CN108171642A - The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography - Google Patents

The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography Download PDF

Info

Publication number
CN108171642A
CN108171642A CN201611113953.4A CN201611113953A CN108171642A CN 108171642 A CN108171642 A CN 108171642A CN 201611113953 A CN201611113953 A CN 201611113953A CN 108171642 A CN108171642 A CN 108171642A
Authority
CN
China
Prior art keywords
information
hiding
phase
cryptography
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611113953.4A
Other languages
Chinese (zh)
Inventor
史祎诗
杨秀波
王雅丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Chinese Academy of Sciences
Original Assignee
University of Chinese Academy of Sciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Chinese Academy of Sciences filed Critical University of Chinese Academy of Sciences
Priority to CN201611113953.4A priority Critical patent/CN108171642A/en
Publication of CN108171642A publication Critical patent/CN108171642A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a kind of asymmetrical optical Information Hiding Techniques of view-based access control model cryptography.View-based access control model cryptography encryption technology, by phase distribution information come the subgraph of concealed encrypted generation, and the phase type object of the method making hiding information using binary optical, finally the further hidden information of phase object is covered using the method for amplitude image.Visual cryptography subgraph is extracted using optical diffraction method, and is coupled by optical element and realizes that subgraph is superimposed to obtain hum pattern, last human visual system directly extracts hiding information.The present invention is based on visual cryptography encryptions, are distributed hiding information using the phase information of phase object first, reuse twice hidden of the amplitude image obscure realization to phase object, have high concealment and safety.Optics, the information extracting method of asymmetric are simple, quick simultaneously, high practicability.It is applicable to concealment, safety, the high Information hiding field of simple operation requirement.

Description

The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography
Technical field
The present invention relates to a kind of Information Hiding Techniques of Optical Implementation, and in particular to one on the basis of visual cryptography, Using phase object hiding information and amplitude image obscure phase information, and pass through the asymmetric of optical diffraction simplicity extraction information Information Hiding Techniques.
Background technology
Human visual system is to the recognition capability of correlation and the ability of random grid encrypted image figure to use image Encryption information has established solid foundation.Hereafter, Moni.Naor and Adi.Shamir proposed vision in 1994 and does not have password It learns, and the feasibility and safety of this method is demonstrated from mathematical angle, referring to (Eurocrypt 199 (1):1-12,1994). The image for carrying information is encoded to the Pseudo-random images of multiple mosaics in the method for pixel-expansion by visual cryptography, decryption When only need by sufficient amount of image be aligned be superimposed, it is possible to pass through human eye decrypted image information.Visual cryptography scheme adds Close to have a safety feature, decryption oprerations are simple, received significant attention since proposition.However, since key is amplitude type image, Inner-defect fails well to be solved always.
Why human eye and optical imaging system can observe image and detection information, be because light distribution can be by System is perceived, and the image that light intensity distributions are formed is amplitude image, therefore amplitude image seems directly visible.Phase is believed Breath is sightless to luminous intensity, and the information of phase object cannot be directly detected by bore hole and intensity detection device, has very high Concealment, this characteristic provides great convenience for the hiding of information.The development of Phase Retrieve Algorithm greatly pushes The application of phase object.G-S algorithms first open the beginning for the calculating of object phase information, can go out amplitude by successive ignition calculating The phase distribution of image, and original amplitude image is restored by diffraction, referring to (Opt.35 (2):237-246,1972).This Outside, the error reduction algorithm and Mixed design output algorithm that J.R.Feinup et al. is proposed are Phase Retrieve Algorithm in different situations Under application provide convenience, phase recovery calculate efficiency be continuously improved, be also applied and popularized to more fields, referring to (Appl.Opt.21(15):2758-2769,1982).
Mainly in a manner that frame is embedded in host image, Information Embedding to host is schemed for conventional information concealing technology It is achieved the goal as in the information mask hiding information of host image.Such Information hiding mainly by number method come It realizes, when extracting information, corresponding to hiding process, contrary operation can be completed, and all in all, it is pair to be hidden in extraction process Claim, this increases the complexity of application to a certain extent.Primary product of the image information as optical effect, it is optical simultaneously The advantages such as row is handled, effect is intuitive are not fully played in conventional information is hidden.Importantly, phase information Application is very few in practice for the advantage of highly concealed type.
Invention content
The purpose of the present invention is fully combine high safety, easy-operating visual cryptography and the high phase object of concealment The relevant technologies obtain the optical information that a kind of concealment is good, information extraction is simple and fast using optical correlation characteristic and hide Method.Method proposed by the present invention mainly using the phase information entrained by phase object with the sightless characteristic of intensity come real Existing Information hiding, and phase object is covered to further improve the concealment of information using amplitude image.In addition, institute's extracting method In hide preceding by cryptographic operation, fully ensure that safety.
Information concealing method proposed by the present invention is realized using visual cryptography with the mode that diffraction optics is combined.It needs Hiding information first passes around the encryption of visual cryptography, improves information security;Then it is calculated using Phase Retrieve Algorithm close The phase information of text, and be processed as phase object and reach to be substantially concealed purpose;Amplitude image is finally covered into carrying letter On the phase object of breath, the concealment of information is further improved, achievees the purpose that highly safe hiding information.It is big bright by this The Information hiding scheme of proposition, preliminary hiding generated phase object are indiscriminate for one piece of appearance and common quartz glass Bright glass plate, human eye and intensity detection cannot all discover the presence of information.After amplitude image covers again, due to luminous intensity Outstanding behaviours of the information on phase object further improves the concealment of information.And in information extraction, as long as using flat Face light wave direct irradiation covers the phase object of amplitude image, the image then generated using optical element coupling diffraction, just Hiding information can be directly extracted by human eye.
The present invention is built upon at the beginning of visual cryptography technology, is come with reference to Phase Retrieve Algorithm and binary optical elements technology It completes, can specifically be realized by following technical measures:
(1) information (X) to be concealed according to visual cryptography method is encrypted, is encoded by pixel-expansion mode N number of Subgraph (A1, A2 ..., An) is encrypted, can solution confidential information (X) be obtained by human eye after wherein K subgraph superposition
(2) by Phase Retrieve Algorithm, the corresponding phase distribution of each subgraph (A1, A2 ..., An) is calculated, is obtained pair The pure phase bit distribution image (B1, B2 ..., Bn) answered
(3) it is phase information in all phase distribution figures (B1, B2 ..., Bn) is uniformly stepped, and by its phase value Corresponding depth value on binary diffractive optical element is converted to, obtains step phase distribution figure (C1, C2 ..., Cn)
(4) using binary diffractive optical element processing method, according to stepped phase distribution figure (C1, C2 ..., Cn) Depth information, design, make by mask plate, then processing stepped binary using photoetching technique according to mask plate spreads out Penetrate optical element (D1, D2 ..., Dn)
(5) amplitude image (E1, E2 ..., En) is printed on slide, and printing slide is pasted respectively Mode is covered on binary diffractive optical element (D1, D2 ..., Dn), obtain object that phase and amplitude combine (F1, F2 ..., Fn), obtain the object that object is exactly hiding information proposed by the invention.
(6) light path of extraction information is designed and built according to the physical quantities of hiding information, and plane light wave is after expanding Be respectively radiated on the object (F1, F2 ..., Fn) of hiding information, behind using fourier lense by the light after diffraction into As near field, will be obtained on fourier lense back focal plane corresponding to amplitude subgraph (A1, A2 ..., An) diffraction image (G1, G2 ..., Gn)
(7) diffracted beam is coupled using optical element, realize diffraction is restored subgraph (G1, G2 ..., Gn Overlay) after adjusting coupling element alignment, obtains carrying the image of information (X), finally by the i.e. extractable letter of human eye It ceases (X).
In actual mechanical process, the fourier lense mentioned in step (6) can select not using, the light after diffraction Line images directly to far field, and the extraction of information can equally be realized later by coupling light beam by optical element.
It is of the invention compared with existing Information Hiding Techniques, have the advantage that:
(1) present invention hides raw information, the intensity invisibility of phase information using phase object and phase information High concealment is provided, the concealment of Information hiding and safety greatly improve.
(2) present invention is hidden twice using the method realization that amplitude image and phase object are combined, and phase object is hidden Amplitude information is reused after information and hides phase information, further improves the safety of Information hiding, while amplitude image Form so that this method is more convenient in the application.
(3) mode of hiding information of the present invention is in hiding information, first information is encrypted operation rather than directly into Row is hidden, and further improves hiding safety, reduces the possibility of information-leakage, application is safer
(4) present invention is a kind of information concealing method of asymmetric, and the hiding process of information is complicated, ensure that hiding Tight security;And information extraction process is very simple, quick, is more convenient in practical application.
(5) present invention makes full use of the correlated process and phenomenon of optical treatment, and the process for extracting information is intuitive.It is a variety of simultaneously The combination of optical technology further enhances security performance.
The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography disclosed in this invention, are applicable to safety It can require high, the simple and quick Information hiding field of information extracting method.
Description of the drawings
Fig. 1 is to be used in the asymmetrical optical Information Hiding Techniques of view-based access control model cryptography proposed by the present invention to concealing The phase object of information optically extracts the light channel structure figure of hiding information.
Wherein 1,2:Wavelength 632nm red lasers;3rd, 4 beam attenuator;5、6:Collimating and beam expanding system;7、8:Hide letter The object of breath;9、10:Fourier lense;11:Speculum;12 Amici prisms;13:Smooth white screen.
Fig. 2 a are to encrypt the image of information to be concealed " OK " by pixel-expansion according to " (2,2) visual cryptography scheme " to compile The first width subgraph that code obtains.((2,2) i.e. there are two subgraph generation, two can decrypt when being superimposed)
Fig. 2 b are to encrypt the image of information to be concealed " OK " by pixel-expansion according to " (2,2) visual cryptography scheme " to compile The second width subgraph that code obtains.((2,2) i.e. there are two subgraph generation, two can decrypt when being superimposed)
Fig. 3 is printed on slide simultaneously by two encryption subgraphs (such as Fig. 2 a, 2b) that visual cryptography scheme is encrypted Decrypted image obtained by accurate superposition, the image can extract encryption information " OK " by eye recognition.
Fig. 4 a are the corresponding phase distribution maps that the first width subgraph (Fig. 2 a) is calculated by Phase Restoration algorithm.
Fig. 4 b are the corresponding phase distribution maps that the second width subgraph (Fig. 2 b) is calculated by Phase Restoration algorithm.
Fig. 5 a correspond to the first width subgraph (Fig. 2 a) and its corresponding phase distribution map (Fig. 4 a), according to binary optical member The gray scale of part design method obtains phase information binary diffractive optical element surface pattern after stepped, wherein image is deep The shallow etching step depth for representing processing.(artwork is colour, and different colours represent the etching depth of processing)
Fig. 5 b correspond to the first width subgraph (Fig. 2 b) and its corresponding phase distribution map (Fig. 4 b), according to binary optical member The gray scale of part design method obtains phase information binary diffractive optical element surface pattern after stepped, wherein image is deep The shallow etching step depth for representing processing.(artwork is colour, and different colours represent the etching depth of processing)
Fig. 6 a are according to the first width binary diffractive optical element surface pattern (Fig. 5 a) designed, and are designed by mask plate First binary diffractive optical element pictorial diagram that manufacture, lithography process quartz glass obtain, image is that phase object is placed on Image in horizontal, clean white plane, it is similar to common quartz glass in appearance.
Fig. 6 b are according to the second width binary diffractive optical element surface pattern (Fig. 5 b) designed, and are designed by mask plate Second binary diffractive optical element pictorial diagram that manufacture, lithography process quartz glass obtain, image is that phase object is placed on Image in horizontal, clean white plane, it is similar to common quartz glass in appearance.
Fig. 7 a be by a main body be panda, be accompanied with the leaf of bamboo amplitude image be printed upon on transparency printing paper after, completely The subject image obtained after being fitted on binary diffractive optical element, after which is method hiding information proposed by the present invention Obtained information carrier.
Fig. 7 b are after the Lena figures of a standard are printed upon on transparency printing paper, to be fitted in completely in Binary Diffractive Optics The subject image obtained after on element, the object are the information carriers obtained after method hiding information proposed by the present invention.
Fig. 8 a are that first object for carrying hiding information (such as Fig. 7 a) passes through information extraction light path system as shown in Figure 1 It after system carries out information extraction, is received in white screen and carries out the image after gray processing, original image is colour, wherein bright part There is laser irradiation for red, dark part no light is black.
Fig. 8 b are that second object for carrying hiding information (such as Fig. 7 b) passes through information extraction light path system as shown in Figure 1 It after system carries out information extraction, is received in white screen and carries out the image after gray processing, original image is colour, wherein bright part There is laser irradiation for red, dark part no light is black.
Fig. 9 is the object (such as Fig. 7 a, 7b) for carrying hiding information by two according to information extraction light path system shown in FIG. 1 System carries out coupling using Amici prism and realizes that two images proposed are superimposed obtained figure in white screen by information extraction Picture, original image are colour, wherein there is laser irradiation in bright part for red, dark part no light is black.
Specific embodiment
The specific implementation process of the information concealing method proposed in order to better understand the present invention, below with reference to explanation Book attached drawing, to being based on " (2,2)-visual cryptography scheme " encryption, by Information hiding to the group performance mistake in two phase objects Journey elaborates.Since information concealing method proposed by the present invention is used only, visual cryptography completes information encryption and dispersion is made With, phase object Stealth Modus is only individually operated to encryption subgraph, between each other without influence, thus hiding information can be by The characteristic that " (2,2)-visual cryptography scheme " is generalized to " (k, n)-visual cryptography scheme " is generalized to Information hiding to N number of phase In object, the i.e. extractable information of K the method according to the invention therein, i.e., information concealing method proposed by the present invention has one As replicability.For convenience of explanation, we are only to being based on " (2,2)-visual cryptography scheme ", by Information hiding to two phases Operation in object is specifically described.
During hiding information, it is first determined information to be concealed is alphabetical " OK ", and alphabetical " OK " to be concealed is write Get off and give birth to the bianry image of a black and white;Then according to the encrypted method of visual cryptography, pass through the coding staff of pixel-expansion Formula generates the subgraph of two carrying information, as shown in Fig. 2 a, 2b;It (is obtained later according to two sub- image superpositions of rule encoding The image arrived is as shown in figure 3, can extraction information " OK " directly be decrypted with human visual system, which is suggested plans by the present invention Decrypted result reference.) secondly according to the portable program of Phase Restoration algorithm, the phase mehtod of two subgraphs, meter are calculated respectively Calculation obtains phase information distributed image as shown in Fig. 4 a, 4b, corresponds respectively to subgraph 2a, 2b;Next, according to binary diffraction light The needs of the processing of element are learned, stepped processing is carried out to phase distribution frame (such as Fig. 4 a, 4b), its step is turned to 4 A uniform stepped phase distribution figure, the figure be ideal hiding information phase type object in phase distribution, obtain Body surface pattern is as shown in Fig. 5 a, 5b;Finally according to the processing method of binary optical elements, designed and produced by mask plate, Lithography process can process to obtain binary diffractive optical element, and as shown in Fig. 6 a, 6b, the two elements are by phase point Cloth conceals the phase object in kind of information, and appearance is identical with common quartz glass.Finally, it is panda by a main body, it is attached The Lena figures of amplitude image and standard with the leaf of bamboo are printed upon on transparency printing paper, and be fitted in completely in Binary Diffractive Optics On element, obtain finally using phase object hiding information, and hidden using the information generated after amplitude image concealing phase object Object is hidden, as shown in Fig. 7 a, 7b.It can be seen that in right figure, can't see any raw information on the object completely, there is height Concealment.
Fig. 1 is to be used in the asymmetrical optical Information Hiding Techniques of view-based access control model cryptography proposed by the present invention to concealing The phase object of information optically extracts the light channel structure figure of hiding information.Wherein 1,2:Wavelength 632nm red lasers Device;3rd, 4 beam attenuator;5、6:Collimating and beam expanding system;7、8:The object of hiding information;9、10:Fourier lense;11:Reflection Mirror;12 Amici prisms;13:Smooth white screen.In information extraction process, we are firstly the need of building information extraction light path, and carry out Preliminary tune-up.
In information extraction process, (the amplitude image as shown in Fig. 7 a, 7b covers the object that prime minister conceals information by two Phase object) corresponding be installed on the position that " 7 " " 8 " indicate in decryption light path system as shown in Figure 1.It closes laser 2, beat The image that the object of first hiding information extracts after optical diffraction, gray scale can be obtained in white screen by opening laser 1 After change as shown in Figure 8 a, original image is red, is the recovery extraction image of first subgraph (such as Fig. 2 a).Closing laser 1, The image that the object of second hiding information extracts after optical diffraction can be obtained in white screen by opening laser 2, ash After degreeization as shown in Figure 8 b, original image is red, is the recovery extraction image of second subgraph (such as Fig. 2 a).
Two lasers are opened simultaneously, adjustment Amici prism makes the object of two hiding informations by optical diffraction extraction Image couples in white screen realizes image superposition, and the extraction that raw information can be obtained in white screen occurs, finally by human eye Vision system is the information " OK " that can extract the image, will be received as shown in Figure 9 after the direct gray processing of image.
Implementation and implementation process described above are view-based access control model cryptography encryption technologies, use the phase of phase object Bit distribution hiding information, amplitude image obscure phase object hide the mesh for carrying out phase object to realize highly safe ground hiding information 's.The specific implementation of the present invention is not limited to appeal scheme.As long as using phase information or use the phase soil body for carrying information Come realize Information hiding and using amplitude image come hide phase object or phase information realize Information hiding scheme, Device and system all belong to the scope of protection of the present invention.

Claims (7)

1. a kind of asymmetrical optical Information Hiding Techniques of view-based access control model cryptography, detailed process include the following steps:
The first step:By frame to be concealed, according to visual cryptography encryption method, volume is encrypted by pixel-expansion mode Code is several subgraphs for carrying information;
Second step:The corresponding phase distribution information of each subgraph is calculated according to Phase Retrieve Algorithm, phase distribution figure is stepped, and It will be in Information hiding to phase information by the processing method of binary optical elements.
Third walks:Amplitude image is printed upon on slide, is then fitted to respectively on the phase object of hiding information, with amplitude Image obscure phase object finally can obtain concealing the object of information;
4th step:Information extraction light path is built, subgraph is extracted, and couple and realize by optical element using optical diffraction method The superposition of subgraph is extracted, information is directly extracted finally by eye-observation.
2. such as the asymmetrical optical Information Hiding Techniques of the view-based access control model cryptography used in claim 1, which is characterized in that Using the sightless phase information of luminous intensity and phase object hiding information, the concealment of Information hiding and safety are very high.
3. such as the asymmetrical optical Information Hiding Techniques of the view-based access control model cryptography used in claim 1, which is characterized in that The phase object of information is concealed using amplitude image obscure, realizes the twice hidden to information, further improves hiding letter The safety of breath and concealment.
4. such as the asymmetrical optical Information Hiding Techniques of the view-based access control model cryptography used in claim 1, which is characterized in that Before phase object hiding information is used, information is encrypted and information dispersion using visual cryptography encryption, improved again The safety of Information hiding reduces the possibility of information exposure.
5. such as the asymmetrical optical Information Hiding Techniques of the view-based access control model cryptography used in claim 1, which is characterized in that Using asymmetric information concealing method, phase information hiding information directly extracts information by optical diffraction and light beam coupling, The advantage of Optical Parallel processing information is given full play to, the method for information extraction is easy to operate, extraction rate is fast.
It is 6. special such as the asymmetrical optical Information Hiding Techniques of the view-based access control model cryptography used in claim 1,2,3,4 Sign is, covers the method that phase object multiple technologies are combined using visual cryptography, phase hiding information, amplitude, has both The advantage of a variety of methods, it is comprehensive to improve Information hiding safety and concealment.
7. such as the asymmetrical optical Information Hiding Techniques of the view-based access control model cryptography used in claim 1,6, feature exists In technology of the invention is other than realizing Information hiding purposes, it may also be used for the legitimacy certification to phase information holder.
CN201611113953.4A 2016-12-07 2016-12-07 The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography Pending CN108171642A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611113953.4A CN108171642A (en) 2016-12-07 2016-12-07 The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611113953.4A CN108171642A (en) 2016-12-07 2016-12-07 The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography

Publications (1)

Publication Number Publication Date
CN108171642A true CN108171642A (en) 2018-06-15

Family

ID=62526449

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611113953.4A Pending CN108171642A (en) 2016-12-07 2016-12-07 The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography

Country Status (1)

Country Link
CN (1) CN108171642A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110728164A (en) * 2019-10-22 2020-01-24 中国科学院大学 Real-time information hiding system and method based on two-dimensional code and reflective stacked imaging
CN110942413A (en) * 2019-12-03 2020-03-31 中国科学院大学 Method and system for hiding and extracting large-capacity optical information
CN111897196A (en) * 2020-08-13 2020-11-06 中国科学院大学 Method and system for hiding and extracting digital holographic information
CN115085824A (en) * 2022-05-23 2022-09-20 佛山科学技术学院 Information hiding method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1438516A (en) * 2003-02-28 2003-08-27 中国科学院上海光学精密机械研究所 Phase scrambler and its manufacturing method
CN102289609A (en) * 2011-05-16 2011-12-21 中南大学 Digital encrypting and decrypting method based on optical holographic principle
CN102831567A (en) * 2012-07-02 2012-12-19 湖北联合天诚防伪技术股份有限公司 Multilayer Moire encryption method for anti-counterfeiting images
US8505108B2 (en) * 1993-11-18 2013-08-06 Digimarc Corporation Authentication using a digital watermark
CN105391550A (en) * 2015-10-12 2016-03-09 中国科学院大学 Color indirect visual cryptography scheme

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8505108B2 (en) * 1993-11-18 2013-08-06 Digimarc Corporation Authentication using a digital watermark
CN1438516A (en) * 2003-02-28 2003-08-27 中国科学院上海光学精密机械研究所 Phase scrambler and its manufacturing method
CN102289609A (en) * 2011-05-16 2011-12-21 中南大学 Digital encrypting and decrypting method based on optical holographic principle
CN102831567A (en) * 2012-07-02 2012-12-19 湖北联合天诚防伪技术股份有限公司 Multilayer Moire encryption method for anti-counterfeiting images
CN105391550A (en) * 2015-10-12 2016-03-09 中国科学院大学 Color indirect visual cryptography scheme

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110728164A (en) * 2019-10-22 2020-01-24 中国科学院大学 Real-time information hiding system and method based on two-dimensional code and reflective stacked imaging
CN110728164B (en) * 2019-10-22 2022-06-07 中国科学院大学 Real-time information hiding system and method based on two-dimensional code and reflective stacked imaging
CN110942413A (en) * 2019-12-03 2020-03-31 中国科学院大学 Method and system for hiding and extracting large-capacity optical information
CN110942413B (en) * 2019-12-03 2022-04-29 中国科学院大学 Method and system for hiding and extracting large-capacity optical information
CN111897196A (en) * 2020-08-13 2020-11-06 中国科学院大学 Method and system for hiding and extracting digital holographic information
CN115085824A (en) * 2022-05-23 2022-09-20 佛山科学技术学院 Information hiding method and device
CN115085824B (en) * 2022-05-23 2024-03-15 佛山科学技术学院 Information hiding method and device

Similar Documents

Publication Publication Date Title
Gaddam et al. Efficient Cancelable Biometric Key Generation Scheme for Cryptography.
CN108171642A (en) The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography
Chen et al. Comment on “cheating prevention in visual cryptography”
US20020101988A1 (en) Decryption glasses
CN104125210A (en) Head-mounted display apparatus with enhanced security and method for accessing encrypted information by same
Shi et al. Optical hiding with visual cryptography
Pérez-Cabré et al. Photon-counting multifactor optical encryption and authentication
US20240223711A1 (en) Self-Verifying Hidden Digital Media Within Other Digital Media
Cao et al. Secure QR code scheme based on visual cryptography
CN109934187A (en) Based on face Activity determination-eye sight line random challenge response method
Kang et al. Ghost imaging-based optical multilevel authentication scheme using visual cryptography
Spagnolo et al. Holographic watermarking for authentication of cut images
Lu et al. Optical information encryption based on partially-update iterative system with azimuth multiplexing
CN103780795A (en) Image encryption transmission method based on thermal light ghost imaging principle
Swain et al. A quick review of network security and steganography
CN110139001A (en) A kind of encryption and decryption method, apparatus and system of optical finger print certification
Shukla Non-separable histogram based reversible data hiding approach using inverse S-order and skew tent map
CN111897196B (en) Method and system for hiding and extracting digital holographic information
Yadav et al. Image encryption algorithm based on rear-mounted phase mask and random decomposition
KR100407464B1 (en) Multi-step encryption/decryption apparatus and method by pixel unit
CN108257190A (en) The optical information security technology that a kind of visual cryptography is combined with photochromic material
Rathod et al. Secure bank transaction using data hiding mechanisms
CN105391550A (en) Color indirect visual cryptography scheme
Srivastava et al. Security of Image Using Watermarking Techniques and Visual Cryptography
Kalamkar et al. A review on implementation visual cryptography and steganography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180615

WD01 Invention patent application deemed withdrawn after publication