scispace - formally typeset
Open AccessJournal ArticleDOI

Visual Cryptography Based on an Interferometric Encryption Technique

Reads0
Chats0
TLDR
A new method for a visual cryptography scheme that uses phase masks and an interferometer to encrypt a binary image and confirm that a secret binary image that was sliced could be recovered by the proposed method.
Abstract
This paper presents a new method for a visual cryptography scheme that uses phase masks and an interferometer. To encrypt a binary image, we divided it into an arbitrary number of slides and encrypted them using an XOR process with a random key or keys. The phase mask for each encrypted image was fabricated nuder the proposed phase-assignment rule. For decryption, phase masks were placed on any path of the Mach-Zehnder interferometer. Through optical experiments, we confirmed that a secret binary image that was sliced could be recovered by the proposed method.

read more

Citations
More filters
Journal ArticleDOI

XOR-based Visual Cryptography Schemes

TL;DR: This paper investigates Threshold Visual Secret Sharing schemes associated to XOR-based VC systems, and shows that n out of n schemes with optimal resolution and contrast exist, and that (2,n) schemes are equivalent to binary codes.
Journal ArticleDOI

Progressive color visual cryptography

TL;DR: A novel technique is developed that enables visual cryptography of color as well as gray-scale images with a unique flexibility that enables a single encryption of a color image but enables three types of decryptions on the same ciphertext.
Journal ArticleDOI

Step Construction of Visual Cryptography Schemes

TL;DR: This paper proposes a step construction to construct VCSOR and VCSXOR for general access structure by applying (2,2)-VCS recursively, where a participant may receive multiple share images.
Journal ArticleDOI

Perfect contrast XOR-based visual cryptography schemes via linear algebra

TL;DR: This paper puts forward constructions of perfect contrast XVCS using the linear algebraic technique without any assumptions such as participants may carry multiple shares or prior information about the shares are to be submitted during the secret reconstruction phase.
Proceedings ArticleDOI

Coverage Analysis of Handoff Algorithm with Adaptive Hysteresis Margin

TL;DR: The coverage of a handoff algorithm with dynamic hysteresis margin, based on the distance information between the mobile station and the serving base station, is analyzed for microcellular environment.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI

Optical image encryption based on input plane and Fourier plane random encoding.

TL;DR: A new optical encoding method of images for security applications is proposed and it is shown that the encoding converts the input signal to stationary white noise and that the reconstruction method is robust.

Visual Cryptography

Moni Naor, +1 more
TL;DR: In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.
Journal ArticleDOI

Optical pattern recognition for validation and security verification

TL;DR: Computer simulation results and tests of the proposed system are provided to verify that both the phase mask and the primary pattern are separately readable and identifiable in an optical processor or correlator.
Posted Content

On the Contrast in Visual Cryptography Schemes.

TL;DR: This paper analyzes the contrast of the reconstructed image in k out of n visual cryptography schemes and gives a complete characterization of schemes having optimal contrast and minimum pixel expansion in terms of certain balanced incomplete block designs.
Related Papers (5)