Visual cryptography based on an interferometric encryption technique

被引:13
|
作者
Lee, SS [1 ]
Na, JC
Sohn, SW
Park, C
Seo, DH
Kim, SJ
机构
[1] ETRI, Network Secur Dept, Taejon, South Korea
[2] Kyungpook Natl Univ, Dept Elect Engn, Taegu 702701, South Korea
关键词
D O I
10.4218/etrij.02.0102.0505
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a new method for a visual cryptography scheme that uses phase masks and an interferometer. To encrypt a binary image, we divided it into an arbitrary number of slides and encrypted them. using an XOR process with a random key or keys. The phase mask for each encrypted image was fabricated under the proposed phase-assignment rule. For decryption, phase masks were placed on any path of the Mach-Zehnder interferometer. Through optical experiments, we confirmed that a secret binary image that was sliced could be recovered by the proposed method.
引用
下载
收藏
页码:373 / 380
页数:8
相关论文
共 50 条
  • [1] Visual cryptography based on optical interference encryption technique
    Seo, DH
    Kim, JY
    Lee, SS
    PHOTONIC AND QUANTUM TECHNOLOGIES FOR AEROSPACE APPLICATIONS III, 2001, 4386 : 172 - 180
  • [2] A Watermarking Technique based on Visual Cryptography
    Surekha, B.
    Swamy, G. N.
    Rao, K. Srinivasa
    Kumar, A. Ravi
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 470 - 473
  • [3] Feature Based Encryption Technique For Securing Forensic Biometric Image Data Using AES and Visual Cryptography
    Kester, Quist-Aphetsi
    Nana, Laurent
    Pascu, Anca Christine
    Gire, Sophie
    Eghan, J. M.
    Quaynor, Nii Narku
    2014 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION, 2014, : 199 - 204
  • [4] An information hiding technique based on visual cryptography
    Chen, Te-Yu
    Ou, Hsia-Hung
    Yang, Yong -Jay
    Tseng, Jing-Hang
    WMSCI 2011: 15TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, 2011, : 249 - 253
  • [5] Feature Based Encryption Technique for Securing Digital Image Data Based on FCA-Image Attributes and Visual Cryptography
    Kester, Quist-Aphetsi
    Pascu, Anca Christine
    Nana, Laurent
    Gire, Sophie
    Eghan, Jojo M.
    Quaynor, Nii Narku
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT IV, 2015, 9158 : 712 - 724
  • [6] Video Encryption by Using Visual Cryptography Based on Wang's Scheme
    Munir, Rinaldi
    Harlili
    2018 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND SYSTEM ENGINEERING (ICEESE), 2018, : 17 - 22
  • [7] Encryption Based on Neural Cryptography
    Pattanayak, Sayantica
    Ludwig, Simone A.
    HYBRID INTELLIGENT SYSTEMS, HIS 2017, 2018, 734 : 321 - 330
  • [8] Designing of Encryption Algorithm Based on Visual Cryptography and Linear Feedback Shift Register
    Rani, Septia
    ADVANCED SCIENCE LETTERS, 2018, 24 (01) : 668 - 672
  • [9] An Anti-Cheating Visual Cryptography Scheme Based on Chaotic Encryption System
    Han, Yanyan
    Xu, Zhuolin
    Ge, Xiaonan
    He, Wencai
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED MECHANICS, MECHATRONICS AND INTELLIGENT SYSTEMS (AMMIS2015), 2016, : 581 - 587
  • [10] Evaluation of correlation in optical encryption by using visual cryptography
    Yi, SY
    Ryu, CS
    Ryu, DH
    Lee, SH
    OPTICAL PATTERN RECOGNITION XII, 2001, 4387 : 238 - 246