CN111383292A - Optical information hiding technology based on visual password dual-wavelength multiplexing - Google Patents

Optical information hiding technology based on visual password dual-wavelength multiplexing Download PDF

Info

Publication number
CN111383292A
CN111383292A CN201910365563.3A CN201910365563A CN111383292A CN 111383292 A CN111383292 A CN 111383292A CN 201910365563 A CN201910365563 A CN 201910365563A CN 111383292 A CN111383292 A CN 111383292A
Authority
CN
China
Prior art keywords
diffraction
information
visual
optical
diffraction pattern
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910365563.3A
Other languages
Chinese (zh)
Inventor
李桂林
祝玉鹏
杨栋宇
马锐
于韬
孙鑫凯
史祎诗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Chinese Academy of Sciences
Original Assignee
University of Chinese Academy of Sciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Chinese Academy of Sciences filed Critical University of Chinese Academy of Sciences
Priority to CN201910365563.3A priority Critical patent/CN111383292A/en
Publication of CN111383292A publication Critical patent/CN111383292A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T9/00Image coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing

Abstract

The invention discloses an optical information hiding technology based on visual cryptography dual-wavelength multiplexing. On the basis of the visual password, secret information is encoded into a diffraction pattern and a diffraction pattern generated by calculation of the diffraction pattern by using an expanded visual password encoding scheme, then two pieces of diffraction pattern information are converted into a pure phase diffraction optical element by using a GS algorithm, the pure phase diffraction optical element is received at a specific position by irradiating the diffraction element with laser with two specific wavelengths, and decryption information can be obtained by human eyes. The invention uses the pure phase optical diffraction element as a hidden carrier, two specific wavelengths as decryption keys, and an optical system is realized by diffraction of the diffraction element, so that the method has the advantages of good concealment, strong anti-noise capability, high safety and no need of alignment, is simple to operate, effectively solves the problems of poor concealment, complex system, more application limitations and the like in the prior art, and can be applied to the field of information encryption with high safety and system integration.

Description

Optical information hiding technology based on visual password dual-wavelength multiplexing
Technical Field
The invention relates to an optical information hiding technology, in particular to a technology which uses a pure phase diffraction optical element as a hiding carrier, utilizes two lasers with specific wavelengths to simultaneously irradiate a diffraction element and obtains hidden information at a specific position through diffraction action.
Background
The optical information hiding has a wide research prospect as an important research direction of optical information safety. Optical information hiding typically embeds secret information into a redundant carrier through optical transformation or other processes, or transforms the secret information into meaningless information such as white noise through a key. The most classical optical information hiding techniques are the double random phase encoding proposed by refgier and Javidvi in 1995, which uses two random phases as keys to transform secret information into meaningless complex amplitudes, see (Opt Lett 1995; 20: 767-9), followed by work on the optimization of the deficiencies of this scheme, such as quantization of the encrypted complex ciphertext to reduce its discrete real number, fractional fourier transform or fresnel transform instead of fourier transform, and another way to embed the secret information into a given image to achieve information hiding. In recent years, various optical systems have been tried for optical information hiding, including off-axis holography, cascaded phase mask structures, joint transform correlators, ghost imaging systems, and stacked imaging systems, and the optical information hiding has the advantages of parallelization, high-speed processing, suitability for multi-dimensionality, and unique appeal in the field of information security.
Visual cryptography is a technology related to image encryption, and provides a scheme for dividing an image carrying information to be encrypted into a plurality of encrypted sub-images, and acquiring the encrypted information by human eyes without any cryptographic calculation as long as a specified number of sub-images are accurately superposed. In 1994, Moni. Naor and Adi. Shamir formally proposed visual cryptography and carried out detailed theoretical elucidation, marking visual cryptography schemes as an important branch of cryptography research, see (Eurocrypt 1994 (1): 1-12, 1994). On the basis of a random grid encryption technology, visual cryptography realizes an encryption function by using a mode that a plurality of pixel point arrays jointly form a pixel dot matrix block, and finally generates an encryption subgraph of an encryption scheme. This scheme can be described as a "(k, n) -visual cryptography scheme", i.e. an image carrying encrypted information is encoded into n encrypted sub-images according to rules, providing that any k participants can decrypt the information (k is greater than 2 and less than or equal to n), assigning the sub-images to the n cryptographic scheme participants. When any k participants align and superpose the subgraphs, decryption can be completed, decryption information can be directly obtained through human eyes, and any participant smaller than k cannot complete decryption.
The subject group uses a visual password for optical information hiding in 2017, secret information is converted into a group of diffractive optical element keys in the hiding process through a visual password coding scheme, the diffractive optical elements are only required to be irradiated by laser in the extracting process, the obtained patterns are superposed together, and the secret information is directly extracted through the contact function of human eyes, see (J. Opt. 19(2017) 115703 (10 pp)), the visual password coding scheme is most different from other optical encryption schemes in that the scheme is asymmetric in encryption and decryption, and the decryption only needs simple superposition and has the advantages of rapidness and simplicity.
While the existing visual password scheme has the above advantages and characteristics, the existing visual password scheme also has some disadvantages:
1. the concealment is poor, the hidden carrier of the existing visual password in optical concealment is a binary random distribution structure with obvious rules, although no significance is provided, the characteristics are obvious, and the concealment is poor;
2. the application limit is more, the existing scheme is bound by a visual password scheme, the information can be provided for human eyes to obtain information only by accurate alignment decryption, and the information is easily interfered by alignment, so that more limit is caused to practical application;
3. the optical system is complicated, and the existing visual passwords hide a plurality of carriers in optical hiding, so that the complexity of the optical system is increased.
Disclosure of Invention
The invention aims to overcome the defects of the existing visual password in optical information hiding, solve the problems that the hidden information carrier generated by the visual password coding has poor secrecy, the number of the hidden carriers is large, the decryption hiding result needs to be combined with high requirements on the stability of a system and the like, and compared with the traditional optical information hiding, the invention utilizes a pure phase diffraction optical element as the hidden carrier and uses two wavelengths as decryption keys to simplify the structure of an optical information hiding system, so that the decryption is simpler and faster, and the robustness of the system is improved.
The object of the invention can be achieved by the following technical measures.
(1) Based on visual password, hidden information is coded by using expanded visual password coding scheme
Figure 709945DEST_PATH_IMAGE001
(the function is a binary function) encoding into a diffraction Pattern
Figure 286420DEST_PATH_IMAGE002
And a diffraction pattern generated by calculation from the diffraction pattern
Figure 681629DEST_PATH_IMAGE003
In the real-valued function (the function), the expanded visual coding scheme is as follows:
the scheme is an expansion on a (2, 2) visual cryptography coding scheme of Moni. Naor and Adi. Shamir in 1994, wherein the (2, 2) visual cryptography coding scheme is carried out on the basis of pixels, one pixel of secret information is coded on two keys, the pixel on the 2 keys is expanded into 2 pixels, the structure of the pixel is 0, 1 or 1, 0 arrangement, the arrangement of the pixels at different positions is random, and the expanded visual cryptography scheme is that
1. Secret information
Figure 230422DEST_PATH_IMAGE004
Expanding the image into two binary images according to the expansion scheme of (2, 2)
Figure 584043DEST_PATH_IMAGE005
And
Figure 851077DEST_PATH_IMAGE006
2. diffraction pattern
Figure 315556DEST_PATH_IMAGE007
Is divided into
Figure 984435DEST_PATH_IMAGE004
The pixels in the regions with the same number are divided into three classes according to the gray value to form three sets, wherein the pixels in each region are the same, namely the pixels in the former are pixel extensions of the latter and are in one-to-one correspondence in position, and the pixels in each region are divided into three classes according to the gray value to form three sets, wherein the three sets are formed
Figure 243378DEST_PATH_IMAGE008
Is a large set of,
Figure 810757DEST_PATH_IMAGE009
Is a set of intermediate values,
Figure 813348DEST_PATH_IMAGE010
Is a small set of values and satisfies that for any s, t there is
Figure 867891DEST_PATH_IMAGE011
,
Figure 32156DEST_PATH_IMAGE012
The number of pixels of the large value set and the small value set is the same;
3、
Figure 273782DEST_PATH_IMAGE013
each of the regions and
Figure 80064DEST_PATH_IMAGE014
the pixels of (a) correspond to (b),
Figure 457956DEST_PATH_IMAGE015
and
Figure 638795DEST_PATH_IMAGE016
is that
Figure 102137DEST_PATH_IMAGE014
Pixel spread of (2) pixels and
Figure 446531DEST_PATH_IMAGE014
correspond to pixels of (i.e. are
Figure 475666DEST_PATH_IMAGE017
Each of the regions and
Figure 981734DEST_PATH_IMAGE018
and
Figure 463531DEST_PATH_IMAGE019
every 2 pixels corresponds. The foregoing says that
Figure 346036DEST_PATH_IMAGE018
And
Figure 698520DEST_PATH_IMAGE019
each 2 pixels of (2) has a 0, 1 or 1, 0 structure
Figure 657380DEST_PATH_IMAGE018
And
Figure 95315DEST_PATH_IMAGE019
when the corresponding positions have the same structure
Figure 109407DEST_PATH_IMAGE020
In the area and
Figure 316398DEST_PATH_IMAGE017
are distributed in the same way if the structures are different
Figure 429847DEST_PATH_IMAGE020
The distribution in the area is
Figure 886236DEST_PATH_IMAGE017
Large set of values in this region
Figure 110544DEST_PATH_IMAGE008
And small value set
Figure 952467DEST_PATH_IMAGE010
Elements in the two sets are arranged according to sizes and are subjected to one-to-one position conversion;
by means of which secret information can be encoded
Figure 236818DEST_PATH_IMAGE001
Encoding into diffraction patterns
Figure 383766DEST_PATH_IMAGE017
And calculating the resulting diffraction pattern
Figure 942923DEST_PATH_IMAGE020
In (1).
(2) Using the GS algorithm, the diffraction patterns are
Figure 124505DEST_PATH_IMAGE017
And diffraction patterns
Figure 907654DEST_PATH_IMAGE020
Conversion to different wavelengths
Figure 807477DEST_PATH_IMAGE021
Figure 373587DEST_PATH_IMAGE021
Illuminating optical elements of the same phase
Figure 425988DEST_PATH_IMAGE003
(the gradient can be designed as required) diffracts to the same location to receive the resulting diffraction pattern. The specific process is as follows
1. Guessing phase distribution function of optical element
Figure 52141DEST_PATH_IMAGE003
At a wavelength of
Figure 704840DEST_PATH_IMAGE021
Diffraction under laser to obtain a diffraction pattern
Figure 74641DEST_PATH_IMAGE022
Here, the
Figure 230816DEST_PATH_IMAGE023
Figure 355767DEST_PATH_IMAGE024
Is a wavelength of
Figure 964603DEST_PATH_IMAGE021
Through a focal distance of
Figure 644153DEST_PATH_IMAGE025
To a back focal point of the Fourier lens
Figure 654834DEST_PATH_IMAGE026
Fresnel transformation of (1);
2. the complex amplitude obtained by diffraction
Figure 622790DEST_PATH_IMAGE027
With phase left and amplitude from current
Figure 984501DEST_PATH_IMAGE002
Calculated diffraction pattern of
Figure 696105DEST_PATH_IMAGE003
Instead, then at a wavelength of
Figure 358031DEST_PATH_IMAGE021
Is subjected to inverse laser down-conversion to obtain
Figure 496888DEST_PATH_IMAGE028
Here, the
Figure 814737DEST_PATH_IMAGE029
Figure 408660DEST_PATH_IMAGE030
Is a wavelength of
Figure 393934DEST_PATH_IMAGE031
The inverse of the above-described diffraction process of (a),
Figure 234851DEST_PATH_IMAGE032
is a phase function;
3. taking phase from complex amplitude obtained by inverse diffraction, and graduating to obtain new optical element phase distribution function
Figure 39996DEST_PATH_IMAGE003
Repeating the steps 1 and 2 until convergence;
the phase optical element can be obtained by the steps
Figure 358982DEST_PATH_IMAGE003
(3) The process of decrypting the hidden information only needs to use the wavelength of
Figure 198762DEST_PATH_IMAGE021
And
Figure 679422DEST_PATH_IMAGE031
laser beam simultaneously irradiating optical element
Figure 814606DEST_PATH_IMAGE003
At off focal distance
Figure 406124DEST_PATH_IMAGE026
Can obtain the hidden information
Figure 897148DEST_PATH_IMAGE033
The hidden information can be obtained through the visual password
Figure 548710DEST_PATH_IMAGE001
Compared with the prior art, the invention has the following advantages:
(1) the hidden carrier is a pure phase diffraction optical element, the intensity of pure phase information is invisible, the concealment of an encryption scheme is improved, and meanwhile, compared with the existing optical information hiding method with visual passwords, the hidden carrier only needs a plurality of carriers, the number of the carriers is reduced, and the structure of an optical system is simplified;
(2) the method uses the phase information of the pure phase plate for decryption, and because the pure phase plate only has the phase information and completes decryption through diffraction, the system has high noise tolerance and strong anti-noise capability, namely the scheme has good robustness;
(3) the invention adopts an expanded visual password coding scheme, the hidden information can be decrypted only by simultaneously irradiating specific double wavelengths, the requirement on the wavelengths is strict, meanwhile, the diffraction pattern obtained by irradiating one specific wavelength is in accordance with the random distribution of the visual password, and no information related to the hidden information exists, so that the safety is very high;
(4) the hardware system adopted for realizing the invention is simple, has good integratability and is very convenient for practical application.
The optical information hiding technology based on the vision password dual-wavelength multiplexing disclosed by the invention is suitable for encryption application occasions with high safety, strong robustness and high system integratability.
Drawings
Fig. 1 is an optical path diagram for decrypting hidden information in an optical information hiding technique based on visual cryptography dual wavelength multiplexing according to the present invention.
The device comprises a laser 1 with the wavelength of 632nm, a laser 2 with the wavelength of 450nm, a beam splitter prism 3, an optical diffraction element 4, a Fourier lens 5, a CCD receiving unit 6 and a computer 7.
Fig. 2 is a binary image with 128 × 128 pixels of the secret information "a" to be hidden in the invention.
Fig. 3 is an 8-gradient phase profile of the phase diffractive optical element (4 in fig. 1) generated by the matlab program code of the present invention, with pixels 640 x 640.
Fig. 4a is a diffraction pattern of the phase distribution of fig. 3 with a wavelength of 632nm illuminated under the optical path structure of fig. 1, with pixels 640 x 640.
Fig. 4b is a diffraction pattern from fig. 3 of a distribution of illumination phases at a wavelength of 450nm under the optical path structure of fig. 1, with pixels 640 x 640.
Fig. 5 shows that the pixels are 640 x 640 as a result of superimposing the letters "a" of hidden information obtained by the vision of human eyes, which is obtained by simultaneously irradiating the diffraction optical element of the phase distribution of fig. 3 with laser light of wavelength 632nm and wavelength 450nm, and receiving the laser light by the CCD at a defocus distance of 3 cm.
Fig. 6 shows the decryption result obtained by computer simulation of the diffractive optical element obtained above, i.e., fig. 3, with the wavelength 440nm and the wavelength 632nm, and the pixel is 640 x 640.
Fig. 7 shows that the CCD is decrypted by changing the position 3cm out of focus to 2cm, and the pixel is 640 x 640.
Detailed Description
In order to better explain the implementation process of the present invention, the operation process is described in detail below with reference to the attached drawings.
Fig. 1 is an optical path diagram for decrypting hidden information in an optical information hiding technique based on visual cryptography dual wavelength multiplexing according to the present invention.
The optical path structure comprises a laser with the wavelength of 1.632 nm, a laser with the wavelength of 2.450 nm, a beam splitter prism 3, an optical diffraction element 4, a Fourier lens 5, a CCD receiving unit 6 and a computer 7. The 8-gradient phase structure adopted by the optical diffraction element is positioned at the focal length position of the Fourier lens; the CCD receiving unit is located at a fixed position before (or after) focus.
The encrypted information "a" is first determined, the image carrying the information, e.g. 2, is acquired and encoded into the two sub-images 4a, 4b using software. The method comprises the following specific steps:
(1) based on the visual password principle, the visual password coding scheme is expanded, and the secret information is decomposed into two diffraction patterns. One diffractogram is that of the laser-illuminated random 8-gradient phase optical element of FIG. 1 at a wavelength of 632nm at a 3cm off-focus distance after passing through a Fourier lens of 8cm focal length. The other diffraction pattern is generated by expanded visual code;
(2) the diffractive optical element is obtained by using the GS algorithm. The amplitude of the complex amplitude obtained by 632nm laser is replaced by a diffraction pattern generated by expanding visual code, the complex amplitude is obtained by inverse diffraction with the wavelength of 450nm, the complex amplitude is changed into 1, the phase is changed into 8 gradients, a new diffraction element is obtained, and the process is repeated for 20 times to obtain the phase distribution of the convergent diffraction optical element as shown in figure 3.
Fig. 4a is a diffraction diagram of the phase distribution as shown in fig. 3 when the light path structure as shown in fig. 1 is irradiated at a wavelength of 632nm, fig. 4b is a diffraction diagram of the phase distribution as shown in fig. 3 when the light path structure as shown in fig. 1 is irradiated at a wavelength of 450nm, the decrypted hidden information is that laser with the wavelength of 632nm and laser with the wavelength of 450nm simultaneously irradiates the diffraction optical element with the phase distribution as shown in fig. 3, the CCD receives the information at a fixed diffraction distance, and the character "a" of the hidden information can be obtained through the vision of human eyes, namely, the superposition result.
The diffraction optical element obtained above was irradiated with computer-simulated light of 440nm and 632nm in wavelength to obtain the decryption result shown in fig. 6. The decryption result is obtained by changing the CCD focal distance position 3cm to 2cm as shown in FIG. 7.
The method and the example are obtained by expanding the visual password coding scheme and combining the GS algorithm to convert the secret information into the phase diffraction optical element on the basis of the existing visual password scheme, using different wavelengths as keys and decrypting the secret information by using the optical path system and the decryption method provided by the invention. The practice of the present invention is not limited to the above-described embodiments. Any method, device and system that encode secret information into a diffractive optical element using the above-mentioned visual cryptography encoding scheme and GS algorithm and hide the secret information using the above-mentioned photoelectric method or diffraction function, as long as the two wavelengths are used as keys, are within the scope of the present invention.

Claims (6)

1. A technology for hiding optical information based on visual cryptography dual-wavelength multiplexing comprises the following steps:
the first step, based on the visual password, utilizing an expanded visual password coding scheme to code hidden information into a diffraction pattern and another diffraction pattern generated by coding the diffraction pattern by a computer;
secondly, two pieces of diffraction pattern information are respectively converted into specific wavelengths by utilizing a GS algorithm
Figure 632112DEST_PATH_IMAGE001
Figure 558480DEST_PATH_IMAGE002
The laser is diffracted at the same position by the same pure phase diffraction optical element to obtain a diffraction pattern;
third, the hidden information is decrypted and the specific wavelength is used
Figure 372852DEST_PATH_IMAGE001
Figure 273943DEST_PATH_IMAGE002
The laser irradiates the same pure phase diffraction optical element to obtain a diffraction pattern at a specific position, and hidden information can be obtained through human eyes.
2. Optical information hiding technique based on visual cryptography dual wavelength multiplexing as used in claim 1, characterized in that the hiding carrier used is a phase-only diffractive optical element with excellent hiding.
3. The optical information hiding technique based on visual cryptography two-wavelength multiplexing as claimed in claims 1, 2, wherein the hidden information is a superposition of diffraction patterns obtained by irradiating the diffractive optical element with laser light of two specific wavelengths, the two diffraction patterns being ordinary diffraction patterns, and a single diffraction pattern having no information related to the hidden information.
4. The optical information hiding technique based on visual cipher dual wavelength multiplexing as used in claims 1, 2, 3, characterized in that the two diffraction patterns obtained are encoded by an extended visual cipher coding scheme, and the extended visual cipher coding scheme is obtained on the basis of a visual cipher, and the diffraction patterns have the same security as the visual cipher key.
5. The optical information hiding technique based on optical cipher dual wavelength multiplexing as claimed in claims 1, 2, 3, wherein the obtained hidden carrier diffractive optical element is obtained by GS algorithm, which has the advantage of simple implementation, has good compatibility with existing design methods of diffractive optical elements, and facilitates the process implementation.
6. The optical information hiding technique based on visual cryptography dual wavelength multiplexing as claimed in claims 1, 2, 3, 4, 5, wherein the invention is realized by designing the diffractive optical element based on visual cryptography in combination with dual wavelength multiplexing, and has both advantages, and avoids both defects, and has extremely high concealment, security and practicability.
CN201910365563.3A 2019-05-01 2019-05-01 Optical information hiding technology based on visual password dual-wavelength multiplexing Pending CN111383292A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910365563.3A CN111383292A (en) 2019-05-01 2019-05-01 Optical information hiding technology based on visual password dual-wavelength multiplexing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910365563.3A CN111383292A (en) 2019-05-01 2019-05-01 Optical information hiding technology based on visual password dual-wavelength multiplexing

Publications (1)

Publication Number Publication Date
CN111383292A true CN111383292A (en) 2020-07-07

Family

ID=71218487

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910365563.3A Pending CN111383292A (en) 2019-05-01 2019-05-01 Optical information hiding technology based on visual password dual-wavelength multiplexing

Country Status (1)

Country Link
CN (1) CN111383292A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111861850A (en) * 2020-07-21 2020-10-30 中国科学院大学 Information hiding method and system for laminated imaging
CN111897196A (en) * 2020-08-13 2020-11-06 中国科学院大学 Method and system for hiding and extracting digital holographic information

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111861850A (en) * 2020-07-21 2020-10-30 中国科学院大学 Information hiding method and system for laminated imaging
CN111861850B (en) * 2020-07-21 2022-04-29 中国科学院大学 Information hiding method and system for laminated imaging
CN111897196A (en) * 2020-08-13 2020-11-06 中国科学院大学 Method and system for hiding and extracting digital holographic information

Similar Documents

Publication Publication Date Title
Li et al. Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme
US9798290B2 (en) Holographic encryption of multi-dimensional images and decryption of encrypted multi-dimensional images
CN108322622A (en) A kind of color digital image encryption method based on 2D-VMD and octuple hyperchaotic system
Chen et al. Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition
CN103279916A (en) Image encryption method based on double random phase encoding and interference principle
Kong et al. Image encryption based on interleaved computer-generated holograms
CN111383292A (en) Optical information hiding technology based on visual password dual-wavelength multiplexing
Wei et al. Optical image encryption using QR code and multilevel fingerprints in gyrator transform domains
CN111241554A (en) Digital image encryption and decryption system based on visual password
Zhang et al. Multiple-image encryption mechanism based on ghost imaging and public key cryptography
Chen et al. Topological charge number multiplexing for JTC multiple-image encryption
Tsang et al. Asymmetrical and biometric encrypted optical scanning holography (ABE-OSH)
Yuan et al. Optical encryption for multi-user based on computational ghost imaging with Hadamard modulation
He et al. Single-shot optical multiple-image encryption based on polarization-resolved diffractive imaging
CN107104790A (en) Optical encryption method based on QR codes and array fingerprint key
CN109285107B (en) Local optical encryption and decryption system based on fovea system
Abuturab Gyrator wavelet transform based non-linear multiple single channel information fusion and authentication
CN111383290A (en) Optical information hiding technology based on visual password and speckle
CN113485081B (en) Non-cascade optical scanning holographic multi-image parallel encryption method
Kinger Efficient Visual Cryptography
CN111383291A (en) Polarization-based visual password double-image hiding scheme
CN105391550A (en) Color indirect visual cryptography scheme
Verma et al. Securing multiple information using bio-chaotic keys
Qin et al. Optical encryption in a JTC encrypting architecture without the use of an external reference wave
CN112583577A (en) Medical image encryption method based on biological key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200707

WD01 Invention patent application deemed withdrawn after publication