Journal of Information Security and Applications 45 (2019) 35–43
Contents lists available at ScienceDirect
Journal of Information Security and Applications
journal homepage: www.elsevier.com/locate/jisa
Quick response code and Interference-based optical asymmetric
cryptosystem
Avishek Kumar, Naveen K. Nishchal
∗
Department of Physics, Indian Institute of Technology Patna, Bihta 801 106, Patna, Bihar, India
a r t i c l e i n f o
Article history:
Keywords:
Image encryption
Arnold cat map
Quick response codes
Fresnel transform
Interference
a b s t r a c t
In this paper, a novel image encryption scheme based on quick response code and interference in Fresnel
domain is proposed. The framework is asymmetric in nature due to amplitude- and phase-truncation
operation of encoded spectrum. The input image is scrambled using Arnold cat map and divided into
pixel blocks. Each block is encoded into a quick response code, which are then multiplexed to generate
a binary matrix. The phase-truncated binary matrix is encoded into analytically generated two phase-
only masks. During decryption the phase-only masks are recombined to yield the binary matrix, which
is grouped into quick response codes and decoded into pixel blocks. The pixel blocks are recombined and
descrambled to retrieve the original image. Numerical simulations have been carried out to demonstrate
the effectiveness of the proposed method.
© 2019 Elsevier Ltd. All rights reserved.
1. Introduction
Securing data/information and secure dissemination of informa-
tion are of prime concern in today’s digital era. Digital compu-
tational techniques to secure data have been flourishing through
decades. In last two decades, optical image encryption techniques
have also emerged and are attracting increased attention because
of their high speed and parallel processing capability. An opti-
cally processed image may be represented as an amplitude im-
age, phase-only image or a combination of both. A groundbreak-
ing research was reported by Refregier and Javidi, who proposed
a scheme to encrypt an image into a stationary white noise em-
ploying double random phase encoding (DRPE) architecture [1].
The method was further explored and expanded into other opti-
cal domains, such as, fractional Fourier, Fresnel, gyrator transform
domains, etc. [2–4].
Despite widespread acclamation of DRPE, the scheme was
proved to be prone to security attacks. The decryption key was
easily obtained if Dirac delta function was used as the test im-
age in the encryption process [5]. Vulnerabilities of DRPE to vari-
ous other applicable attacks were also reported [6–8]. A method of
scrambling and then applying DRPE to the test image also proved
to be vulnerable to brute force attack [9]. To address the vulnera-
bilities of the basic DRPE, security enhanced versions of the DRPE
scheme were reported [10,11]. The major drawback of symmetric
∗
Corresponding author.
E-mail address: nkn@iitp.ac.in (N.K. Nishchal).
cryptosystems is the key management. Since the same key is used
during encryption and decryption process, the keys needs to be
sent to the authorized receiver through a dedicated channel and
are thus vulnerable to attacks. Asymmetric cryptographic schemes
use different encryption and decryption keys, in which encryption
key is made publicly available. Even if the attacker gets any of the
pairs of plaintext, cipher text, and encryption key, it would be very
difficult to derive the decryption key and hence decrypt the infor-
mation. Amplitude- and phase-truncation based optical asymmet-
ric cryptosystems are very popular among the research community
and various contributions exist in literature [12]. However, a se-
curity leak has been discovered in the basic scheme. The scheme
was prone to known-plaintext attack, in which the decryption keys
are obtained using a pair of known-plaintext and ciphertext us-
ing the modified Gerchberg–Saxton phase retrieval algorithm [13].
The basic scheme was also proved vulnerable to a specific attack
[14,15].
Chaos, a non-linear phenomenon has gained lot of ground and
continues to be an active element of research owing to its highly
unpredictable nature and sensitivity to the initial conditions. A
slight difference between the initial states produces entirely differ-
ent trajectories, which grows exponentially with time and do not
converge. Singh and Sinha proposed a chaos-based DRPE scheme
in which the random phase masks (RPM) are generated by chaos
functions namely Logistic map, Tent map, and Kalpan–Yorke map
[16]. A proposal to enhance the security of basic DRPE scheme
by randomizing the input image pixels using a chaotic Baker map
have also been reported [20]. It can therefore be inferred that
optical technologies linked with chaos theory may be a good
https://doi.org/10.1016/j.jisa.2019.01.004
2214-2126/© 2019 Elsevier Ltd. All rights reserved.