Visual cryptography based on an interferometric encryption technique

被引:13
|
作者
Lee, SS [1 ]
Na, JC
Sohn, SW
Park, C
Seo, DH
Kim, SJ
机构
[1] ETRI, Network Secur Dept, Taejon, South Korea
[2] Kyungpook Natl Univ, Dept Elect Engn, Taegu 702701, South Korea
关键词
D O I
10.4218/etrij.02.0102.0505
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a new method for a visual cryptography scheme that uses phase masks and an interferometer. To encrypt a binary image, we divided it into an arbitrary number of slides and encrypted them. using an XOR process with a random key or keys. The phase mask for each encrypted image was fabricated under the proposed phase-assignment rule. For decryption, phase masks were placed on any path of the Mach-Zehnder interferometer. Through optical experiments, we confirmed that a secret binary image that was sliced could be recovered by the proposed method.
引用
收藏
页码:373 / 380
页数:8
相关论文
共 50 条
  • [21] AN EFFICIENT STEGANOGRAPHY ALGORITHM USING VISUAL CRYPTOGRAPHY AND AES ENCRYPTION
    Andi, Velumurugan
    Edeswaran, Logashanmugam
    IIOAB JOURNAL, 2016, 7 (10) : 22 - 25
  • [22] A Kind of Visual Cryptography Scheme For Color Images Based on Halftone Technique
    Qiao, Wei
    Yin, Hongdong
    Liang, Huaqing
    2009 INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, VOL I, 2009, : 393 - 395
  • [23] Repeating image watermarking technique by the visual cryptography
    Wang, CC
    Tai, SC
    Yu, CS
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (08) : 1589 - 1598
  • [24] Encryption Scheme Based on Hyperelliptic Curve Cryptography
    John, Asha Liza
    Thampi, Sabu M.
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 491 - 506
  • [25] A stegano - visual cryptography technique for multimedia security
    K. Gurunathan
    S. P. Rajagopalan
    Multimedia Tools and Applications, 2020, 79 : 3893 - 3911
  • [26] The semipublic encryption for visual cryptography using Q'tron neural networks
    Yue, Tai-Wen
    Chiang, Suchen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) : 24 - 41
  • [27] Visual cryptography based watermarking
    Cimato, Stelvio
    Yang, James C. N.
    Wu, Chih-Cheng
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8363 : 91 - 109
  • [28] RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique
    Shankar, K.
    Eswaran, P.
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2016, 25 (11)
  • [29] A study on secured encryption of medical images using significant visual cryptography
    Vijayalaxmi, H. M.
    Rao, Arjun Sunil
    Khan, A. M.
    Kotyan, Deeksha
    Disha, D.
    Pratheeksha, R.
    Rao, Chinmayee
    ENGINEERING RESEARCH EXPRESS, 2024, 6 (02):
  • [30] The semipublic encryption for visual cryptography using Q'tron neural networks
    Yue, TW
    Chiang, SC
    AI 2004: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 3339 : 1253 - 1261