Visual cryptography based on an interferometric encryption technique

被引:13
|
作者
Lee, SS [1 ]
Na, JC
Sohn, SW
Park, C
Seo, DH
Kim, SJ
机构
[1] ETRI, Network Secur Dept, Taejon, South Korea
[2] Kyungpook Natl Univ, Dept Elect Engn, Taegu 702701, South Korea
关键词
D O I
10.4218/etrij.02.0102.0505
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a new method for a visual cryptography scheme that uses phase masks and an interferometer. To encrypt a binary image, we divided it into an arbitrary number of slides and encrypted them. using an XOR process with a random key or keys. The phase mask for each encrypted image was fabricated under the proposed phase-assignment rule. For decryption, phase masks were placed on any path of the Mach-Zehnder interferometer. Through optical experiments, we confirmed that a secret binary image that was sliced could be recovered by the proposed method.
引用
下载
收藏
页码:373 / 380
页数:8
相关论文
共 50 条
  • [31] A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme
    Lakshmeeswari, G.
    Lakshmi, D. Rajya
    Srinivas, Y.
    Bindu, G. Hima
    ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, VOL 2, 2013, 177 : 511 - 520
  • [32] A novel cellular automata based technique for visual multimedia content encryption
    Chatzichristofis, Savvas A.
    Mitzias, Dimitris A.
    Sirakoulis, Georgios Ch.
    Boutalis, Yiannis S.
    OPTICS COMMUNICATIONS, 2010, 283 (21) : 4250 - 4260
  • [33] Image encryption based on nonlinear encryption system and public-key cryptography
    Zhao, Tieyu
    Ran, Qiwen
    Chi, Yingying
    OPTICS COMMUNICATIONS, 2015, 338 : 64 - 72
  • [34] Color image encryption using DNA based cryptography
    Nandy N.
    Banerjee D.
    Pradhan C.
    International Journal of Information Technology, 2021, 13 (2) : 533 - 540
  • [35] Homomorphic Encryption Based on Post-Quantum Cryptography
    Chen, Abel C. H.
    2023 IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLIED NETWORK TECHNOLOGIES, ICMLANT, 2023, : 56 - 60
  • [36] A stegano-visual cryptography technique for multimedia security
    Gurunathan, K.
    Rajagopalan, P.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (5-6) : 3893 - 3911
  • [37] Quantum Cryptography Based Biometric Encryption for Network Security
    Rani, Anju
    Lal, Avanindra Kumar
    Sharma, Shalini
    Banda, Latha
    Pandit, Amit Kant
    2013 INTERNATIONAL CONFERENCE ON MACHINE INTELLIGENCE AND RESEARCH ADVANCEMENT (ICMIRA 2013), 2013, : 63 - 67
  • [38] A (2, 2) Visual Cryptography Technique with Improved Contrast
    Bhosale, Akshay Gajanan
    Patil, Vikram Shripati
    INFORMATION SECURITY JOURNAL, 2020, 29 (04): : 199 - 208
  • [39] Visual Cryptography Secret Share Creation Techniques with Multiple Image Encryption and Decryption Using Elliptic Curve Cryptography
    Karolin, M.
    Meyyappan, T.
    IETE JOURNAL OF RESEARCH, 2024, 70 (02) : 1638 - 1645
  • [40] A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud
    Brou Bernard Ehui
    Chen CHEN
    Shirui WANG
    Hua GUO
    Jianwei LIU
    Chinese Journal of Electronics, 2024, 33 (01) : 43 - 57