Visual cryptography based on an interferometric encryption technique

被引:13
|
作者
Lee, SS [1 ]
Na, JC
Sohn, SW
Park, C
Seo, DH
Kim, SJ
机构
[1] ETRI, Network Secur Dept, Taejon, South Korea
[2] Kyungpook Natl Univ, Dept Elect Engn, Taegu 702701, South Korea
关键词
D O I
10.4218/etrij.02.0102.0505
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a new method for a visual cryptography scheme that uses phase masks and an interferometer. To encrypt a binary image, we divided it into an arbitrary number of slides and encrypted them. using an XOR process with a random key or keys. The phase mask for each encrypted image was fabricated under the proposed phase-assignment rule. For decryption, phase masks were placed on any path of the Mach-Zehnder interferometer. Through optical experiments, we confirmed that a secret binary image that was sliced could be recovered by the proposed method.
引用
下载
收藏
页码:373 / 380
页数:8
相关论文
共 50 条
  • [41] Halftone visual cryptography embedding a natural grayscale image based on error diffusion technique
    Myodo, Emi
    Takagi, Koichi
    Miyaji, Satoshi
    Takishima, Yasuhiro
    2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 2114 - 2117
  • [42] A Novel and Highly Secure Encryption Methodology using a Combination of AES and Visual Cryptography
    Rupanagudi, Sudhir Rao
    Bhat, Varsha G.
    Anushree, R.
    Kavitha, Y. N.
    Meghana, R.
    Srinath, Arpitha
    Pooja, J.
    Pai, Ramya R.
    Roopashree, M.
    Ramesh, Sandhya
    Anil, C.
    Anuradha, S.
    Murthy, Arpita V.
    Sridevi, S.
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 1682 - 1688
  • [43] A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud
    Ehuil, Brou Bernard
    Chen, Chen
    Wang, Shirui
    Guo, Hua
    Liu, Jianwei
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (01) : 43 - 57
  • [44] Boolean Operation Based Visual Cryptography
    Zhou, Zhili
    Yang, Ching-Nung
    Cai, Song-Ruei
    Wang, Dao-Shun
    IEEE ACCESS, 2019, 7 : 165496 - 165508
  • [45] Content based authentication of visual cryptography
    G. Wang
    W. Yan
    M. Kankanhalli
    Multimedia Tools and Applications, 2017, 76 : 9427 - 9441
  • [46] A watermark technology based on visual cryptography
    Sleit, Azzam Talal
    Abusitta, Adel
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS, 2006, : 227 - +
  • [47] Copyright protection based on visual cryptography
    Hou, YC
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: IMAGE, ACOUSTIC, SPEECH AND SIGNAL PROCESSING II, 2002, : 104 - 109
  • [48] Content based authentication of visual cryptography
    Wang, G.
    Yan, W.
    Kankanhalli, M.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (07) : 9427 - 9441
  • [49] Self Watermarking based on Visual Cryptography
    Hassan, Mahmoud A.
    Khalili, Mohammed A.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 8, 2005, 8 : 159 - 162
  • [50] A watermark technology based on visual cryptography
    Sleit, Azzam Taial
    Abusitta, Adel
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VII, PROCEEDINGS, 2006, : 502 - +