2013
DOI: 10.1364/oe.21.005373
|View full text |Cite
|
Sign up to set email alerts
|

Optical encryption and QR codes: Secure and noise-free information retrieval

Abstract: Abstract:We introduce for the first time the concept of an information "container" before a standard optical encrypting procedure. The "container" selected is a QR code which offers the main advantage of being tolerant to pollutant speckle noise. Besides, the QR code can be read by smartphones, a massively used device. Additionally, QR code includes another secure step to the encrypting benefits the optical methods provide. The QR is generated by means of worldwide free available software. The concept developm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
79
0
4

Year Published

2015
2015
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 178 publications
(83 citation statements)
references
References 24 publications
0
79
0
4
Order By: Relevance
“…Advanced Secure Optical Image Processing for Communications [1][2][3][4][5][6][7][8][9][10] shows that the correlation between the original image pixels is very strong, whereas figure 1.14(b) shows that correlation of the encrypted image is very weak. Thus, the proposed encryption system has strong decorrelation power, and resists statistic attacks.…”
Section: Asymmetric Multiple-image Fusion and Authenticationmentioning
confidence: 99%
“…Advanced Secure Optical Image Processing for Communications [1][2][3][4][5][6][7][8][9][10] shows that the correlation between the original image pixels is very strong, whereas figure 1.14(b) shows that correlation of the encrypted image is very weak. Thus, the proposed encryption system has strong decorrelation power, and resists statistic attacks.…”
Section: Asymmetric Multiple-image Fusion and Authenticationmentioning
confidence: 99%
“…In this case the choice of the proper criterion or criteria may play an important role for the estimation of the set of the key parameters of the optical scheme which have been used to obtain the encrypted image [5,12]. On the other hand, because of the multidimensionality of the encryption and decryption process [13], the numerical methods of the breaking DRPE through the direct brute force attack can not be used in the present time due to a high computational complexity of this task [3][4][5]. But there are several much more efficient approaches of the breaking DRPE based on the iterative techniques [14][15][16][17][18][19][20][21].…”
Section: Introductionmentioning
confidence: 99%
“…Teniendo como marco de referencia lo antes mencionado, para sobrepasar esa gran limitación se integraron un sistema óptico de encriptación de doble máscara de fase en una arquitectura 4f y la codificación de gráfica, logrando por primera vez recuperar los datos sin ningún tipo de ruido (Barrera, et al, 2013a). En esta demostración, la información que se pretende proteger se convierte en un código de respuesta rápida (CRR), conocido ampliamente como código QR (en inglés quick response code o QR code).…”
Section: Introductionunclassified
“…Finalmente, el código QR desencriptado es decodificado para recuperar la información original libre de ruido. En este contexto, la codificación y decodificación de respuesta rápida es la principal responsable de la ausencia de ruido, mientras que el procesador óptico es el principal responsable de la seguridad del proceso (Graydon, 2013;Treacy, 2013;Barrera, et al, 2013a).…”
Section: Introductionunclassified