Visual Cryptography Using Binary Amplitude-Only Holograms
نویسندگان
چکیده
Visual cryptography (VC) is developed to be a promising approach encoding secret information using pixel expansion rules. The useful can directly rendered based on human vision without the usage of decryption algorithms. However, many VC schemes cannot withstand occlusion attacks. In this paper, new scheme proposed binary amplitude-only holograms (AOHs) generated by modified Gerchberg-Saxton algorithm (MGSA). During encryption, image divided into group unrecognizable and mutually-unrelated shares, then shares are further converted AOHs MGSA. extraction, logically superimposed form stacked hologram, extracted from hologram. Different conventional schemes, converts AOHs. Due redundancy AOHs, method numerically experimentally verified feasible effective, possesses high robustness against
منابع مشابه
Control of broadband optically generated ultrasound pulses using binary amplitude holograms.
In this work, the use of binary amplitude holography is investigated as a mechanism to focus broadband acoustic pulses generated by high peak-power pulsed lasers. Two algorithms are described for the calculation of the binary holograms; one using ray-tracing, and one using an optimization based on direct binary search. It is shown using numerical simulations that when a binary amplitude hologra...
متن کاملTraceable interferometry using binary reconfigurable holograms.
We describe the characterization of a ferroelectric-liquid-crystal-on-silicon (FLCOS) spatial light modulator (SLM) in the production of holograms for use in interferometric metrology. It has already been shown that such a device can be used in producing small-amplitude arbitrary reference surfaces with small but appreciable errors due to the contaminating effect of higher-order structures bein...
متن کاملImage Authentication using Visual Cryptography
This report gives a novel technique of image encryption and authentication by combining elements of Visual Cryptography and Public Key Cryptography. A prominent attack involving generation of fake shares to cheat honest users has been described and a demonstration of the proposed system employing a centralised server to generate shares and authenticate them on the basis of requests is made as a...
متن کاملVisual Cryptography Using Color Images
Information security has become a major issue as information technology is ruling the world. Cryptography using mathematical techniques is providing information security but requires complex algorithms, intensive mathematical computations and efficient computational resources. To avoid such intensive and complex algorithms a new scheme known as Visual cryptography (VC) was introduced by Naor an...
متن کاملBasic Visual Cryptography Using Braille
As a significant part of information security, Visual Cryptography (VC) is a secret sharing approach which has the advantage of effectively obscuring hints of original secret. In VC, a secret image is separated into partitions which are also known as VC shares. The secret is only able to be revealed by superimposing certain shares. Since Basic VC is in a structure which is similar to that of Br...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Frontiers in photonics
سال: 2022
ISSN: ['2673-6853']
DOI: https://doi.org/10.3389/fphot.2021.821304