使用纯二进制幅度全息图的视觉密码术[特邀]

Lina Zhou, Yin Xiao, Zilan Pan, Yonggui Cao, Wen Chen
{"title":"使用纯二进制幅度全息图的视觉密码术[特邀]","authors":"Lina Zhou, Yin Xiao, Zilan Pan, Yonggui Cao, Wen Chen","doi":"10.3389/fphot.2021.821304","DOIUrl":null,"url":null,"abstract":"Visual cryptography (VC) is developed to be a promising approach to encoding secret information using pixel expansion rules. The useful information can be directly rendered based on human vision without the usage of decryption algorithms. However, many VC schemes cannot withstand occlusion attacks. In this paper, a new VC scheme is proposed using binary amplitude-only holograms (AOHs) generated by a modified Gerchberg-Saxton algorithm (MGSA). During the encryption, a secret image is divided into a group of unrecognizable and mutually-unrelated shares, and then the generated shares are further converted to binary AOHs using the MGSA. During image extraction, binary AOHs are logically superimposed to form a stacked hologram, and then the secret image can be extracted from the stacked hologram. Different from conventional VC schemes, the proposed VC scheme converts a secret image into binary AOHs. Due to the redundancy of the generated binary AOHs, the proposed method is numerically and experimentally verified to be feasible and effective, and possesses high robustness against occlusion attacks.","PeriodicalId":73099,"journal":{"name":"Frontiers in photonics","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Visual Cryptography Using Binary Amplitude-Only Holograms [Invited]\",\"authors\":\"Lina Zhou, Yin Xiao, Zilan Pan, Yonggui Cao, Wen Chen\",\"doi\":\"10.3389/fphot.2021.821304\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Visual cryptography (VC) is developed to be a promising approach to encoding secret information using pixel expansion rules. The useful information can be directly rendered based on human vision without the usage of decryption algorithms. However, many VC schemes cannot withstand occlusion attacks. In this paper, a new VC scheme is proposed using binary amplitude-only holograms (AOHs) generated by a modified Gerchberg-Saxton algorithm (MGSA). During the encryption, a secret image is divided into a group of unrecognizable and mutually-unrelated shares, and then the generated shares are further converted to binary AOHs using the MGSA. During image extraction, binary AOHs are logically superimposed to form a stacked hologram, and then the secret image can be extracted from the stacked hologram. Different from conventional VC schemes, the proposed VC scheme converts a secret image into binary AOHs. Due to the redundancy of the generated binary AOHs, the proposed method is numerically and experimentally verified to be feasible and effective, and possesses high robustness against occlusion attacks.\",\"PeriodicalId\":73099,\"journal\":{\"name\":\"Frontiers in photonics\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Frontiers in photonics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3389/fphot.2021.821304\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Frontiers in photonics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3389/fphot.2021.821304","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

视觉密码学(VC)是一种很有前途的利用像素展开规则对秘密信息进行编码的方法。在不使用解密算法的情况下,可以基于人类视觉直接呈现有用的信息。然而,许多VC方案无法抵御遮挡攻击。本文利用改进的Gerchberg-Saxton算法(MGSA)生成的二进制纯振幅全息图(AOH),提出了一种新的VC方案。在加密过程中,将秘密图像划分为一组不可识别且相互不相关的共享,然后使用MGSA将生成的共享进一步转换为二进制AOH。在图像提取过程中,二进制AOH被逻辑叠加以形成堆叠全息图,然后可以从堆叠全息图中提取秘密图像。与传统的VC方案不同,所提出的VC方案将秘密图像转换为二进制AOH。由于生成的二进制AOH具有冗余性,该方法经过数值和实验验证是可行和有效的,并且对遮挡攻击具有很高的鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Visual Cryptography Using Binary Amplitude-Only Holograms [Invited]
Visual cryptography (VC) is developed to be a promising approach to encoding secret information using pixel expansion rules. The useful information can be directly rendered based on human vision without the usage of decryption algorithms. However, many VC schemes cannot withstand occlusion attacks. In this paper, a new VC scheme is proposed using binary amplitude-only holograms (AOHs) generated by a modified Gerchberg-Saxton algorithm (MGSA). During the encryption, a secret image is divided into a group of unrecognizable and mutually-unrelated shares, and then the generated shares are further converted to binary AOHs using the MGSA. During image extraction, binary AOHs are logically superimposed to form a stacked hologram, and then the secret image can be extracted from the stacked hologram. Different from conventional VC schemes, the proposed VC scheme converts a secret image into binary AOHs. Due to the redundancy of the generated binary AOHs, the proposed method is numerically and experimentally verified to be feasible and effective, and possesses high robustness against occlusion attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Association of circadian dysregulation with retinal degeneration and Alzheimer’s disease: a special focus on Muller glial cells Days to re-entrainment following the spring and autumn changes in local clock time: beyond simple heuristics High-resolution imaging for in-situ non-destructive testing by quantitative lensless digital holography Broadband directional filter in multilayer liquid crystal polymer films at W-band Dual-modal photoacoustic and ultrasound imaging: from preclinical to clinical applications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1