OSA's Digital Library

Optics Express

Optics Express

  • Editor: Andrew M. Weiner
  • Vol. 21, Iss. 5 — Mar. 11, 2013
  • pp: 5373–5378

Optical encryption and QR codes: Secure and noise-free information retrieval

John Fredy Barrera, Alejandro Mira, and Roberto Torroba  »View Author Affiliations

Optics Express, Vol. 21, Issue 5, pp. 5373-5378 (2013)

View Full Text Article

Enhanced HTML    Acrobat PDF (1547 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



We introduce for the first time the concept of an information “container” before a standard optical encrypting procedure. The “container” selected is a QR code which offers the main advantage of being tolerant to pollutant speckle noise. Besides, the QR code can be read by smartphones, a massively used device. Additionally, QR code includes another secure step to the encrypting benefits the optical methods provide. The QR is generated by means of worldwide free available software. The concept development probes that speckle noise polluting the outcomes of normal optical encrypting procedures can be avoided, then making more attractive the adoption of these techniques. Actual smartphone collected results are shown to validate our proposal.

© 2013 OSA

OCIS Codes
(070.4560) Fourier optics and signal processing : Data processing by optical means
(060.4785) Fiber optics and optical communications : Optical security and encryption
(100.4998) Image processing : Pattern recognition, optical security and encryption

ToC Category:
Image Processing

Original Manuscript: December 19, 2012
Manuscript Accepted: January 9, 2013
Published: February 25, 2013

John Fredy Barrera, Alejandro Mira, and Roberto Torroba, "Optical encryption and QR codes: Secure and noise-free information retrieval," Opt. Express 21, 5373-5378 (2013)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett.20(7), 767–769 (1995). [CrossRef] [PubMed]
  2. O. Matoba and B. Javidi, “Optical retrieval of encrypted digital holograms for secure real-time display,” Opt. Lett.27(5), 321–323 (2002). [CrossRef] [PubMed]
  3. T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng.39(8), 2031–2035 (2000). [CrossRef]
  4. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett.25(12), 887–889 (2000). [CrossRef] [PubMed]
  5. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett.29(14), 1584–1586 (2004). [CrossRef] [PubMed]
  6. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption system that uses phase conjugation in a photorefractive crystal,” Appl. Opt.37(35), 8181–8186 (1998). [CrossRef] [PubMed]
  7. X. Tan, O. Matoba, Y. Okada-Shudo, M. Ide, T. Shimura, and K. Kuroda, “Secure optical memory system with polarization encryption,” Appl. Opt.40(14), 2310–2315 (2001). [CrossRef] [PubMed]
  8. R. Henao, E. Rueda, J. F. Barrera, and R. Torroba, “Noise-free recovery of optodigital encrypted and multiplexed images,” Opt. Lett.35(3), 333–335 (2010). [CrossRef] [PubMed]
  9. G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett.30(11), 1306–1308 (2005). [CrossRef] [PubMed]
  10. N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun.284(3), 735–739 (2011). [CrossRef]
  11. C. Lin, X. Shen, R. Tang, and X. Zou, “Multiple images encryption based on Fourier transform hologram,” Opt. Commun.285(6), 1023–1028 (2012). [CrossRef]
  12. A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photon.1(3), 589–636 (2009). [CrossRef]
  13. F. Mosso, J. F. Barrera, M. Tebaldi, N. Bolognini, and R. Torroba, “All-optical encrypted movie,” Opt. Express19(6), 5706–5712 (2011). [PubMed]
  14. J. F. Barrera, M. Tebaldi, C. Ríos, E. Rueda, N. Bolognini, and R. Torroba, “Experimental multiplexing of encrypted movies using a JTC architecture,” Opt. Express20(4), 3388–3393 (2012). [CrossRef] [PubMed]
  15. F. Liu, Q. K. Fu, and L. M. Cheng, “Wave-atoms-based multipurpose scheme via perceptual image hashing and watermarking,” Appl. Opt.51(27), 6561–6570 (2012). [CrossRef] [PubMed]
  16. H. Wang, W. Zhang, and A. Dong, “Modeling and validation of photometric characteristics of space targets oriented to space-based observation,” Appl. Opt.51(32), 7810–7819 (2012). [CrossRef] [PubMed]
  17. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett.30(13), 1644–1646 (2005). [CrossRef] [PubMed]
  18. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett.31(8), 1044–1046 (2006). [CrossRef] [PubMed]
  19. J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett.35(21), 3553–3555 (2010). [CrossRef] [PubMed]
  20. ISO, IEC 18004: 2006, “Information technology - Automatic identification and data capture techniques - QR Code 2005 bar code symbology specification,” International Organization for Standardization, Geneva, Switzerland (2006).
  21. S. Dey, “SD-EQR: A new technique to use QR codesTM in cryptography: use of QR CodesTM in data hiding and securing,” in Proceedings of International Conference on Emerging Trends of Computers and Information Technology, Vol 3 of 2012 WINBIS, (Open Learning Society, 2012), pp. 11–21.
  22. E. Ohbuchi, H. Hanaizumi, and L. A. Hock, “Barcode readers using the camera device in mobile phones,” in Proceedings of IEEE 2004 International Conference on Cyberworlds (IEEE, 2004), pp. 260 – 265.
  23. K. C. Liao and W. H. Lee, “A novel user authentication scheme based on QR-Code,” J. Netw.5, 937–941 (2010).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


Fig. 1 Fig. 2 Fig. 3
Fig. 4 Fig. 5

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited