Optical encryption with noise-free recovery
PDF (Español (España))

How to Cite

Barrera Ramírez, J. F., & Torroba, R. D. (2015). Optical encryption with noise-free recovery. Revista De La Academia Colombiana De Ciencias Exactas, Físicas Y Naturales, 39, 48–54. https://doi.org/10.18257/raccefyn.259

Downloads

Download data is not yet available.

Métricas Alternativas


Dimensions

Abstract

The information protection systems based on optical processors, employing a double random phase mask encryption technique, allow data securely handling, but the recovery is not noise-free. Although the system security is provided by the optical processor enabling the information encoding, we demonstrate in this contribution that noise-free recovery is indeed possible by including the quick response coding, without altering the data protection process. The information to be protected is first converted into a quick response code or QR code, and then this code is optically encrypted. The decrypted QR code exhibits the usual noise produced by the random phase masks along with the involved opto-digital processing. Finally, when scanning the decrypted QR code we recover the original information without noise. We include the theoretical description of the optical processor, as well as we show experimental results that corroborate the validity and applicability of the security system.© 2015. Acad. Colomb. Cienc. Ex. Fis. Nat. All rights reserved.
https://doi.org/10.18257/raccefyn.259
PDF (Español (España))

References

Barrera, J.F., Henao, R., Tebaldi, M., Torroba, R., Bolognini, N. 2006a. Multiplexing encrypted data by using polarized light. Opt. Commun. 260: 109-112.

Barrera, J.F., Henao, R., Tebaldi, M., Torroba, R., Bolognini, N. 2006b. Multiple image encryption using an aperture-modulated optical system. Opt. Commun. 261: 29-33.

Barrera, J. F., Vargas, C., Tebaldi, M., Torroba, R. 2010a. Chosen-plaintext attack on a joint transform correlator encrypting system. Opt. Commun. 283: 3917-3921.

Barrera, J., Vargas, C., Tebaldi, M., Torroba, R., Bolognini, N. 2010b. Known plaintext attack on a joint transform correlator encrypting system. Opt. Lett. 35: 3553-3555.

Barrera, J.F., Mira, A., Torroba, R. 2013a. Optical encryption and QR codes: Secure and noise-free information retrieval. Opt. Express 21: 5373-5378.

Barrera, J.F., Vélez, A., Torroba, R. (Agosto, 2013)b. Information security through light: Protecting information with optical processors. Sección Labtalk, J. Opt. Recuperado de http://iopscience.iop.org/2040-8986/labtalk-article/54457.

Barrera, J.F., Vélez, A., Torroba, R. 2013c. Experimental multiplexing protocol to encrypt messages of any length. Journal of Optics 15: 055404.

Barrera, J.F., Mira, A., Torroba, R. 2014a. Experimental QR code optical encryption: noise-free data recovering. Opt. Lett. 39: 3074-3077.

Barrera, J.F., Vélez, A., Torroba R. 2014b. Experimental scrambling and noise reduction applied to the optical encryption of QR codes. Opt. Express. 22: 20268-20277.

Carnicer, A., Montes-Usategui, M., Arcos, S., Juvells I. 2005. Vulnerability to chosen cyphertext attacks of optical encryption scheme based on double random phase mask. Opt. Lett. 30: 1644-1646.

Carnicer, A., Hassanfiroozi, A., Latorre-Carmona, P. Huang, Y. P., Javidi B. 2015. Security authentication using phase-encoded nanoparticle structures and polarized light. Opt. Lett. 40: 135-138.

Fan, D., Meng, X., Wang, Y., Yang, X., Peng, X., He, W., Dong, G., Chen, H. 2013. Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm. Appl. Opt. 52: 5645-5652.

Gluckstad, G., Riso F. (Junio 14, 2005). Optical encryption and decryption method and system. U.S. patent 6907124.

Graydon, O. 2013. Cryptography: Quick response codes. Nature Photonics, 7: 343.

ISO,IEC 18004. 2006. Information technology - Automatic identification and data capture techniques – QR Code 2005 bar code symbology specification. International Organization for Standardization, Geneva, Switzerland.

Javidi, B., Towghi, N., Maghzi, N., Verrall S. C. 2000. Error-reduction techniques and error analysis for fully phase- and amplitude-based encryption. Appl. Opt. 39: 4117-4130.

Javidi, B. (Febrero, 2003). Method and Apparatus for Encryption Using Partial Information. U.S. Patent Number 6519340 B1.

Javidi, B., Tajahuerce, E. (Mayo 22, 2007). Information security using digital holography. U.S. patent 7221760 B2.

Javidi, B., Esmail, A., Zhang, G. (Marzo 23, 2010). Optical Security system using Fourier plane encoding. U.S. patent 7684098.

Liao, K. C., Lee, W. H. 2010. A novel user authentication scheme based on QR-Code. J. Netw. 5: 937-941.

Lin, C., Shen, X., Li, B. 2014. Four-dimensional key design in amplitude, phase, polarization and distance for optical encryption based on polarization digital holography and QR code. Opt. Express 22: 20727-20739.

Markman, A., Javidi, B., Tehramipoor, M. 2014. Photon-counting security tagging and verification using optically encoded QR codes. IEEE Photonics Journal 6: 6800609.

Matoba, O., Javidi, B. 1999. Encrypted optical storage with wavelength-key and random phase codes. Appl. Opt 38:6785-6790.

Peng, X., Zhang, P., Wei, H., Yu B. 2006. Known-plaintext attack on optical encryption based on double random phase keys. Opt. Lett. 31: 1044-1046.

Qin, Y., Gong, Q. 2014. Optical information encryption based on incoherent superposition with the help of the QR code. Opt. Commun. 310: 69-74.

Treacy, S. (agosto de 2013). The creative power of Colaboration. The world Academy of Sciences TWAS. Recuperado de http://twas-old.ictp.it/news-in-home-page/news/the-creative-power-of-collaboration.

Vilardy, J. M., Millán, M. S., Peréz-Cabre, E. 2013. Improved decryption quality and security of a joint transform correlator-based encryption system. J. Opt. 15: 025401.

Wang, Z., Zhang, S., Liu, H., Qin, Y. 2014. Single-intensity-recording optical encryption technique based on phase retrieval algoritm and QR code. Opt. Commun. 332: 36-41.

Zhang, Y., Xiao, D., Wen, W., Liu, H. 2013a. Vulnerability to chosen-plaintext attack of a general optical encryption model with the architecture of scrambling-then-double random phase encoding. Opt. Lett. 38: 4506-4508.

Zhang, C., Liao, M., He, W., Peng, X. 2013b. Ciphertext-only attack on a joint transform correlator encryption system. Opt. Express 21: 28523-28530

Declaration of originality and transfer author's rights

The authors declare:

  1. The published data and reference materials have been duly identified with their respective credits and have been included in the bibliographic notes and citations that have been so identified and that should it be required, I have all releases and permissions from any copyrighted material. 
  2. All material presented is free from any copyright and that I accept full legal responsibility for any legal claims relating to copyrighted intellectual property, fully exonerating from responsibility the Revista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturales.
  3. This work is unpublished and will not be sent to any other journal while waiting for the editorial decision of this journal. I declare that there is no conflict of interest in this manuscript.
  4. In case of publication of this article, all author´s rights are transferred to the Revista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturales, and so cannot be reproduced in any form without the express permission of it.
  5. By means of this document, if the article is accepted for publication by the Revista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturales, the Revista assumes the right to edit and publish the articles in national and international indices or data bases for academic and scientific use in paper, electronic, CD-ROM, internet form either of the complete text or any other known form known or to be known and non-commercial, respecting the rights of the authors.

Transfer of author rights

In case the article is approved for publication, the main author in representation of himself and his co-authors or the main author and his co-authors must cede the author rights of the corresponding article to the Revista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturales, except in the following cases:

The authors and co-authors will retain the right to revise, adapt, prepare derived works, oral presentations, and distribution to some colleagues of reprints of their own published work, if the corresponding credit is given to the Revista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturales. It is also permissible to publish the title of the work, summary, tables, and figures of the work in the corresponding web sites of the authors or their employers, also giving credit to the Revista.

If the work has been realized under contract, the author’s employer has the right to revise, adapt, prepare derivative works, reproduce, or distribute in hard copy the published work, in a secure manner and for the exclusive use of his employees.

If the Revista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturales were approached for permission by a third party for using, printing, or publishing specifically articles already published, the Revista must obtain the express permission of the author and co-authors of the work or of the employer except for use in classrooms, libraries, or reprinted in a collective work. The Revista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturales reserves the possible use in its front cover of figures submitted with the manuscripts.

No other right, other than the author’s right, can be claimed by the Revista de la Academia Colombiana de Ciencias Exactas, Físicas y Naturales.