Acta Optica Sinica, Volume. 34, Issue 9, 907001(2014)

Using QR Codes in Multi-Image Optical Interference Encryption System to Reconstruct High Quality Original Information

Wang Hongjuan*, Wang Zhipeng, Zhang Yingying, Liu Xuyan, and Qin Yi
Author Affiliations
  • [in Chinese]
  • show less
    References(21)

    [1] [1] Xi Sixing, Sun Xin, Liu Bing, et al.. New image encryption technology of image based on computer generated hologram [J]. Laser and Optoelectronics Progress, 2012, 49(4): 040902.

    [3] [3] Nanrun Zhou, Yixian Wang, Lihua Gong, et al.. Novel single-channel color image encryption algorithm based on chaos and fractional Fourier transform [J]. Opt Commun, 2011, 284(12): 2789-2796.

    [5] [5] Bahram Javidi. Securing information with optical technologies [J]. Physics Today, 1997, 50(3): 27-32.

    [6] [6] Ayman Alfalou, C Brosseau. Optical image compression and encryption methods [J]. Advance in Optics and Photonics, 2009, 1(3): 589-636.

    [7] [7] Philippe Refregier, Bahram Javidi. Optical image encryption based on input plane and Fourier plane random encoding [J]. Opt Lett, 1995, 20(7): 767-769.

    [8] [8] Bahram Javidi, Esmail Ahouzi. Optical security system with Fourier Plane encoding [J]. Appl Opt,1998, 37(26): 6247-6255.

    [9] [9] S Kishk, B Javidi. Information hiding technique with double random phase encoding [J]. Appl Opt,2002, 41(26): 5462-5470.

    [10] [10] B Hennelly, J T Sheridan. Optical image encryption by random shifting in fractional Fourier domains [J]. Opt Lett, 2003, 28(4): 269-271.

    [11] [11] P C Mogensen, J Glückstad. Phase-only optical encryption [J]. Opt Lett, 2000, 25(8): 566-568.

    [12] [12] Guohai Situ, Jingjuan Zhang. Multiple-image encryption by wavelength multiplexing [J]. Opt Lett, 2005, 30(11): 1306-1308.

    [13] [13] Guohai Situ, Jingjuan Zhang. Position multiplexing for multiple-image encryption [J]. J Opt A, 2006, 8(5): 391-397.

    [14] [14] Zhengjun Liu, Yan Zhang, Haifa Zhao, et al.. Optical multi-image encryption based on frequency shift [J]. Optik, 2011, 122(5): 1010-1013.

    [15] [15] Hsuan T Chang, Wei C Lu, Chung J Kuo. Multiple-phase retrieval for optical security systems by use of random-phase encoding [J]. Appl Opt, 2002, 41(23): 4825-4834.

    [16] [16] Youzhi Li, Kathi Kreske, Joseph Rosen. Security and encryption optical systems based on a correlator with significant output images [J]. Appl Opt, 2000, 39(29): 5295-5301.

    [17] [17] Yan Zhang, Bo Wang. Optical image encryption based on interference [J]. Opt Lett, 2008, 33(21): 2443-2445.

    [18] [18] Bo Wang, Yan Zhang. Double images hiding based on optical interference [J]. Opt Commun, 2009, 282(17): 3439-3443.

    [19] [19] Wen Chen, Xudong Chen. Optical multiple-image encryption based on multiplane phase retrieval and interference [J]. J Opt, 2011, 13(11): 115401.

    [20] [20] Yi Qin, Qiong Gong. Interference-based multiple-image encryption with silhouette removal by position multiplexing [J]. Appl Opt, 2013, 52(17): 3987-3992.

    [21] [21] John Fredy Barrera, Alejandro Mira, Roberto Torroba. Optical encryption and QR codes: secure and noise-free information retrieval [J]. Opt Express, 2013, 21(5): 5373-5378.

    CLP Journals

    [1] Lin Chao, Shen Xueju, Lei Ming, Dou Shuaifeng, Zou Xiao. Optical Security Validation Based on Orthogonal Polarization Multiplexing in Three-Dimensional Space[J]. Acta Optica Sinica, 2016, 36(3): 307001

    [2] Liu Yiqun, Wei Yuechuan, Zhang Minqing, Zhou Tanping, Yang Xiaoyuan. Secure quick response code based on the technology of three-dimensional imaging[J]. Infrared and Laser Engineering, 2019, 48(5): 503003

    Tools

    Get Citation

    Copy Citation Text

    Wang Hongjuan, Wang Zhipeng, Zhang Yingying, Liu Xuyan, Qin Yi. Using QR Codes in Multi-Image Optical Interference Encryption System to Reconstruct High Quality Original Information[J]. Acta Optica Sinica, 2014, 34(9): 907001

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Fourier optics and signal processing

    Received: Mar. 28, 2014

    Accepted: --

    Published Online: Aug. 12, 2014

    The Author Email: Hongjuan Wang (35148784@qq.com)

    DOI:10.3788/aos201434.0907001

    Topics