{"title":"用于凭证认证的斑点视觉加密技术","authors":"Anqing Jiao, Yupeng Zhu, Zhaoke Mi, Xinlong Zhou, Qiaofen Zhu, Changjun Ke, Yishi Shi","doi":"10.1364/AO.522918","DOIUrl":null,"url":null,"abstract":"<p><p>Based on the high random distribution characteristic of the natural speckle image, a new method of speckle visual cryptography, to the best of our knowledge, is designed by combining the natural speckle image with the secret key in visual cryptography. Specifically, we designed an authentication system for user credentials by combining speckle visual cryptography and the QR code. By using the speckle visual cryptography method, the image of the QR code carrying user authentication information is hidden in the speckle image, and the speckle image is printed on the paper credentials. Through a simulation and analog experiments, we verify the possibility of applying speckle visual cryptography to a user credentials authentication system, compare the improved grayscale reordering algorithm and grayscale reordering algorithm, and prove that the improved grayscale reordering algorithm has more advantages in this system by comparing the PSNR and SSIM. Finally, the <i>y</i>-interference ability and the uniqueness of the virtual secret key in the system are analyzed to prove that the secret key has high anti-interference ability and security.</p>","PeriodicalId":101299,"journal":{"name":"Applied optics","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Speckle visual cryptography for credential authentication.\",\"authors\":\"Anqing Jiao, Yupeng Zhu, Zhaoke Mi, Xinlong Zhou, Qiaofen Zhu, Changjun Ke, Yishi Shi\",\"doi\":\"10.1364/AO.522918\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p><p>Based on the high random distribution characteristic of the natural speckle image, a new method of speckle visual cryptography, to the best of our knowledge, is designed by combining the natural speckle image with the secret key in visual cryptography. Specifically, we designed an authentication system for user credentials by combining speckle visual cryptography and the QR code. By using the speckle visual cryptography method, the image of the QR code carrying user authentication information is hidden in the speckle image, and the speckle image is printed on the paper credentials. Through a simulation and analog experiments, we verify the possibility of applying speckle visual cryptography to a user credentials authentication system, compare the improved grayscale reordering algorithm and grayscale reordering algorithm, and prove that the improved grayscale reordering algorithm has more advantages in this system by comparing the PSNR and SSIM. Finally, the <i>y</i>-interference ability and the uniqueness of the virtual secret key in the system are analyzed to prove that the secret key has high anti-interference ability and security.</p>\",\"PeriodicalId\":101299,\"journal\":{\"name\":\"Applied optics\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Applied optics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1364/AO.522918\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Applied optics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1364/AO.522918","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Speckle visual cryptography for credential authentication.
Based on the high random distribution characteristic of the natural speckle image, a new method of speckle visual cryptography, to the best of our knowledge, is designed by combining the natural speckle image with the secret key in visual cryptography. Specifically, we designed an authentication system for user credentials by combining speckle visual cryptography and the QR code. By using the speckle visual cryptography method, the image of the QR code carrying user authentication information is hidden in the speckle image, and the speckle image is printed on the paper credentials. Through a simulation and analog experiments, we verify the possibility of applying speckle visual cryptography to a user credentials authentication system, compare the improved grayscale reordering algorithm and grayscale reordering algorithm, and prove that the improved grayscale reordering algorithm has more advantages in this system by comparing the PSNR and SSIM. Finally, the y-interference ability and the uniqueness of the virtual secret key in the system are analyzed to prove that the secret key has high anti-interference ability and security.