Speckle visual cryptography for credential authentication.

Applied optics Pub Date : 2024-06-01 DOI:10.1364/AO.522918
Anqing Jiao, Yupeng Zhu, Zhaoke Mi, Xinlong Zhou, Qiaofen Zhu, Changjun Ke, Yishi Shi
{"title":"Speckle visual cryptography for credential authentication.","authors":"Anqing Jiao, Yupeng Zhu, Zhaoke Mi, Xinlong Zhou, Qiaofen Zhu, Changjun Ke, Yishi Shi","doi":"10.1364/AO.522918","DOIUrl":null,"url":null,"abstract":"<p><p>Based on the high random distribution characteristic of the natural speckle image, a new method of speckle visual cryptography, to the best of our knowledge, is designed by combining the natural speckle image with the secret key in visual cryptography. Specifically, we designed an authentication system for user credentials by combining speckle visual cryptography and the QR code. By using the speckle visual cryptography method, the image of the QR code carrying user authentication information is hidden in the speckle image, and the speckle image is printed on the paper credentials. Through a simulation and analog experiments, we verify the possibility of applying speckle visual cryptography to a user credentials authentication system, compare the improved grayscale reordering algorithm and grayscale reordering algorithm, and prove that the improved grayscale reordering algorithm has more advantages in this system by comparing the PSNR and SSIM. Finally, the <i>y</i>-interference ability and the uniqueness of the virtual secret key in the system are analyzed to prove that the secret key has high anti-interference ability and security.</p>","PeriodicalId":101299,"journal":{"name":"Applied optics","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Applied optics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1364/AO.522918","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Based on the high random distribution characteristic of the natural speckle image, a new method of speckle visual cryptography, to the best of our knowledge, is designed by combining the natural speckle image with the secret key in visual cryptography. Specifically, we designed an authentication system for user credentials by combining speckle visual cryptography and the QR code. By using the speckle visual cryptography method, the image of the QR code carrying user authentication information is hidden in the speckle image, and the speckle image is printed on the paper credentials. Through a simulation and analog experiments, we verify the possibility of applying speckle visual cryptography to a user credentials authentication system, compare the improved grayscale reordering algorithm and grayscale reordering algorithm, and prove that the improved grayscale reordering algorithm has more advantages in this system by comparing the PSNR and SSIM. Finally, the y-interference ability and the uniqueness of the virtual secret key in the system are analyzed to prove that the secret key has high anti-interference ability and security.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
用于凭证认证的斑点视觉加密技术
根据自然斑点图像的高随机分布特性,我们设计了一种新的斑点视觉密码学方法,将自然斑点图像与视觉密码学中的秘钥结合起来。具体来说,我们设计了一种结合斑点视觉密码学和二维码的用户凭证认证系统。利用斑点视觉密码学方法,将携带用户认证信息的二维码图像隐藏在斑点图像中,并将斑点图像打印在纸质凭证上。通过仿真和模拟实验,我们验证了将斑点视觉密码学应用于用户凭证认证系统的可能性,比较了改进的灰度重排序算法和灰度重排序算法,并通过比较 PSNR 和 SSIM 证明改进的灰度重排序算法在该系统中更具优势。最后,分析了系统中虚拟秘钥的抗干扰能力和唯一性,证明秘钥具有较高的抗干扰能力和安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Optical router based on a phase-coding multiplexed collinear holographic storage system Single-frame interferogram phase retrieval using a phase-shifting generative adversarial network with physics-based fine-tuning Optimization-Based Approach for High- Fidelity Phase Retrieval from Sparse Interferometric Data: Implications for Industry and Biological Research A high-gain Ho:YLF sub-nanosecond system seeded by a gain-switched laser diode Optical Double-Image Cryptosystem Based on Joint Transform Correlator in Linear Canonical Domain
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1