Optics, Optical Increase Using Modulation, Generated by Thermalness Effect. This is opportunity for you if you want to, to work in research maybe apply to this time of programs that are very, very useful for home for young researchers. I'm going to, to use the last part of it, my talk to, to talk about the state of optical history in Colombia as an asymmetric analysis. This is very important, because you never know how is is working your country along the along the years, and this study was published the year, and it's very interesting. This study were determined using the research articles published by authors with Colombian affiliation in journal index in the scope of database, or was taken from the scope of database belonging to atomic and molecular physics and optics to this category. These are important facts, even for me, the first work in Colombia in this topic was in was published in 1973. We have two periods, 1944, 1979 and 1981 to 1988 with, without publications. For 1999, the publications climb rapidly until 2000, 2002, when we have 135 publications. Here, we can see the optical research groups. The first group was created in 1972, it was our group. From 1973 to 1979, no group was created in this period. Most groups were created until 2005, where the number of the new groups start to decrease. And these same frames coincide with the return to the country of many Colombians with PhD in optics or related areas. For example, in this, in this time, in the same frame, a lot of researchers that were to do the PSD. Alongside, they return to Colombia and start to publish. Here is the distribution of the groups in Colombia, we have 61 groups in optics on related areas. Look at here in red, we have the group from 2003 to 2010. You have most of the group here, look at where created a lot of group in that time from 2003, 2010, and from 2011 to 2020 start to decrease the number of new groups. You can see the groups are concentrated in the most concentrated administrative departments with more gross domestic product, the biggest departments were populated. For the general productivity between 2016 to 2020, we can see that in 2016 were published 114 while in 2020 we published 202. It was an increment of 77.2%. The productivity increased beer year per year with an average 169 per year from 2016 to 2020. Another important fact, look at here, the percentage of international collaboration in 2016 was 64.9 and in 2020, 61.9. This international collaboration was above 60% except for one year. And the percentage of output in Q1 for 2016 were 20.2 and for 2020, 30.2. It was a huge increment here from 2016 to 2002. These institutions contribute with more than 50 papers. This is institutions have their green campus in the three administrative departments with most of these are for the research groups. Look, look at this, the first University of National Columbia and University of National Antioch are public universities. The University of National Columbia is the biggest university in Columbia and it's a national university and University of Antioch is a departmental university. Look at the number of documents. Also, the University of National Columbia publish 2.6 times more documents than University of Antioch. The University of National, the Columbia. Look, look at here the value 6.513.13 has half as many citations per document than University of Antioch. You do say that the impact of the documents for University of Antioch is superior. Look at this, this is that top seated documents in patents between 2011 2020. You can find here. Come on from the society, optical express of the letters and applied optics. But it's interesting to note that there are three contribution in proceeding of SPI showing that this proceedings has a high impact in technological aspects. Now, here, look at this interesting slide. But 30 journal with most policies articles between 2016, I'm sorry, between 2016 to 2020. You can see here, the classical journals from optical society apply optics of the layers of this spread. Look at here of this communication of simulation engineering of this technology and some. The triple e-journals in the world. It's very important because we have all journals are q1 or q2 except for three q3. Look at that here. In blue q3 optical engineering, European Journal of Physics, Journal D, internal journal only to q4. Those are optica for the applicable and you know of nonlinear optics, physics and materials. Regarding the productivity between 2003 and 2020, we can see here 2003 35 papers and in 2020. 2002, an increment factor of 5.8 is a big increment from 2003 2002. The international collaboration in 2003 was 668.6 to 61.9 is almost the same above 60 and the output in q1 remains almost constant. 31.2 to 30.2. You can, you have to notice that this is the variation in this in this data, depending on the new professor that returned from other countries to Colombia to the research and the changes of the funding policies. And also, we can conclude the opti research in Colombia and established area area of research with active groups groups around the world with high impact in his products. Finally, finally, finally, we can see here, look at the general productivity for Colombia in all areas of knowledge. According to Simago Journal and Contra Rank, Colombia is in the place 48 of the countries. And we can see here, to the right, upload with the contribution to Colombia to the world, Latin America or Iber America. Pay pay attention on this line, the oldest line. This is the contribution to Colombia to the total production of Latin America of Latin America in 2003. The contribution of Colombia was 2.6% of all the contribution of Latin America. While in 2020, in 2020, the contribution was 8.75%. An increment factor of 3.4. This is talking about all the areas of research in Colombia. Then we can say the productivity increased from 2003 to 2020 with this increment factor and look at this. The increment factor of all areas was 3.4. While the increment factor for optics was 5.8. Well, we can say the increment of the optics area was superior, I'm sorry, I'm sorry, was superior to the increment in all areas. The performance of the optics research was superior to that, if we saw all areas. Finally, this work is done with a lot of collaborations. My colleagues from the University, we work in the, since the beginning in this world, I have, I have active collaboration with Centro Investigaciones Opticas in Argentina. And now I started a collaboration with one of my past students. Carlos Regoso Campo, a nice professor in the University of Maryland. Some institutions help me a lot, my university, the Ministry of Science of Colombia, the Ministry of Science in Argentina, and also the International Center for Theoretical Physics. And finally, the program of associates, I started as a junior associate and now I'm a regular associate, and I am also associated for us, the World Academy of Sciences. And obviously, are you, are you welcome to my university. Thank you very much for your attention, you have questions. I'm here. Thank you very much. Wonderful talk and presentation of looks like things are picking up in Colombia. And thanks for the advertisement. I think we do have a we have a question from Henry right, Abdul. Yes, Henry, Henry, you can unmute and ask a question directly from the speaker. Yeah. Yes, thank you. I didn't quite understood the, the, when you mentioned that the key is physical. So in that sense, I was wonder how the description process is sensitive to the natural degradation of the materials about the time. So, what are the plans for the, what are the, how, how are you thinking to solve this possible situation. The grid or any physical device optical device could suffer some degradation with the time so I don't know at this point, this is a matter of concern. Yeah, that's my, my question. Okay, Henry, thank you very much for the question is a very interesting question. The key for this optical system is the, the security key, of course, the security key in this case is a grown glass diffuser is a glass with different brownies around the areas. And usually these, these keys are generated for certain time, for example, you create a thing, 10 security keys and use that key for example for one month. Also, there is a very interesting topic you can generate biological for example, biological keys. This case has several advantages. For example, you generate the kids, the kids without biological matter. And you can use this case for one month. If you want to capture this key, I want to, to, to register this case that the biological system change and the kids are different. Maybe it can be a problem, but can be an advantage you can use the system that helps a key that changes to protect the information along the time. But usually, usually we use glass diffusers, they're not changing time. Thank you. Thank you very much. Just take a moment. Welcome. From seconds just to, to help you that maybe I will contact later. How to help me to start some optical group here in my university, as I say. So, later. You're welcome. Write me an email. I am happy to help you with every talk. Don't worry, don't worry. Thank you. I can help you. It's not easy, but you can do it. Well, that's great because that, that's part of the networking that I remember so fondly from when we were doing these optical colleges over the years. Here in person at ICP. Any other questions or. I don't see. Okay. Well, thanks, thanks very much John Freddie that was a really great overview and what an interesting topic. So we're going to go on to our last, last talk today. I just want to remind everybody again, because many.