Visual Cryptography Using Binary Amplitude-Only Holograms

نویسندگان

چکیده

Visual cryptography (VC) is developed to be a promising approach encoding secret information using pixel expansion rules. The useful can directly rendered based on human vision without the usage of decryption algorithms. However, many VC schemes cannot withstand occlusion attacks. In this paper, new scheme proposed binary amplitude-only holograms (AOHs) generated by modified Gerchberg-Saxton algorithm (MGSA). During encryption, image divided into group unrecognizable and mutually-unrelated shares, then shares are further converted AOHs MGSA. extraction, logically superimposed form stacked hologram, extracted from hologram. Different conventional schemes, converts AOHs. Due redundancy AOHs, method numerically experimentally verified feasible effective, possesses high robustness against

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Control of broadband optically generated ultrasound pulses using binary amplitude holograms.

In this work, the use of binary amplitude holography is investigated as a mechanism to focus broadband acoustic pulses generated by high peak-power pulsed lasers. Two algorithms are described for the calculation of the binary holograms; one using ray-tracing, and one using an optimization based on direct binary search. It is shown using numerical simulations that when a binary amplitude hologra...

متن کامل

Traceable interferometry using binary reconfigurable holograms.

We describe the characterization of a ferroelectric-liquid-crystal-on-silicon (FLCOS) spatial light modulator (SLM) in the production of holograms for use in interferometric metrology. It has already been shown that such a device can be used in producing small-amplitude arbitrary reference surfaces with small but appreciable errors due to the contaminating effect of higher-order structures bein...

متن کامل

Image Authentication using Visual Cryptography

This report gives a novel technique of image encryption and authentication by combining elements of Visual Cryptography and Public Key Cryptography. A prominent attack involving generation of fake shares to cheat honest users has been described and a demonstration of the proposed system employing a centralised server to generate shares and authenticate them on the basis of requests is made as a...

متن کامل

Visual Cryptography Using Color Images

Information security has become a major issue as information technology is ruling the world. Cryptography using mathematical techniques is providing information security but requires complex algorithms, intensive mathematical computations and efficient computational resources. To avoid such intensive and complex algorithms a new scheme known as Visual cryptography (VC) was introduced by Naor an...

متن کامل

Basic Visual Cryptography Using Braille

As a significant part of information security, Visual Cryptography (VC) is a secret sharing approach which has the advantage of effectively obscuring hints of original secret. In VC, a secret image is separated into partitions which are also known as VC shares. The secret is only able to be revealed by superimposing certain shares. Since Basic VC is in a structure which is similar to that of Br...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Frontiers in photonics

سال: 2022

ISSN: ['2673-6853']

DOI: https://doi.org/10.3389/fphot.2021.821304