Visual Cryptography Using Binary Amplitude-Only Holograms [Invited]

Lina Zhou, Yin Xiao, Zilan Pan, Yonggui Cao, Wen Chen
{"title":"Visual Cryptography Using Binary Amplitude-Only Holograms [Invited]","authors":"Lina Zhou, Yin Xiao, Zilan Pan, Yonggui Cao, Wen Chen","doi":"10.3389/fphot.2021.821304","DOIUrl":null,"url":null,"abstract":"Visual cryptography (VC) is developed to be a promising approach to encoding secret information using pixel expansion rules. The useful information can be directly rendered based on human vision without the usage of decryption algorithms. However, many VC schemes cannot withstand occlusion attacks. In this paper, a new VC scheme is proposed using binary amplitude-only holograms (AOHs) generated by a modified Gerchberg-Saxton algorithm (MGSA). During the encryption, a secret image is divided into a group of unrecognizable and mutually-unrelated shares, and then the generated shares are further converted to binary AOHs using the MGSA. During image extraction, binary AOHs are logically superimposed to form a stacked hologram, and then the secret image can be extracted from the stacked hologram. Different from conventional VC schemes, the proposed VC scheme converts a secret image into binary AOHs. Due to the redundancy of the generated binary AOHs, the proposed method is numerically and experimentally verified to be feasible and effective, and possesses high robustness against occlusion attacks.","PeriodicalId":73099,"journal":{"name":"Frontiers in photonics","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Frontiers in photonics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3389/fphot.2021.821304","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Visual cryptography (VC) is developed to be a promising approach to encoding secret information using pixel expansion rules. The useful information can be directly rendered based on human vision without the usage of decryption algorithms. However, many VC schemes cannot withstand occlusion attacks. In this paper, a new VC scheme is proposed using binary amplitude-only holograms (AOHs) generated by a modified Gerchberg-Saxton algorithm (MGSA). During the encryption, a secret image is divided into a group of unrecognizable and mutually-unrelated shares, and then the generated shares are further converted to binary AOHs using the MGSA. During image extraction, binary AOHs are logically superimposed to form a stacked hologram, and then the secret image can be extracted from the stacked hologram. Different from conventional VC schemes, the proposed VC scheme converts a secret image into binary AOHs. Due to the redundancy of the generated binary AOHs, the proposed method is numerically and experimentally verified to be feasible and effective, and possesses high robustness against occlusion attacks.
使用纯二进制幅度全息图的视觉密码术[特邀]
视觉密码学(VC)是一种很有前途的利用像素展开规则对秘密信息进行编码的方法。在不使用解密算法的情况下,可以基于人类视觉直接呈现有用的信息。然而,许多VC方案无法抵御遮挡攻击。本文利用改进的Gerchberg-Saxton算法(MGSA)生成的二进制纯振幅全息图(AOH),提出了一种新的VC方案。在加密过程中,将秘密图像划分为一组不可识别且相互不相关的共享,然后使用MGSA将生成的共享进一步转换为二进制AOH。在图像提取过程中,二进制AOH被逻辑叠加以形成堆叠全息图,然后可以从堆叠全息图中提取秘密图像。与传统的VC方案不同,所提出的VC方案将秘密图像转换为二进制AOH。由于生成的二进制AOH具有冗余性,该方法经过数值和实验验证是可行和有效的,并且对遮挡攻击具有很高的鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信