CN108171642A - The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography - Google Patents
The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography Download PDFInfo
- Publication number
- CN108171642A CN108171642A CN201611113953.4A CN201611113953A CN108171642A CN 108171642 A CN108171642 A CN 108171642A CN 201611113953 A CN201611113953 A CN 201611113953A CN 108171642 A CN108171642 A CN 108171642A
- Authority
- CN
- China
- Prior art keywords
- information
- hiding
- phase
- cryptography
- access control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Image Processing (AREA)
Abstract
The invention discloses a kind of asymmetrical optical Information Hiding Techniques of view-based access control model cryptography.View-based access control model cryptography encryption technology, by phase distribution information come the subgraph of concealed encrypted generation, and the phase type object of the method making hiding information using binary optical, finally the further hidden information of phase object is covered using the method for amplitude image.Visual cryptography subgraph is extracted using optical diffraction method, and is coupled by optical element and realizes that subgraph is superimposed to obtain hum pattern, last human visual system directly extracts hiding information.The present invention is based on visual cryptography encryptions, are distributed hiding information using the phase information of phase object first, reuse twice hidden of the amplitude image obscure realization to phase object, have high concealment and safety.Optics, the information extracting method of asymmetric are simple, quick simultaneously, high practicability.It is applicable to concealment, safety, the high Information hiding field of simple operation requirement.
Description
Technical field
The present invention relates to a kind of Information Hiding Techniques of Optical Implementation, and in particular to one on the basis of visual cryptography,
Using phase object hiding information and amplitude image obscure phase information, and pass through the asymmetric of optical diffraction simplicity extraction information
Information Hiding Techniques.
Background technology
Human visual system is to the recognition capability of correlation and the ability of random grid encrypted image figure to use image
Encryption information has established solid foundation.Hereafter, Moni.Naor and Adi.Shamir proposed vision in 1994 and does not have password
It learns, and the feasibility and safety of this method is demonstrated from mathematical angle, referring to (Eurocrypt 199 (1):1-12,1994).
The image for carrying information is encoded to the Pseudo-random images of multiple mosaics in the method for pixel-expansion by visual cryptography, decryption
When only need by sufficient amount of image be aligned be superimposed, it is possible to pass through human eye decrypted image information.Visual cryptography scheme adds
Close to have a safety feature, decryption oprerations are simple, received significant attention since proposition.However, since key is amplitude type image,
Inner-defect fails well to be solved always.
Why human eye and optical imaging system can observe image and detection information, be because light distribution can be by
System is perceived, and the image that light intensity distributions are formed is amplitude image, therefore amplitude image seems directly visible.Phase is believed
Breath is sightless to luminous intensity, and the information of phase object cannot be directly detected by bore hole and intensity detection device, has very high
Concealment, this characteristic provides great convenience for the hiding of information.The development of Phase Retrieve Algorithm greatly pushes
The application of phase object.G-S algorithms first open the beginning for the calculating of object phase information, can go out amplitude by successive ignition calculating
The phase distribution of image, and original amplitude image is restored by diffraction, referring to (Opt.35 (2):237-246,1972).This
Outside, the error reduction algorithm and Mixed design output algorithm that J.R.Feinup et al. is proposed are Phase Retrieve Algorithm in different situations
Under application provide convenience, phase recovery calculate efficiency be continuously improved, be also applied and popularized to more fields, referring to
(Appl.Opt.21(15):2758-2769,1982).
Mainly in a manner that frame is embedded in host image, Information Embedding to host is schemed for conventional information concealing technology
It is achieved the goal as in the information mask hiding information of host image.Such Information hiding mainly by number method come
It realizes, when extracting information, corresponding to hiding process, contrary operation can be completed, and all in all, it is pair to be hidden in extraction process
Claim, this increases the complexity of application to a certain extent.Primary product of the image information as optical effect, it is optical simultaneously
The advantages such as row is handled, effect is intuitive are not fully played in conventional information is hidden.Importantly, phase information
Application is very few in practice for the advantage of highly concealed type.
Invention content
The purpose of the present invention is fully combine high safety, easy-operating visual cryptography and the high phase object of concealment
The relevant technologies obtain the optical information that a kind of concealment is good, information extraction is simple and fast using optical correlation characteristic and hide
Method.Method proposed by the present invention mainly using the phase information entrained by phase object with the sightless characteristic of intensity come real
Existing Information hiding, and phase object is covered to further improve the concealment of information using amplitude image.In addition, institute's extracting method
In hide preceding by cryptographic operation, fully ensure that safety.
Information concealing method proposed by the present invention is realized using visual cryptography with the mode that diffraction optics is combined.It needs
Hiding information first passes around the encryption of visual cryptography, improves information security;Then it is calculated using Phase Retrieve Algorithm close
The phase information of text, and be processed as phase object and reach to be substantially concealed purpose;Amplitude image is finally covered into carrying letter
On the phase object of breath, the concealment of information is further improved, achievees the purpose that highly safe hiding information.It is big bright by this
The Information hiding scheme of proposition, preliminary hiding generated phase object are indiscriminate for one piece of appearance and common quartz glass
Bright glass plate, human eye and intensity detection cannot all discover the presence of information.After amplitude image covers again, due to luminous intensity
Outstanding behaviours of the information on phase object further improves the concealment of information.And in information extraction, as long as using flat
Face light wave direct irradiation covers the phase object of amplitude image, the image then generated using optical element coupling diffraction, just
Hiding information can be directly extracted by human eye.
The present invention is built upon at the beginning of visual cryptography technology, is come with reference to Phase Retrieve Algorithm and binary optical elements technology
It completes, can specifically be realized by following technical measures:
(1) information (X) to be concealed according to visual cryptography method is encrypted, is encoded by pixel-expansion mode N number of
Subgraph (A1, A2 ..., An) is encrypted, can solution confidential information (X) be obtained by human eye after wherein K subgraph superposition
(2) by Phase Retrieve Algorithm, the corresponding phase distribution of each subgraph (A1, A2 ..., An) is calculated, is obtained pair
The pure phase bit distribution image (B1, B2 ..., Bn) answered
(3) it is phase information in all phase distribution figures (B1, B2 ..., Bn) is uniformly stepped, and by its phase value
Corresponding depth value on binary diffractive optical element is converted to, obtains step phase distribution figure (C1, C2 ..., Cn)
(4) using binary diffractive optical element processing method, according to stepped phase distribution figure (C1, C2 ..., Cn)
Depth information, design, make by mask plate, then processing stepped binary using photoetching technique according to mask plate spreads out
Penetrate optical element (D1, D2 ..., Dn)
(5) amplitude image (E1, E2 ..., En) is printed on slide, and printing slide is pasted respectively
Mode is covered on binary diffractive optical element (D1, D2 ..., Dn), obtain object that phase and amplitude combine (F1,
F2 ..., Fn), obtain the object that object is exactly hiding information proposed by the invention.
(6) light path of extraction information is designed and built according to the physical quantities of hiding information, and plane light wave is after expanding
Be respectively radiated on the object (F1, F2 ..., Fn) of hiding information, behind using fourier lense by the light after diffraction into
As near field, will be obtained on fourier lense back focal plane corresponding to amplitude subgraph (A1, A2 ..., An) diffraction image (G1,
G2 ..., Gn)
(7) diffracted beam is coupled using optical element, realize diffraction is restored subgraph (G1, G2 ...,
Gn Overlay) after adjusting coupling element alignment, obtains carrying the image of information (X), finally by the i.e. extractable letter of human eye
It ceases (X).
In actual mechanical process, the fourier lense mentioned in step (6) can select not using, the light after diffraction
Line images directly to far field, and the extraction of information can equally be realized later by coupling light beam by optical element.
It is of the invention compared with existing Information Hiding Techniques, have the advantage that:
(1) present invention hides raw information, the intensity invisibility of phase information using phase object and phase information
High concealment is provided, the concealment of Information hiding and safety greatly improve.
(2) present invention is hidden twice using the method realization that amplitude image and phase object are combined, and phase object is hidden
Amplitude information is reused after information and hides phase information, further improves the safety of Information hiding, while amplitude image
Form so that this method is more convenient in the application.
(3) mode of hiding information of the present invention is in hiding information, first information is encrypted operation rather than directly into
Row is hidden, and further improves hiding safety, reduces the possibility of information-leakage, application is safer
(4) present invention is a kind of information concealing method of asymmetric, and the hiding process of information is complicated, ensure that hiding
Tight security;And information extraction process is very simple, quick, is more convenient in practical application.
(5) present invention makes full use of the correlated process and phenomenon of optical treatment, and the process for extracting information is intuitive.It is a variety of simultaneously
The combination of optical technology further enhances security performance.
The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography disclosed in this invention, are applicable to safety
It can require high, the simple and quick Information hiding field of information extracting method.
Description of the drawings
Fig. 1 is to be used in the asymmetrical optical Information Hiding Techniques of view-based access control model cryptography proposed by the present invention to concealing
The phase object of information optically extracts the light channel structure figure of hiding information.
Wherein 1,2:Wavelength 632nm red lasers;3rd, 4 beam attenuator;5、6:Collimating and beam expanding system;7、8:Hide letter
The object of breath;9、10:Fourier lense;11:Speculum;12 Amici prisms;13:Smooth white screen.
Fig. 2 a are to encrypt the image of information to be concealed " OK " by pixel-expansion according to " (2,2) visual cryptography scheme " to compile
The first width subgraph that code obtains.((2,2) i.e. there are two subgraph generation, two can decrypt when being superimposed)
Fig. 2 b are to encrypt the image of information to be concealed " OK " by pixel-expansion according to " (2,2) visual cryptography scheme " to compile
The second width subgraph that code obtains.((2,2) i.e. there are two subgraph generation, two can decrypt when being superimposed)
Fig. 3 is printed on slide simultaneously by two encryption subgraphs (such as Fig. 2 a, 2b) that visual cryptography scheme is encrypted
Decrypted image obtained by accurate superposition, the image can extract encryption information " OK " by eye recognition.
Fig. 4 a are the corresponding phase distribution maps that the first width subgraph (Fig. 2 a) is calculated by Phase Restoration algorithm.
Fig. 4 b are the corresponding phase distribution maps that the second width subgraph (Fig. 2 b) is calculated by Phase Restoration algorithm.
Fig. 5 a correspond to the first width subgraph (Fig. 2 a) and its corresponding phase distribution map (Fig. 4 a), according to binary optical member
The gray scale of part design method obtains phase information binary diffractive optical element surface pattern after stepped, wherein image is deep
The shallow etching step depth for representing processing.(artwork is colour, and different colours represent the etching depth of processing)
Fig. 5 b correspond to the first width subgraph (Fig. 2 b) and its corresponding phase distribution map (Fig. 4 b), according to binary optical member
The gray scale of part design method obtains phase information binary diffractive optical element surface pattern after stepped, wherein image is deep
The shallow etching step depth for representing processing.(artwork is colour, and different colours represent the etching depth of processing)
Fig. 6 a are according to the first width binary diffractive optical element surface pattern (Fig. 5 a) designed, and are designed by mask plate
First binary diffractive optical element pictorial diagram that manufacture, lithography process quartz glass obtain, image is that phase object is placed on
Image in horizontal, clean white plane, it is similar to common quartz glass in appearance.
Fig. 6 b are according to the second width binary diffractive optical element surface pattern (Fig. 5 b) designed, and are designed by mask plate
Second binary diffractive optical element pictorial diagram that manufacture, lithography process quartz glass obtain, image is that phase object is placed on
Image in horizontal, clean white plane, it is similar to common quartz glass in appearance.
Fig. 7 a be by a main body be panda, be accompanied with the leaf of bamboo amplitude image be printed upon on transparency printing paper after, completely
The subject image obtained after being fitted on binary diffractive optical element, after which is method hiding information proposed by the present invention
Obtained information carrier.
Fig. 7 b are after the Lena figures of a standard are printed upon on transparency printing paper, to be fitted in completely in Binary Diffractive Optics
The subject image obtained after on element, the object are the information carriers obtained after method hiding information proposed by the present invention.
Fig. 8 a are that first object for carrying hiding information (such as Fig. 7 a) passes through information extraction light path system as shown in Figure 1
It after system carries out information extraction, is received in white screen and carries out the image after gray processing, original image is colour, wherein bright part
There is laser irradiation for red, dark part no light is black.
Fig. 8 b are that second object for carrying hiding information (such as Fig. 7 b) passes through information extraction light path system as shown in Figure 1
It after system carries out information extraction, is received in white screen and carries out the image after gray processing, original image is colour, wherein bright part
There is laser irradiation for red, dark part no light is black.
Fig. 9 is the object (such as Fig. 7 a, 7b) for carrying hiding information by two according to information extraction light path system shown in FIG. 1
System carries out coupling using Amici prism and realizes that two images proposed are superimposed obtained figure in white screen by information extraction
Picture, original image are colour, wherein there is laser irradiation in bright part for red, dark part no light is black.
Specific embodiment
The specific implementation process of the information concealing method proposed in order to better understand the present invention, below with reference to explanation
Book attached drawing, to being based on " (2,2)-visual cryptography scheme " encryption, by Information hiding to the group performance mistake in two phase objects
Journey elaborates.Since information concealing method proposed by the present invention is used only, visual cryptography completes information encryption and dispersion is made
With, phase object Stealth Modus is only individually operated to encryption subgraph, between each other without influence, thus hiding information can be by
The characteristic that " (2,2)-visual cryptography scheme " is generalized to " (k, n)-visual cryptography scheme " is generalized to Information hiding to N number of phase
In object, the i.e. extractable information of K the method according to the invention therein, i.e., information concealing method proposed by the present invention has one
As replicability.For convenience of explanation, we are only to being based on " (2,2)-visual cryptography scheme ", by Information hiding to two phases
Operation in object is specifically described.
During hiding information, it is first determined information to be concealed is alphabetical " OK ", and alphabetical " OK " to be concealed is write
Get off and give birth to the bianry image of a black and white;Then according to the encrypted method of visual cryptography, pass through the coding staff of pixel-expansion
Formula generates the subgraph of two carrying information, as shown in Fig. 2 a, 2b;It (is obtained later according to two sub- image superpositions of rule encoding
The image arrived is as shown in figure 3, can extraction information " OK " directly be decrypted with human visual system, which is suggested plans by the present invention
Decrypted result reference.) secondly according to the portable program of Phase Restoration algorithm, the phase mehtod of two subgraphs, meter are calculated respectively
Calculation obtains phase information distributed image as shown in Fig. 4 a, 4b, corresponds respectively to subgraph 2a, 2b;Next, according to binary diffraction light
The needs of the processing of element are learned, stepped processing is carried out to phase distribution frame (such as Fig. 4 a, 4b), its step is turned to 4
A uniform stepped phase distribution figure, the figure be ideal hiding information phase type object in phase distribution, obtain
Body surface pattern is as shown in Fig. 5 a, 5b;Finally according to the processing method of binary optical elements, designed and produced by mask plate,
Lithography process can process to obtain binary diffractive optical element, and as shown in Fig. 6 a, 6b, the two elements are by phase point
Cloth conceals the phase object in kind of information, and appearance is identical with common quartz glass.Finally, it is panda by a main body, it is attached
The Lena figures of amplitude image and standard with the leaf of bamboo are printed upon on transparency printing paper, and be fitted in completely in Binary Diffractive Optics
On element, obtain finally using phase object hiding information, and hidden using the information generated after amplitude image concealing phase object
Object is hidden, as shown in Fig. 7 a, 7b.It can be seen that in right figure, can't see any raw information on the object completely, there is height
Concealment.
Fig. 1 is to be used in the asymmetrical optical Information Hiding Techniques of view-based access control model cryptography proposed by the present invention to concealing
The phase object of information optically extracts the light channel structure figure of hiding information.Wherein 1,2:Wavelength 632nm red lasers
Device;3rd, 4 beam attenuator;5、6:Collimating and beam expanding system;7、8:The object of hiding information;9、10:Fourier lense;11:Reflection
Mirror;12 Amici prisms;13:Smooth white screen.In information extraction process, we are firstly the need of building information extraction light path, and carry out
Preliminary tune-up.
In information extraction process, (the amplitude image as shown in Fig. 7 a, 7b covers the object that prime minister conceals information by two
Phase object) corresponding be installed on the position that " 7 " " 8 " indicate in decryption light path system as shown in Figure 1.It closes laser 2, beat
The image that the object of first hiding information extracts after optical diffraction, gray scale can be obtained in white screen by opening laser 1
After change as shown in Figure 8 a, original image is red, is the recovery extraction image of first subgraph (such as Fig. 2 a).Closing laser 1,
The image that the object of second hiding information extracts after optical diffraction can be obtained in white screen by opening laser 2, ash
After degreeization as shown in Figure 8 b, original image is red, is the recovery extraction image of second subgraph (such as Fig. 2 a).
Two lasers are opened simultaneously, adjustment Amici prism makes the object of two hiding informations by optical diffraction extraction
Image couples in white screen realizes image superposition, and the extraction that raw information can be obtained in white screen occurs, finally by human eye
Vision system is the information " OK " that can extract the image, will be received as shown in Figure 9 after the direct gray processing of image.
Implementation and implementation process described above are view-based access control model cryptography encryption technologies, use the phase of phase object
Bit distribution hiding information, amplitude image obscure phase object hide the mesh for carrying out phase object to realize highly safe ground hiding information
's.The specific implementation of the present invention is not limited to appeal scheme.As long as using phase information or use the phase soil body for carrying information
Come realize Information hiding and using amplitude image come hide phase object or phase information realize Information hiding scheme,
Device and system all belong to the scope of protection of the present invention.
Claims (7)
1. a kind of asymmetrical optical Information Hiding Techniques of view-based access control model cryptography, detailed process include the following steps:
The first step:By frame to be concealed, according to visual cryptography encryption method, volume is encrypted by pixel-expansion mode
Code is several subgraphs for carrying information;
Second step:The corresponding phase distribution information of each subgraph is calculated according to Phase Retrieve Algorithm, phase distribution figure is stepped, and
It will be in Information hiding to phase information by the processing method of binary optical elements.
Third walks:Amplitude image is printed upon on slide, is then fitted to respectively on the phase object of hiding information, with amplitude
Image obscure phase object finally can obtain concealing the object of information;
4th step:Information extraction light path is built, subgraph is extracted, and couple and realize by optical element using optical diffraction method
The superposition of subgraph is extracted, information is directly extracted finally by eye-observation.
2. such as the asymmetrical optical Information Hiding Techniques of the view-based access control model cryptography used in claim 1, which is characterized in that
Using the sightless phase information of luminous intensity and phase object hiding information, the concealment of Information hiding and safety are very high.
3. such as the asymmetrical optical Information Hiding Techniques of the view-based access control model cryptography used in claim 1, which is characterized in that
The phase object of information is concealed using amplitude image obscure, realizes the twice hidden to information, further improves hiding letter
The safety of breath and concealment.
4. such as the asymmetrical optical Information Hiding Techniques of the view-based access control model cryptography used in claim 1, which is characterized in that
Before phase object hiding information is used, information is encrypted and information dispersion using visual cryptography encryption, improved again
The safety of Information hiding reduces the possibility of information exposure.
5. such as the asymmetrical optical Information Hiding Techniques of the view-based access control model cryptography used in claim 1, which is characterized in that
Using asymmetric information concealing method, phase information hiding information directly extracts information by optical diffraction and light beam coupling,
The advantage of Optical Parallel processing information is given full play to, the method for information extraction is easy to operate, extraction rate is fast.
It is 6. special such as the asymmetrical optical Information Hiding Techniques of the view-based access control model cryptography used in claim 1,2,3,4
Sign is, covers the method that phase object multiple technologies are combined using visual cryptography, phase hiding information, amplitude, has both
The advantage of a variety of methods, it is comprehensive to improve Information hiding safety and concealment.
7. such as the asymmetrical optical Information Hiding Techniques of the view-based access control model cryptography used in claim 1,6, feature exists
In technology of the invention is other than realizing Information hiding purposes, it may also be used for the legitimacy certification to phase information holder.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611113953.4A CN108171642A (en) | 2016-12-07 | 2016-12-07 | The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611113953.4A CN108171642A (en) | 2016-12-07 | 2016-12-07 | The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108171642A true CN108171642A (en) | 2018-06-15 |
Family
ID=62526449
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611113953.4A Pending CN108171642A (en) | 2016-12-07 | 2016-12-07 | The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108171642A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110728164A (en) * | 2019-10-22 | 2020-01-24 | 中国科学院大学 | Real-time information hiding system and method based on two-dimensional code and reflective stacked imaging |
CN110942413A (en) * | 2019-12-03 | 2020-03-31 | 中国科学院大学 | Method and system for hiding and extracting large-capacity optical information |
CN111897196A (en) * | 2020-08-13 | 2020-11-06 | 中国科学院大学 | Method and system for hiding and extracting digital holographic information |
CN115085824A (en) * | 2022-05-23 | 2022-09-20 | 佛山科学技术学院 | Information hiding method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1438516A (en) * | 2003-02-28 | 2003-08-27 | 中国科学院上海光学精密机械研究所 | Phase scrambler and its manufacturing method |
CN102289609A (en) * | 2011-05-16 | 2011-12-21 | 中南大学 | Digital encrypting and decrypting method based on optical holographic principle |
CN102831567A (en) * | 2012-07-02 | 2012-12-19 | 湖北联合天诚防伪技术股份有限公司 | Multilayer Moire encryption method for anti-counterfeiting images |
US8505108B2 (en) * | 1993-11-18 | 2013-08-06 | Digimarc Corporation | Authentication using a digital watermark |
CN105391550A (en) * | 2015-10-12 | 2016-03-09 | 中国科学院大学 | Color indirect visual cryptography scheme |
-
2016
- 2016-12-07 CN CN201611113953.4A patent/CN108171642A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8505108B2 (en) * | 1993-11-18 | 2013-08-06 | Digimarc Corporation | Authentication using a digital watermark |
CN1438516A (en) * | 2003-02-28 | 2003-08-27 | 中国科学院上海光学精密机械研究所 | Phase scrambler and its manufacturing method |
CN102289609A (en) * | 2011-05-16 | 2011-12-21 | 中南大学 | Digital encrypting and decrypting method based on optical holographic principle |
CN102831567A (en) * | 2012-07-02 | 2012-12-19 | 湖北联合天诚防伪技术股份有限公司 | Multilayer Moire encryption method for anti-counterfeiting images |
CN105391550A (en) * | 2015-10-12 | 2016-03-09 | 中国科学院大学 | Color indirect visual cryptography scheme |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110728164A (en) * | 2019-10-22 | 2020-01-24 | 中国科学院大学 | Real-time information hiding system and method based on two-dimensional code and reflective stacked imaging |
CN110728164B (en) * | 2019-10-22 | 2022-06-07 | 中国科学院大学 | Real-time information hiding system and method based on two-dimensional code and reflective stacked imaging |
CN110942413A (en) * | 2019-12-03 | 2020-03-31 | 中国科学院大学 | Method and system for hiding and extracting large-capacity optical information |
CN110942413B (en) * | 2019-12-03 | 2022-04-29 | 中国科学院大学 | Method and system for hiding and extracting large-capacity optical information |
CN111897196A (en) * | 2020-08-13 | 2020-11-06 | 中国科学院大学 | Method and system for hiding and extracting digital holographic information |
CN115085824A (en) * | 2022-05-23 | 2022-09-20 | 佛山科学技术学院 | Information hiding method and device |
CN115085824B (en) * | 2022-05-23 | 2024-03-15 | 佛山科学技术学院 | Information hiding method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gaddam et al. | Efficient Cancelable Biometric Key Generation Scheme for Cryptography. | |
CN108171642A (en) | The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography | |
Chen et al. | Comment on “cheating prevention in visual cryptography” | |
US20020101988A1 (en) | Decryption glasses | |
CN104125210A (en) | Head-mounted display apparatus with enhanced security and method for accessing encrypted information by same | |
Shi et al. | Optical hiding with visual cryptography | |
Pérez-Cabré et al. | Photon-counting multifactor optical encryption and authentication | |
US20240223711A1 (en) | Self-Verifying Hidden Digital Media Within Other Digital Media | |
Cao et al. | Secure QR code scheme based on visual cryptography | |
CN109934187A (en) | Based on face Activity determination-eye sight line random challenge response method | |
Kang et al. | Ghost imaging-based optical multilevel authentication scheme using visual cryptography | |
Spagnolo et al. | Holographic watermarking for authentication of cut images | |
Lu et al. | Optical information encryption based on partially-update iterative system with azimuth multiplexing | |
CN103780795A (en) | Image encryption transmission method based on thermal light ghost imaging principle | |
Swain et al. | A quick review of network security and steganography | |
CN110139001A (en) | A kind of encryption and decryption method, apparatus and system of optical finger print certification | |
Shukla | Non-separable histogram based reversible data hiding approach using inverse S-order and skew tent map | |
CN111897196B (en) | Method and system for hiding and extracting digital holographic information | |
Yadav et al. | Image encryption algorithm based on rear-mounted phase mask and random decomposition | |
KR100407464B1 (en) | Multi-step encryption/decryption apparatus and method by pixel unit | |
CN108257190A (en) | The optical information security technology that a kind of visual cryptography is combined with photochromic material | |
Rathod et al. | Secure bank transaction using data hiding mechanisms | |
CN105391550A (en) | Color indirect visual cryptography scheme | |
Srivastava et al. | Security of Image Using Watermarking Techniques and Visual Cryptography | |
Kalamkar et al. | A review on implementation visual cryptography and steganography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180615 |
|
WD01 | Invention patent application deemed withdrawn after publication |