WO2005114849A1 - Méthode de transmission de données codées, système de transmission de données et système de réception de données utilisant l’holographie numérique - Google Patents

Méthode de transmission de données codées, système de transmission de données et système de réception de données utilisant l’holographie numérique Download PDF

Info

Publication number
WO2005114849A1
WO2005114849A1 PCT/JP2004/007412 JP2004007412W WO2005114849A1 WO 2005114849 A1 WO2005114849 A1 WO 2005114849A1 JP 2004007412 W JP2004007412 W JP 2004007412W WO 2005114849 A1 WO2005114849 A1 WO 2005114849A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
bit
bits
bit data
image
Prior art date
Application number
PCT/JP2004/007412
Other languages
English (en)
Japanese (ja)
Inventor
Nobukatsu Takai
Original Assignee
Hokkaido Technology Licensing Office Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hokkaido Technology Licensing Office Co., Ltd. filed Critical Hokkaido Technology Licensing Office Co., Ltd.
Priority to PCT/JP2004/007412 priority Critical patent/WO2005114849A1/fr
Publication of WO2005114849A1 publication Critical patent/WO2005114849A1/fr

Links

Classifications

    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03HHOLOGRAPHIC PROCESSES OR APPARATUS
    • G03H1/00Holographic processes or apparatus using light, infrared or ultraviolet waves for obtaining holograms or for obtaining an image from them; Details peculiar thereto
    • G03H1/04Processes or apparatus for producing holograms
    • G03H1/08Synthesising holograms, i.e. holograms synthesized from objects or objects from holograms
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03HHOLOGRAPHIC PROCESSES OR APPARATUS
    • G03H1/00Holographic processes or apparatus using light, infrared or ultraviolet waves for obtaining holograms or for obtaining an image from them; Details peculiar thereto
    • G03H1/0005Adaptation of holography to specific applications
    • G03H1/0011Adaptation of holography to specific applications for security or authentication
    • G03H2001/0016Covert holograms or holobjects requiring additional knowledge to be perceived, e.g. holobject reconstructed only under IR illumination
    • G03H2001/0022Deciphering being performed with numerical or optical key, e.g. with the optical scrambler used during recording

Definitions

  • the present invention relates to an encrypted data transmission method using digital holography, a data transmission system, and a data reception system.
  • the present invention provides a digital hologram creation method, a digital hologram creation device, a digital hologram restoration device, a data transmission method using digital holography, a data transmission system using digital holography, and encrypted data using digital holography.
  • the present invention relates to a transmission method and a digital hologram data receiving system.
  • a target object is irradiated with coherent light, and a reference wave is added to the light wave (object wave) from the target object to record the interference intensity.
  • a hologram is created, and the recorded light wave is reproduced (restored) in perfect form. . If the object is a diffuse object that scatters light randomly, the light wave will undergo a random phase change there, and the hologram will record a completely random, usually fine speckle fringe. Then, the target information can be reproduced regardless of the random phase. That is, such an optical hologram can be considered as a recording medium for target information in a random form.
  • the same processing as holography developed in the field of optics can be realized by digital computation using a computer.
  • This is digital holography.
  • the target of this digital holography is often an image, it can be essentially any two-dimensional array data. It can be taken inside the computer This is because the array of numerical values does not change regardless of the data handled.
  • the process of recording and reproducing information in optical holography can be executed by a digital computer. Specifically, two-dimensional array data is treated as image data, and random-phase modulation is performed on the data using random numbers, followed by Fourier transform. You can get it. —
  • the resulting digital hologram is a two-dimensional random signal with a statistically uniform intensity distribution.
  • the digital hologram can always reproduce the image information in perfect form. Therefore, if the spread hologram is used as a substitute for the original image information, the hologram signal itself is a completely random signal, so the original image information is concealed as it is, and the digital hologram itself is encrypted by one. Can be used for technology.
  • diffusion holograms have the property of being a recording medium with a certain degree of redundancy because information is uniformly distributed and recorded over the entire hologram surface. That is, it is possible to embed additional information in a part of the hologram. Therefore, if this characteristic is used, it can be applied to digital watermarking technology.
  • the diffusion digital hologram has the potential to be used on both sides as information encryption technology or digital watermarking technology. That is, when digital content is converted into a hologram and distributed, even if the content is intercepted during transmission, the content information is random hologram data, so that information can be transmitted with high security.
  • converting digital content into a hologram form means treating it as a two-dimensional array of data similar to image data. In other words, the content information is converted into a hologram in the form of image data and transmitted.
  • the data reproduced from it must exactly match that of the original information. .
  • the reproduction error includes a reproduction data error and a mouthgram defect.
  • the error in the reproduced data is a numerical difference between the reproduced image data and the original image data for each pixel.
  • a hologram defect is an error that newly occurs in the reconstructed image due to the operation of replacing a part of the hologram with other data, assuming that digital watermark information is embedded in the part of the hologram. is there. Disclosure of the invention
  • the present invention has been made in view of such conventional technical problems, and it is an object of the present invention to provide an encryption technology applying digital holography that can completely reproduce the original data while eliminating the influence of a reproduction error. With the goal.
  • a first feature of the present invention is that information of each pixel of image data of one screen is represented by 8-bit data, and each of the 8-bit data is decomposed into upper 4 bits and lower 4 bits of data. and, the upper 4 bits, each lower 4-bit data and the upper 4-bit data, to create each of the lower four bits (1 0 0 0) 8-bit data group by adding 2 Damide data, the 8 A digital hologram creation method for dividing a bit data group into data groups for one screen and creating a digital hologram for each data group for one screen.
  • the data group in a predetermined area is replaced with respect to the digital hologram, and the encrypted digital hologram is Can be created.
  • 8-bit data of a character code is assigned as 8-bit data of each pixel of image data, and a character document file can be converted into a digital hologram.
  • two-pixel 16-bit data adjacent to image data can be divided by: 1- to 6-bit data of 2 pi ..
  • the file can be digitally hologramized.
  • a second feature of the present invention is that an image processing unit that expresses information of each pixel of image data of one screen by 8-bit data, and decomposes each of the 8-bit data into upper 4 bits and lower 4 bits data The upper 4 bits and lower 4 bits of data as upper 4 bits of data, and add (100 0) 2 dummy data to each lower 4 bits to generate 8 bits of data.
  • An 8-bit data group creation unit that creates groups; and a digital holography processing unit that divides the 8-bit data group into data groups for one screen and creates a digital hologram for each data group for one screen.
  • Digital hologram making equipment is an image processing unit that expresses information of each pixel of image data of one screen by 8-bit data, and decomposes each of the 8-bit data into upper 4 bits and lower 4 bits data The upper 4
  • the image processing unit may assign 8-bit data of a character code as 8-bit data of each pixel of the image data.
  • the image processing unit may assign 16-bit data of a 2-byte character code as 16-bit data of two pixels adjacent to the image data.
  • the image data is image data
  • 8-bit data is assigned to each pixel, and an 8-bit 1-bit character code is assigned.
  • each character is assigned as an 8-bit character code for each pixel.
  • each character is assigned as a 16-bit character code for two adjacent pixels.
  • each of the 8-bit data is decomposed into upper 4 bits and lower 4 bits of data, and the decomposed upper 4 bits and lower 4 bits of data are each set as upper 4 bits, and each of the lower 4 bits is processed. (1. 0 0—0> 2 ) ⁇
  • Add one piece of data to create an 8-bit transmission data group.
  • a digital hologram is created for each data group for one screen pixel.
  • a third feature of the present invention is that an 8-bit data decomposing unit that decomposes digital hologram data into an original 8-bit data group, and that data of lower 4 bits is provided for each of the decomposed 8-bit data.
  • the image restoration processing unit can restore an 8-bit 1-byte character code with one 8-bit data.
  • the image restoration processing unit can restore a 16-bit 2-byte character code with two adjacent 8-bit data.
  • the digital hologram data created by the digital hologram creation device is decomposed into an original 8-bit data group, and each of the decomposed 8-bit data is divided into lower 4 bits. Dummy data is deleted, the upper 4-bit data group from which the lower 4-bit data has been deleted is divided into the original upper 4-bit and lower 4-bit data, and the 8-bit data group of the original image is restored from these. I do. Then, the 8-bit data group of the restored original image is assigned to each pixel and displayed as an original image for each screen.
  • dummy data is added to the lower 4 bits that are likely to cause an error during transmission, and the original data is all data of the upper 4 bits.
  • the original hologram data can be restored without errors by deleting the dummy data and restoring the original data, especially when the document data is converted to digital hologram data.
  • the original document data can be restored without errors.
  • a fourth feature of the present invention is that information of each pixel of image data of one screen is represented by 8-bit data, and each of the 8-bit data is decomposed into upper 4 bits and lower 4 bits of data.
  • the upper 4 bits and lower 4 bits of data are each set to upper 4 bits, and (10000) 2 dummy data is added to each lower 4 bits to create an 8-bit transmission data group.
  • a digital hologram that divides an 8-bit data group into data groups for one screen, creates a digital hologram for each of the one-screen data groups, and transmits the digital hologram There is a data transmission method using luffy.
  • a digital hologram to be transmitted can be transmitted after a data group in a predetermined area is replaced.
  • a public key cryptosystem can be used for encryption.
  • 8-bit data of a character code can be assigned as 8-bit data of each pixel of image data.
  • 16-bit data of a 2-byte character code can be allocated as 16-bit data of two pixels adjacent to image data.
  • a fifth feature of the present invention is that an image processing unit that expresses information of each pixel of image data of one screen by 8-bit data, and decomposes each of the 8-bit data into upper 4 bits and lower 4 bits data 4-bit decomposition processing unit, and the upper 4 bits and lower 4 bits of data are converted to upper 4 bits,
  • a transmission data creation unit that creates a transmission 8-bit data group by adding (10000) 2 dummy data to 4 bits, and divides the transmission 8-bit data group into a data group for each screen
  • a transmission system using digital holography comprising: a digital holography processing unit that creates a digital hologram for each data group for one screen; and a transmission unit that transmits the digital hologram.
  • the data group of a predetermined area is replaced with respect to the digital hologram.
  • an encryption processing unit for transmitting the data.
  • the encryption processing unit may perform encryption processing using a public key in a public key cryptosystem.
  • the image processing unit may assign .8-bit data of a character code as 8-bit data of each pixel of the image data.
  • the image processing unit may assign 16-bit data of a 2-byte character code as 16-bit data of two pixels adjacent to the image data.
  • 8-bit data is assigned to each pixel in the case of image data, and each character is assigned to each pixel in the case of 8-bit 1-byte character code document data. If the document data is 16-bit 2-byte character code, each character is allocated as a 16-bit character code for two adjacent pixels, and the image data for one screen unit is assigned. create. Then, each of the 8-bit data is decomposed into upper 4 bits and lower 4 bits of data, and the decomposed upper 4 bits and lower 4 bits of data are each converted into upper 4 bits, and each of the lower 4 bits is converted into lower 4 bits.
  • a sixth feature of the present invention is that information of each pixel of image data of one screen is represented by 8-bit data, and each of the 8-bit data is decomposed into upper 4 bits and lower 4 bits of data. The upper 4 bits and the lower 4 bits are each set to the upper 4 bits, and (100 0) 2 dummy data is added to the lower 4 bits to create an 8-bit transmission data group.
  • Digital holography that divides the 8-bit data group into data groups for one screen, creates a digital hologram for each data group for one screen, and transmits the digital hologram itself as encrypted data In the method of transmitting encrypted data.
  • the digital hologram itself of an image or document data created in a manner that is unlikely to cause an error during transmission is transmitted as encrypted data, and is received. Only a receiving system equipped with a hologram restoration device can accurately restore the original image or document data.
  • a seventh feature of the present invention is that a receiving unit that receives digital hologram data, a transmission 8-bit data decomposing unit that decomposes the digital hologram data into an original transmission 8-bit data group, A dummy data deletion processing unit that deletes data of lower 4 bits for each of the 8-bit data for transmission, and a data group of upper 4 bits from which the data of lower 4 bits are deleted is converted into an original data group.
  • An 8-bit data restoration processing unit that divides the data into upper 4 bits and lower 4 bits and restores the original 8-bit data group, and assigns the restored 8-bit data group to each pixel, and image data for each screen
  • a digital hologram receiving system comprising: an image restoration processing unit to be described below; and an image display unit for displaying the image data.
  • the encrypted and transmitted It can be provided with a decoding processing section for decoding digital hologram data to be received.
  • the image restoration processing unit can restore a 16-bit 2-byte character code using two adjacent 8-bit data.
  • the digital hologram data sent by the digital hologram transmission system is received, and the received digital hologram data is decomposed into the original transmission 8-bit data group.
  • the lower 4 bits of dummy data are deleted, and the upper 4 bits of the data group from which the lower 4 bits of data are deleted are replaced with the original upper 4 bits and lower 4 bits.
  • the data is divided into bit data, and the 8-bit data group of the original image is restored from these data.
  • the 8-bit data group of the restored original image is assigned to each pixel and displayed as image data for one screen.
  • Digital hologram data is sent from the transmission system, and dummy data is added to the lower 4 bits of data that are likely to cause errors during transmission, and all original data is transmitted as upper 4 bits of data.
  • the original hologram data can be restored without error.
  • the document data is converted to digital hologram data and transmitted. In such a case, the original document data can be restored without errors such as garbled characters.
  • Figure 1 is an illustration of general digital holography.
  • Figure 2A shows the original image used for general digital holography.
  • Figure 2B shows an image of a digital hologram by general digital holography.
  • Fig. 2C shows a reproduced image of a digital hologram by general digital holography.
  • Figure 3 shows a graph that represents the value of the standard deviation ⁇ ⁇ ⁇ of the image difference between the original image and the reproduced image obtained in the experiment as a function of the amount obtained by normalizing the random deviation of the standard deviation ⁇ ⁇ by 2 ⁇ . rough.
  • Figure 4 is a graph of the reconstructed image error as a function of the number of hologram defects.
  • FIG. 5 is an explanatory diagram showing the effect of the number of hologram defects ⁇ on a bit plane of reproduced image data.
  • Fig. 6 ⁇ is an explanatory diagram comparing the values of six consecutive pixel values of the original data and a part of the reproduced data in decimal notation when the hologram data was reproduced without any change.
  • FIG. 6B is an explanatory diagram comparing binary values of six consecutive pixel values of the original data and a part of the reproduced data when the hologram data is reproduced without any change.
  • FIG. 7 is an explanatory diagram of a digital hologram creation procedure and a reproduction procedure thereof in a transmission method using digital holography according to one embodiment of the present invention.
  • FIG. 8 is a block diagram showing a functional configuration of a transmission system used in the transmission method according to the above embodiment.
  • FIG. 9 is a block diagram showing a functional configuration of a receiving system for hologram data transmitted by the transmitting system according to the embodiment.
  • FIG. 10 is a flowchart of hologram data transmission processing by the transmission system.
  • Fig. 11 is a flowchart of the character reproduction process from hologram data by the receiving system.
  • FIG. 12 is a pattern diagram of a hologram transmitted in the above embodiment.
  • FIG. 13 is an explanatory diagram of an encryption method for the hologram.
  • Figure 14A shows a hologram pattern of a text document embedded in the original image.
  • Figure 1.4B is a pattern diagram of a hologram reproduced from the hologram of the text document.
  • Figure 14C is a pattern diagram of the hologram reproduced from the encrypted hologram of the text document.
  • FIG. 15 is a block diagram showing a functional configuration of a digital hologram creation device according to a second embodiment of the present invention.
  • FIG. 16 is a block diagram showing a functional configuration of a digital hologram restoration device according to a second embodiment of the present invention.
  • FIG. 17 is a flowchart of digital hologram data creation processing by the digital hologram creation device.
  • FIG. 18 is a flowchart of a process of restoring an original image from a digital hologram by the digital hologram restoring device.
  • optical holography is an optical technique that completely preserves both the amplitude and phase of an object and reconstructs a three-dimensional object as it is.
  • all information on the amplitude and phase of the object is stored as a hologram on a recording medium such as a photographic plate.
  • the This record is an intensity record of the interference pattern of the diffracted light wave (object wave) from the object and the reference light wave (reference wave). An interference pattern results.
  • Figure 1 shows the procedure for creating a digital hologram for two-dimensional array data.
  • two-dimensional array data g. (x, y) is called image data.
  • image data is not limited to image data, but may be an array of numerical data or text data.
  • g is used in both cases as image data.
  • (X, y) is non-negative numerical data.
  • the procedure for creating a digital hologram is as follows. After modulating (x, y) with a random phase ⁇ (x, y), two-dimensional Fourier transform is performed using fast Fourier transform (FFT).
  • FFT fast Fourier transform
  • a and b are constants that give the slope of the reference wave signal.
  • the reconstructed image g R (x, y) from the digital hologram can be obtained by multiplying the reconstructed wave signal.
  • the reconstructed image is obtained by the inverse Fourier transform of equation (5).
  • FIG. 2 is an example of a digital hologram of image data obtained by such an arithmetic processing and a reproduced image from the digital hologram.
  • Figure 2A shows the original image
  • Figure 2B shows the digital hologram
  • Figure 2C shows the reproduced image.
  • the reproduced image in FIG. 2C visually looks like the original image shown in FIG. 2A is correctly reproduced.
  • an arithmetic precision of 64 bits (double precision) is used, an original image having a negligible error can be reproduced with high accuracy as in the equation.
  • this is not always the case if we take into account realistic factors.
  • the hologram is used as an encrypted medium of the original image data, it must be treated as 8-bit data, like general-purpose image data, and the quantization error becomes a problem.
  • the error of the reproduced image strongly depends on the random phase applied to the original image data.
  • the random phase is actually given by a Gaussian random number.
  • the error of the reproduced image greatly changes.
  • this dependency results in "the larger the random phase amount ⁇ , the smaller the error".
  • a large fluctuation often causes a large error in the result, whereas in digital holography, the error is small.
  • the cause of the error is that the horror Due to quantization errors in the data.
  • Performing 8-bit quantization on a digital hologram means converting the hologram intensity value of each pixel into an integer value in 256 steps from 0 to 255, and the hologram data in this dynamic range Depends on value distribution. The fact that the random phase amount is related to this distribution governs the error of the reproduced image.
  • the digital hologram created by the 64-bit precision (double precision) operation is converted into 8-bit data, and the difference (error) between the original image and the reproduced image (one of the reproduced images) is calculated. Numerically examined. That is, the original image. riginal and reconstructed image
  • the error of the reproduced image was evaluated using, and the condition of the random phase amount that minimized the error was examined.
  • the effect of a defect on the hologram on the reconstructed image was numerically investigated.
  • This hologram defect was provided with the intention of clarifying the permissible amount of embedding an encryption key in a hologram when using information of image data as an encryption medium.
  • each of the two image data to be evaluated is 8-bit data.
  • FIG. 3 shows the value of the standard deviation ⁇ ⁇ ⁇ of the image difference between the original image and the reproduced image obtained in the experiment as a function of the amount obtained by normalizing the standard deviation ⁇ ⁇ of the random phase by 2 ⁇ .
  • the random phase is given using Gaussian random numbers, and ⁇ ⁇ is its standard deviation.
  • Marker ⁇ ⁇ ⁇ ⁇ in FIG. 3 indicates a case where there is no hologram defect, and markers ⁇ , + and ⁇ indicate cases where the number of hologram defects ⁇ is 20, 100, and 512, respectively.
  • the hologram defect number ⁇ is the number of pixels when a part of the hologram is replaced with another value, assuming that additional information is written. The following two things can be read from the results shown in FIG.
  • the second thing seen in Fig. 3 is the dependence of the reproduced image error on the number ⁇ of defects in the hologram.
  • the number of defects is defined as a defect by replacing the il pixel value in the middle of the hologram and the ⁇ pixel values in the part. -.
  • the error of the reconstructed image shows a substantially constant value for each number of defects ⁇ in the region of the error of the reconstructed image as a function of the number of hologram defects shown in Fig. 4. Is clearly observed to increase.
  • Fig. 4 shows the results of a detailed examination of this tendency using the average error obtained by averaging the errors of the reproduced images obtained in the region where the random phase amount is ⁇ ⁇ > ⁇ .
  • the average error when all ⁇ consecutive pixels of the hologram are replaced with zero is shown as a function of the number of defects ⁇ .
  • the reproduced image error monotonically increases with the number of defects ⁇ , but the important point is the magnitude of the error.
  • the average error shown in FIG. 4 is 0.5924, which is less than 1. That is, even if the value of the standard deviation is taken into account, even if the error of the reproduced image is largely estimated, it occurs in the 0-bit plane of the reproduced image data (8-bit data).
  • the average error was 0.9951. Since this is an error of about 1 or 2 in a decimal number, the value of the 0 to 1 bit plane fluctuates with high probability.
  • Figure 5 shows the effect of the number of hologram defects ⁇ (the number of pixels in which the negative part was replaced with another value) on the bit plane of the reproduced image data.
  • the average error obtained when the number of defects ⁇ is 300 is 2.035, and in this case, FIG. As shown in (2), error fluctuation also appears on the 2-bit plane.
  • Figures 6A and 6B compare the values of six consecutive pixel values of the original data and a part of the reproduced data in decimal and binary numbers when the hologram data was reproduced without any changes. Things. The numbers are compared in both decimal and binary numbers, and the reproduced data with errors is shaded. As can be seen, the reproduced data has an error in the range of 1 to 2 in the decimal notation shown in FIG. 6A. As described above, when the hologram data is not replaced, the error is extremely small.
  • step (1) the 8-bit data of one pixel of the original data is It is broken down into two bits: the upper 4 bits and the lower 4 bits.
  • step (3) a reproduction data group is obtained as a reproduced image of the hologram in step (2), and only the upper 4 bits are taken out.
  • the lower 4 bits (XXXX in Fig. 7) are discarded.
  • step (4) an 8-bit data group is reconstructed from the two sets of 4-bit data groups extracted in step (3) according to the data arrangement determined in step (2).
  • the upper 4 bits and lower 4 bits of the original data are omitted as upper bits in the processing process, so that the effect of the reproduction error appearing in the lower bits can be avoided.
  • character data is hologram-encrypted and transmitted using the above principle, The process of restoring the same will be described.
  • a text document can be converted into a digital hologram and then restored without a 1-bit error
  • the digital hologram can be used as an encryption medium for digital content.
  • character data is treated as an image, and it is encrypted as a digital hologram. Since all characters, whether Japanese or Western, are coded, if there is an error even in a single bit in the restoration result, garbled characters occur and accurate document information cannot be obtained. The following shows the case of a Japanese document.
  • FIG. 8 shows a data transmission system using holography
  • FIG. 9 shows a functional configuration of the data reception system
  • FIGS. 10 and 11 show flowcharts of data transmission processing and data reception processing using holography.
  • the data transmission system 100 shown in Fig. 8 divides each 16-bit 2-byte character code included in a Japanese document into upper 8 bits and lower 8 bits, and generates an 8-bit data string.
  • Pre-processing unit 11 upper and lower 4-bit division processing unit 12 that divides each 8-bit data into upper 4 bits and lower 4 bits, and sets each 4-bit data into upper 4 bits and lower 4 bits
  • Lower dummy data addition processing unit 13 that adds dummy data (10000) 2 to bits 13
  • Transmission data creation unit 1 that rearranges the 8-bit data string to which the dummy data is added and creates transmission data 4.
  • the hologram creation unit 15 by the arithmetic processing shown in FIG. 1, replace predetermined areas with each other from the created hologram, and perform predetermined encryption using a public key obtained in advance.
  • Hologram encryption processing unit 1 6 for executing processing, and the encrypted data from the transmit processor 1 7 transmits through the network.
  • the document decryption system 200 shown in FIG. 9 is a data receiving unit 21 that receives encrypted data via a network, decrypts the received encrypted data using a secret key, and restores the original hologram.
  • Decoding processing unit 22 Hologram decomposing unit 23 that extracts 8-bit data for each pixel from the restored hologram, Upper and lower 4-bit division processing unit that decomposes each of these 8-bit data into upper and lower 4 bits 2
  • Lower 4-bit discard processing unit 2.5 that discards lower 4 bits of dummy data of 4 and 8 bit data 2.5, upper 4 bits of remaining upper 4 bit data string, lower 4 bits of 8 bit data 8-bit data reconstructing unit 26, which restores to columns, and 16-bit 2-byte document data playback processing unit 27, which combines 16-bit 2-byte Japanese character codes by combining two 8-bit data It has been.
  • the document transmission processing by the data transmission system 100 using holography having the above configuration and the reception processing by the data reception system 200 will be described with reference to the flowcharts of FIGS. 10 and 11.
  • the preprocessing unit 11 decomposes one character into two 8 bits. To create a digital hologram, encrypt it, and transmit it. Note that this preprocessing is not required for European characters in which one character can be handled by 8 bits.
  • step S 1 the 16-bit character code of the Japanese document is divided into two 8-bit codes (step S 1), and then, according to the procedure shown in FIG. (Step S 3).
  • the created 8-bit data group is arranged in a predetermined order to create an 8-bit data string for transmission, and a hologram is created for this. For example, extract the image matrix data of 12 rows x 128 columns including the blank-white part of the last row. Therefore, for Japanese characters, the image data is four times the size of the number of characters (step S7).
  • an original image 256 x 256
  • a digital hologram is created by the above-described method (step S9).
  • FIG. 12 illustrates the created digital hologram. This hologram is created by applying random phase modulation with a standard deviation of 2 ⁇ to the entire surface of the original image based on Gaussian random numbers. Therefore, the fine structure of the hologram differs depending on the random number used.
  • a digital hologram as shown in FIG. 12 is subjected to encryption processing using a public key as a signal key previously obtained from the receiving side, and a predetermined address data receiving system 200 (Steps S11, S13).
  • a method of exchanging predetermined areas Rl and R2 of the digital hologram as shown in Fig. 13 can be adopted, but a general public key cryptosystem generally used for ordinary transmission data is used.
  • a public key based on a scheme can also be used.
  • step S21 If the encrypted data is received from the transmitting system 100 (step S21), decryption processing is performed using the secret ⁇ of the receiving system 200 to restore the original digital hologram data (step S21). S2 3). Then, the original transmission 8-bit data group is restored from the digital hologram, and the upper 4 bits are left from each 8-bit data, and the lower 4 bits dummy data are discarded (step S25, step S25). S27).
  • Step S29 the original Japanese document is restored by restoring 16-bit 2-byte data using the restored 8-bit data and arranging the 16-bit 2-byte data sequence in the original order. And output (steps S31, S33).
  • Figure 14A shows the imaging pattern of the text document embedded in the original image
  • Figures 14B and 14C show the images reproduced from the hologram
  • Figure 14B shows the hologram reproduced without any manipulation, and the character information can now be restored correctly
  • the pattern in Fig. 14C is a pattern in which the hologram is modified and character information cannot be restored.
  • the reproduced image in Fig. 14B is very similar to the original image in Fig. 14A, and the difference is visually indistinguishable, but has an error of about 1 or 2 bits as described above. .
  • the above-mentioned complete restoration method that avoids errors is applied, a restoration result that exactly matches the original text one by one can be obtained. Even if this digital hologram is reconstructed repeatedly by changing the value of the random phase used for its creation, if the standard deviation of the phase distribution is 2 ⁇ , accurate results can be obtained. .
  • holograms have the following characteristics: It is known that an image can be reproduced from a part of the image, but a high-precision reproduced image cannot be obtained beyond visual observation. Taking this into account, if a part of the hologram created is replaced with another part, the reproduced image can be changed to a random image while the entire digital hologram retains all digital content information.
  • the reconstructed image in FIG. 14C is a reconstructed image obtained after such replacement of the hologram data. Character data cannot be reproduced from a reconstructed image such as Muronko.
  • encryption technology is a technology that combines encryption and decryption.
  • a digital hologram When a digital hologram is used as an encryption medium, it must be accompanied by a decryption key that only a specific person can recover. In other words, the system must be able to decrypt without knowing the decryption key.
  • knowing the information of the exchange can return the hologram data to its original state. Wear. And then you can recover the encrypted data in perfect form.
  • the encryption and decryption methods shown here are the simplest case, but they are used as one encryption technique with the exchange parameter as the encryption key. And this technology can be used for all digital contents, not limited to two-dimensional array data represented by images.
  • the digital hologram is further encrypted and transmitted, and the receiving side decrypts the digital hologram using the decryption key.
  • a system and method for restoring document data that matches word by word has been described.
  • the technology is not limited to this, and is widely used as a digital hologram data transmission technology that does not involve encryption processing in fields that require restoration technology that transmits image data and that does not allow 1-bit errors on the receiving side. It can be used.
  • FIG. 15 shows the functional configuration of the digital hologram creation device 300
  • FIG. 16 shows the functional configuration of the digital hologram restoration device 400.
  • the digital hologram creation device 300 has almost the same configuration as the digital hologram creation device 100 shown in FIG. 8, but includes a data storage unit 31 for saving the data created by the hologram creation unit 15. It has a feature in that.
  • the digital hologram restoring device 400 has almost the same configuration as the digital hologram receiving device 200 shown in FIG. 9, but is created by the digital hologram creating device 300 and has some data storage medium. It is characterized by having a data storage section 21 'for reading and storing digital hologram data stored in the memory.
  • digital hologram data is created by the procedure shown in the flowchart of FIG. 17 and stored in the data storage unit 31.
  • This digital hologram creation procedure is almost the same as the processing procedure of the digital hologram transmitting apparatus 100 of the first embodiment shown in the flowchart of FIG. 10, except that the data storage processing is performed in step S11 '.
  • the points are different.
  • the digital hologram data created in this manner is stored on a recording medium such as a flexible disk or a magnetic storage disk, for example, as shown in FIG.
  • the data can be copied to the data storage unit 2 1 ′ of the program restoring device 400.
  • the restoration process of the original image from the digital hologram data by the digital hologram restoration device 400 is performed according to the procedure shown in the flowchart of FIG. This procedure is almost the same as the processing procedure of the digital hologram receiver 200 shown in FIG. 11, but the digital hologram data is read from the data storage unit 21 ′ in the first step S21 ′. Is passed to the decryption processing section 22.
  • the procedure from step S23 is the same as that of the flowchart of FIG.
  • the digital hologram data created by the digital hologram creation device 300 of the second embodiment can be accurately restored by the digital hologram restoration device 400 by being restored by the digital hologram restoration device 400.
  • a document file in a format in which 8-bit 1-byte character codes are assigned to each pixel, or a Japanese document file in a format in which 16-bit 2-byte character codes are assigned to every two adjacent pixels Can be used for encrypted recording and playback.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Holo Graphy (AREA)

Abstract

Dans une technologie de transmission de données codées utilisant l’holographie numérique, l’information de chaque pixel de données image d’une image est exprimée par une donnée sur 8 bits, et la donnée sur 8 bits est désassemblée en donnée des quatre bits de poids fort et celle de quatre bits de poids faible. Chacune des données des quatre bits de poids fort et des quatre bits de poids faible est transformée en une donnée de quatre bits de poids fort à laquelle une pseudo-donnée de (1000)2 est ajoutée aux quatre positions de bit de poids faible, créant ainsi un groupe de donnée sur 8 bits pour transmission. Les groupes de donnée sur 8 bits sont divisés en groupes de données pour une image et un hologramme numérique est créé pour les groupes de données d’une image pour transmission, où la donnée d’origine peut être réassemblée sans occurrence d’erreur à l’extrémité récepteur. En outre, cet hologramme numérique lui-même est utilisé en tant que donnée codée.
PCT/JP2004/007412 2004-05-24 2004-05-24 Méthode de transmission de données codées, système de transmission de données et système de réception de données utilisant l’holographie numérique WO2005114849A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP2004/007412 WO2005114849A1 (fr) 2004-05-24 2004-05-24 Méthode de transmission de données codées, système de transmission de données et système de réception de données utilisant l’holographie numérique

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2004/007412 WO2005114849A1 (fr) 2004-05-24 2004-05-24 Méthode de transmission de données codées, système de transmission de données et système de réception de données utilisant l’holographie numérique

Publications (1)

Publication Number Publication Date
WO2005114849A1 true WO2005114849A1 (fr) 2005-12-01

Family

ID=35428653

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2004/007412 WO2005114849A1 (fr) 2004-05-24 2004-05-24 Méthode de transmission de données codées, système de transmission de données et système de réception de données utilisant l’holographie numérique

Country Status (1)

Country Link
WO (1) WO2005114849A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109840874A (zh) * 2019-01-29 2019-06-04 北京印刷学院 一种数字水印认证方法及装置

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS61289732A (ja) * 1985-06-14 1986-12-19 フィリップス エレクトロニクス ネムローゼ フェンノートシャップ デ−タワ−ド伝送システム
JPH05199424A (ja) * 1992-01-17 1993-08-06 Ricoh Co Ltd 画像暗号化再生装置
JPH09252253A (ja) * 1995-08-04 1997-09-22 Sanyo Electric Co Ltd ディジタル変調方法と復調方法及びディジタル変調回路と復調回路
JP2001324911A (ja) * 2000-05-17 2001-11-22 Victor Co Of Japan Ltd 光記録媒体の情報読み取り装置、光記録媒体
JP2002268550A (ja) * 2001-03-09 2002-09-20 Seiko Instruments Inc 画像の暗号化方法及び暗号化プログラム並びに暗号化画像ファイルを格納した記録媒体
JP2003264532A (ja) * 2002-03-07 2003-09-19 Mitsubishi Electric Corp 伝送装置及び伝送方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS61289732A (ja) * 1985-06-14 1986-12-19 フィリップス エレクトロニクス ネムローゼ フェンノートシャップ デ−タワ−ド伝送システム
JPH05199424A (ja) * 1992-01-17 1993-08-06 Ricoh Co Ltd 画像暗号化再生装置
JPH09252253A (ja) * 1995-08-04 1997-09-22 Sanyo Electric Co Ltd ディジタル変調方法と復調方法及びディジタル変調回路と復調回路
JP2001324911A (ja) * 2000-05-17 2001-11-22 Victor Co Of Japan Ltd 光記録媒体の情報読み取り装置、光記録媒体
JP2002268550A (ja) * 2001-03-09 2002-09-20 Seiko Instruments Inc 画像の暗号化方法及び暗号化プログラム並びに暗号化画像ファイルを格納した記録媒体
JP2003264532A (ja) * 2002-03-07 2003-09-19 Mitsubishi Electric Corp 伝送装置及び伝送方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109840874A (zh) * 2019-01-29 2019-06-04 北京印刷学院 一种数字水印认证方法及装置
CN109840874B (zh) * 2019-01-29 2023-03-21 北京印刷学院 一种数字水印认证方法及装置

Similar Documents

Publication Publication Date Title
US11080809B2 (en) Hiding information and images via deep learning
Kim et al. Lossless data hiding for absolute moment block truncation coding using histogram modification
US7515730B2 (en) Progressive image quality control using watermarking
Bandyopadhyay et al. A novel secure image steganography method based on chaos theory in spatial domain
JP3697344B2 (ja) 画像検証装置
Li et al. A QDCT-and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram
Nguyen et al. High capacity reversible data hiding scheme for encrypted images
Muhammad et al. Reversible integer wavelet transform for blind image hiding method
Subramanian et al. End-to-end image steganography using deep convolutional autoencoders
CN113378143B (zh) 基于半张量压缩感知的加密域可逆信息隐藏与认证方法
WO2010106678A1 (fr) Programme de génération de marqueur, programme de restauration, dispositif de génération de marqueur, dispositif de restauration et procédé de génération de marqueur
Gao et al. High-capacity reversible data hiding in encrypted images based on adaptive block encoding
Chen et al. High-capacity reversible data hiding in encrypted image based on Huffman coding and differences of high nibbles of pixels
Chang et al. An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC
KR101081001B1 (ko) 진폭위상형 컴퓨터 홀로그램의 생성 및 복원방법
WO2005114849A1 (fr) Méthode de transmission de données codées, système de transmission de données et système de réception de données utilisant l’holographie numérique
Karthik et al. Image security based on rotational visual cryptography
Gao et al. Dual mode data hiding in fully encrypted images with pixel-shuffling for cloud applications
Kim et al. Dual reversible data hiding in encrypted halftone images using matrix encoding
Neetha et al. An Efficient Image Encryption Reversible Data Hiding Technique to Improve Payload and High Security in Cloud Platforms
Lin et al. A tailor-made encryption scheme for high-dynamic range images
Banu et al. Secure reversible data hiding technique on textures using double encryption
Sulfi et al. A Secure Watermarking Based Image Integrity Verification in IoMT
AV et al. CTM based Encryption in Steganoraphy
Shi et al. A reversible data hiding in encrypted image based on additive secret sharing with adaptive bit-plane prediction

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP