Encryption of optical image using BCGH and visual cryptography

被引:0
|
作者
Yi, SY
Ryu, CS
Kim, DG
Lee, SH
机构
关键词
computer generated hologram; visual cryptography; image encryption;
D O I
10.1117/12.354746
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The thresholding scheme in which a person can decode the encrypted data with an important information in the agreement of other members has been extended to the visual data by visual cryptography. But with the limitation of visual cryptography in the representation of information, some problem is encountered in application, This paper proposes a method to overcome the problem by introducing an optical technique to the visual cryptography.
引用
收藏
页码:276 / 277
页数:2
相关论文
共 50 条
  • [21] Multiple Secret Image Communication Using Visual Cryptography
    A. John Blesswin
    G. Selva Mary
    S. Manoj Kumar
    [J]. Wireless Personal Communications, 2022, 122 : 3085 - 3103
  • [22] Chaos-Based Medical Image Encryption Using Symmetric Cryptography
    Ashtiyani, Meghdad
    Birgani, Parmida Moradi
    Hosseini, Hesam M.
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2633 - +
  • [23] Multiple Secret Image Communication Using Visual Cryptography
    Blesswin, A. John
    Mary, G. Selva
    Kumar, S. Manoj
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (04) : 3085 - 3103
  • [24] Chaos-Based Cryptography: Text Encryption Using Image Algorithms
    Lawnik, Marcin
    Moysis, Lazaros
    Volos, Christos
    [J]. ELECTRONICS, 2022, 11 (19)
  • [25] Visual cryptography based on an interferometric encryption technique
    Lee, SS
    Na, JC
    Sohn, SW
    Park, C
    Seo, DH
    Kim, SJ
    [J]. ETRI JOURNAL, 2002, 24 (05) : 373 - 380
  • [26] Visual Cryptography for Image Privacy protection using Diverse Image media
    Rao, Jyoti
    Patil, Vikram
    [J]. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, : 855 - 859
  • [27] JPEG Image Encryption with Elliptic Curve Cryptography
    Bakhtiari, Saeid
    Ibrahim, Subariah
    Salleh, Mazleena
    Bakhtiari, Majid
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 144 - 149
  • [28] Optical image encryption using an optimally designed encryption key
    Nomura, T
    Javidi, B
    Mikan, S
    Morimoto, Y
    [J]. CLEO(R)/PACIFIC RIM 2001, VOL II, TECHNICAL DIGEST, 2001, : 492 - 493
  • [29] Secret Sharing using 3 level DWT method of Image Steganography based on Lorenz Chaotic Encryption and Visual Cryptography
    Banik, Barnali Gupta
    Bandyopadhyay, Samir Kumar
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1147 - 1152
  • [30] Classical and Quantum Cryptography for Image Encryption & Decryption
    Pawar, Harshad R.
    Harkut, Dinesh G.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN INTELLIGENT AND COMPUTING IN ENGINEERING (RICE III), 2018,