-
Recent years, with the rapid development of information technology, the information security has received more and more attention. A variety of encryption methods to protect the information have been reported. Visual cryptography is one of the encryption methods, which has highly security because of its threshold feature. And the cryptographic information can be explained by a naked eye in the decryption process. In the application of visual cryptography, however, each shared image is limited to transparency films and overlapping on computer. In our previous work, we proposed the scheme of invisible visual cryptography and developed the visual-cryptography-based optical hiding system (VCOH), which transformed the conventional visual cryptography shares into diffraction optical elements (DOEs). It not only increases the application range of visual cryptography, but also enhances security. In this paper, we propose an optical information hiding system based on the extended visual cryptography, which inherits the concept of invisible visual cryptography. In contrast to our previous work, the method proposed in this work can hide a meaningful image instead of text messages. Meanwhile, the capacity and imperceptibility of the method are greatly increased. The hiding process of the system contains two steps. Firstly, the secret image is converted into meaningful shares through the extended visual cryptography algorithm. Secondly, the meaningful shares are able to hide in phase-keys through an iterative phase retrieval algorithm, such as Gerchberg-Saxton algorithm and Yang-Gu iterative algorithm. Then the phase-keys can be made into diffraction optical elements (DOEs) to store and transport in a physical way. In the decryption process, DOEs are illuminated with the laser beam to reconstruct the meaningful shares. The secret image can be explained by the direct overlapping of the reconstructed shares without any optical or cryptographic knowledge. The simulation and optical experimental results show that the proposed method has good performance of security and validate the feasibility of the proposed method. Besides, in this paper the robustness and security issues are also analyzed. This system has a high security because of its indistinguishability under adaptive chosen ciphertext attack (IND-CCA2) security. Additionally, this system is relatively less robust than the VCOH because it shares meaningful images with highly complex and detailed structures.
-
Keywords:
- optical hiding /
- extended visual cryptography /
- Fourier optics /
- phase-only keys
[1] Khan M, Shah T 2014 3 D Res. 5 29Google Scholar
[2] Chen W, Javidi B, Chen X D 2014 Adv. Opt. Photonics 6 120Google Scholar
[3] Liu S, Guo C L, Sheridan J T 2014 Opt. Laser Technol. 57 327Google Scholar
[4] Shi Y S, Situ G H, Zhang J J 2007 Opt. Lett. 32 1914Google Scholar
[5] Shi Y S, Situ G H, Zhang J J 2008 Opt. Lett. 33 542Google Scholar
[6] 杨玉花, 史祎诗, 王雅丽, 肖俊, 张静娟 2011 60 034202Google Scholar
Yang Y H, Shi Y S, Wang Y L, Xiao J, Zhang J J 2011 Acta Phys. Sin. 60 034202Google Scholar
[7] Shi Y S, Li T, Wang Y L, Gao Q K, Zhang S G, Li H F 2013 Opt. Lett. 38 1425Google Scholar
[8] Gao Q H, Wang Y L, Li T, Shi Y S 2014 Appl. Optics 53 4700Google Scholar
[9] 刘祥磊, 潘泽, 王雅丽, 史祎诗 2015 64 234201Google Scholar
Liu X L, Pan Z, Wang Y L, Shi Y S 2015 Acta Phys. Sin. 64 234201Google Scholar
[10] Chanana A, Paulsen A, Guruswamy S, Nahata A 2016 Optica 3 1466Google Scholar
[11] Xu W H, Xu H F, Luo Y, Li T, Shi Y S 2016 Opt. Express 24 27922Google Scholar
[12] 姚丽莉, 袁操今, 强俊杰, 冯少彤, 聂守平 2016 65 214203Google Scholar
Yao L L, Yuan C J, Qiang J J, Feng S T, Nie S P 2016 Acta Phys. Sin. 65 214203Google Scholar
[13] Kong D Z, Shen X J, Cao L C, Jin G F 2017 Appl. Opt. 56 3449Google Scholar
[14] Xu F H, Shulkind G, Thrampoulidis C, Shapiro J H, Torralba A, Wong F N C, Wornell Gr W 2018 Opt. Express 26 9945Google Scholar
[15] Zhang L H, Yuan X, Zhang D W, Chen J 2018 Curr. Opt. Photon. 2 315
[16] 席思星, 于娜娜, 王晓雷, 朱巧芬, 董昭, 王微, 刘秀红, 王华英 2019 68 110502Google Scholar
Xi S X, Yu N N, Wang X L, Zhu Q F, Dong Z, Wang W, Liu X H, Wang H Y 2019 Acta Phys. Sin. 68 110502Google Scholar
[17] 王雪光, 李明, 于娜娜, 席思星, 王晓雷, 郎利影 2019 68 240503Google Scholar
Wang X G, Li M, Yu N N, Xi S X, Wang X L, Lang L Y 2019 Acta Phys. Sin. 68 240503Google Scholar
[18] Naor M, Shamir M 1994 Lect. Notes Comput. Sci. 950 1Google Scholar
[19] Blundo C, Bonis A D, Santis A D 2001 Designs Codes Cryptogr. 24 255Google Scholar
[20] Cimato S, Santis A D, Ferrara A L, Masucci B 2005 Inf. Process. Lett. 93 199Google Scholar
[21] Blundo C, Santis A D, Naor M 2000 Inf. Proc. Lett. 75 255Google Scholar
[22] Lin C C, Tsai W H 2003 Pattern Recognit. Lett. 24 349Google Scholar
[23] Lukac R, Plataniotis K N 2005 Pattern Recognit. 38 767Google Scholar
[24] Hou Y C 2003 Pattern Recognit. 36 1619Google Scholar
[25] Yamamoto H, Hayasaki Y, Nishida N 2004 Opt. Express 12 1258Google Scholar
[26] Machizaud J, Fournel T 2012 Opt. Express 20 22847Google Scholar
[27] Wu H C, Chang C C 2005 Comput. Stand. Interfaces 28 123Google Scholar
[28] Feng J B, Wu H C, Tsai C S, Chang Y F, Chu Y P 2008 Pattern Recognit. 41 3572Google Scholar
[29] Mishra A, Gupta A 2018 J. Inf. and Optim. Sci. 39 631
[30] Blundo C, Cimato S, Santis A D 2006 Theor. Comput. Sci. 369 169Google Scholar
[31] Chen Y F, Chan Y K, Huang C C, Tsai M H, Chu Y P 2007 Inf. Sci. 177 4696Google Scholar
[32] Shi Y S, Yang X B 2017 J. Opt. 19 115703Google Scholar
[33] Shi Y S, Yang X B 2017 Chin. Phys. Lett. 34 114204Google Scholar
[34] Yang N, Gao Q K, Shi Y S 2018 Opt. Express 26 31995Google Scholar
[35] Li Z F, Dong G Y, Yang D Y, Li G L, Shi Y S, Bi K, Zhou J 2019 Opt. Express 27 19212Google Scholar
[36] Ateniese G, Blundo C, Santis A D, Stinson D R 2001 Theor. Comput. Sci. 250 143Google Scholar
[37] Gerchberg R W, Saxton W O 1972 Optik 35 237
[38] 杨国桢, 顾本源 1981 30 410Google Scholar
Yang G Z, Gu B Y 1981 Acta Phys. Sin. 30 410Google Scholar
-
图 6 (a), (b)分享图像的掩饰图像; (c)秘密信息; (d), (e)编码后的分享图像; (f) (d), (e)叠加后的秘密信息; (g), (h)隐藏了分享图像的相位密钥; (i), (j)利用(g), (h)再现的分享图像; (k) (i), (j)非相干叠加后提取的秘密信息
Fig. 6. (a), (b) The original images of shares; (c) the secret image; (d), (e) the shares; (f) the secret images decrypted by stacked (d), (e) together; (g), (h) the phase keys; (i), (j) the reconstructed shares using (g), (h); (k) the recover secret images by stacking (i), (j) together
图 8 (a), (b)分享图像; (c) (a), (b)叠加后的秘密信息; (d), (e)隐藏了分享图像的相位密钥; (f), (g) CCD相机采集到的再现后分享图像; (h)非相干叠加后的秘密信息
Fig. 8. (a), (b) The shares, (c) the secret images decrypted by stacked (a), (b) together; (d), (e) the phase keys; (f), (g) the reconstructed shares that were taken with a CCD camera; (h) the recover secret images by stacking (f), (g) together
-
[1] Khan M, Shah T 2014 3 D Res. 5 29Google Scholar
[2] Chen W, Javidi B, Chen X D 2014 Adv. Opt. Photonics 6 120Google Scholar
[3] Liu S, Guo C L, Sheridan J T 2014 Opt. Laser Technol. 57 327Google Scholar
[4] Shi Y S, Situ G H, Zhang J J 2007 Opt. Lett. 32 1914Google Scholar
[5] Shi Y S, Situ G H, Zhang J J 2008 Opt. Lett. 33 542Google Scholar
[6] 杨玉花, 史祎诗, 王雅丽, 肖俊, 张静娟 2011 60 034202Google Scholar
Yang Y H, Shi Y S, Wang Y L, Xiao J, Zhang J J 2011 Acta Phys. Sin. 60 034202Google Scholar
[7] Shi Y S, Li T, Wang Y L, Gao Q K, Zhang S G, Li H F 2013 Opt. Lett. 38 1425Google Scholar
[8] Gao Q H, Wang Y L, Li T, Shi Y S 2014 Appl. Optics 53 4700Google Scholar
[9] 刘祥磊, 潘泽, 王雅丽, 史祎诗 2015 64 234201Google Scholar
Liu X L, Pan Z, Wang Y L, Shi Y S 2015 Acta Phys. Sin. 64 234201Google Scholar
[10] Chanana A, Paulsen A, Guruswamy S, Nahata A 2016 Optica 3 1466Google Scholar
[11] Xu W H, Xu H F, Luo Y, Li T, Shi Y S 2016 Opt. Express 24 27922Google Scholar
[12] 姚丽莉, 袁操今, 强俊杰, 冯少彤, 聂守平 2016 65 214203Google Scholar
Yao L L, Yuan C J, Qiang J J, Feng S T, Nie S P 2016 Acta Phys. Sin. 65 214203Google Scholar
[13] Kong D Z, Shen X J, Cao L C, Jin G F 2017 Appl. Opt. 56 3449Google Scholar
[14] Xu F H, Shulkind G, Thrampoulidis C, Shapiro J H, Torralba A, Wong F N C, Wornell Gr W 2018 Opt. Express 26 9945Google Scholar
[15] Zhang L H, Yuan X, Zhang D W, Chen J 2018 Curr. Opt. Photon. 2 315
[16] 席思星, 于娜娜, 王晓雷, 朱巧芬, 董昭, 王微, 刘秀红, 王华英 2019 68 110502Google Scholar
Xi S X, Yu N N, Wang X L, Zhu Q F, Dong Z, Wang W, Liu X H, Wang H Y 2019 Acta Phys. Sin. 68 110502Google Scholar
[17] 王雪光, 李明, 于娜娜, 席思星, 王晓雷, 郎利影 2019 68 240503Google Scholar
Wang X G, Li M, Yu N N, Xi S X, Wang X L, Lang L Y 2019 Acta Phys. Sin. 68 240503Google Scholar
[18] Naor M, Shamir M 1994 Lect. Notes Comput. Sci. 950 1Google Scholar
[19] Blundo C, Bonis A D, Santis A D 2001 Designs Codes Cryptogr. 24 255Google Scholar
[20] Cimato S, Santis A D, Ferrara A L, Masucci B 2005 Inf. Process. Lett. 93 199Google Scholar
[21] Blundo C, Santis A D, Naor M 2000 Inf. Proc. Lett. 75 255Google Scholar
[22] Lin C C, Tsai W H 2003 Pattern Recognit. Lett. 24 349Google Scholar
[23] Lukac R, Plataniotis K N 2005 Pattern Recognit. 38 767Google Scholar
[24] Hou Y C 2003 Pattern Recognit. 36 1619Google Scholar
[25] Yamamoto H, Hayasaki Y, Nishida N 2004 Opt. Express 12 1258Google Scholar
[26] Machizaud J, Fournel T 2012 Opt. Express 20 22847Google Scholar
[27] Wu H C, Chang C C 2005 Comput. Stand. Interfaces 28 123Google Scholar
[28] Feng J B, Wu H C, Tsai C S, Chang Y F, Chu Y P 2008 Pattern Recognit. 41 3572Google Scholar
[29] Mishra A, Gupta A 2018 J. Inf. and Optim. Sci. 39 631
[30] Blundo C, Cimato S, Santis A D 2006 Theor. Comput. Sci. 369 169Google Scholar
[31] Chen Y F, Chan Y K, Huang C C, Tsai M H, Chu Y P 2007 Inf. Sci. 177 4696Google Scholar
[32] Shi Y S, Yang X B 2017 J. Opt. 19 115703Google Scholar
[33] Shi Y S, Yang X B 2017 Chin. Phys. Lett. 34 114204Google Scholar
[34] Yang N, Gao Q K, Shi Y S 2018 Opt. Express 26 31995Google Scholar
[35] Li Z F, Dong G Y, Yang D Y, Li G L, Shi Y S, Bi K, Zhou J 2019 Opt. Express 27 19212Google Scholar
[36] Ateniese G, Blundo C, Santis A D, Stinson D R 2001 Theor. Comput. Sci. 250 143Google Scholar
[37] Gerchberg R W, Saxton W O 1972 Optik 35 237
[38] 杨国桢, 顾本源 1981 30 410Google Scholar
Yang G Z, Gu B Y 1981 Acta Phys. Sin. 30 410Google Scholar
计量
- 文章访问数: 7362
- PDF下载量: 114
- 被引次数: 0