Visual Cryptography Based on an Interferometric Encryption Technique
Sang-Su Lee Lee,Jung-Chan Na Na,Sung-Won Sohn Sohn,Cheehang Park Park,Dong-Hoan Seo Seo,Soo-Joong Kim Kim +5 more
Reads0
Chats0
TLDR
A new method for a visual cryptography scheme that uses phase masks and an interferometer to encrypt a binary image and confirm that a secret binary image that was sliced could be recovered by the proposed method.Abstract:
This paper presents a new method for a visual cryptography scheme that uses phase masks and an interferometer. To encrypt a binary image, we divided it into an arbitrary number of slides and encrypted them using an XOR process with a random key or keys. The phase mask for each encrypted image was fabricated nuder the proposed phase-assignment rule. For decryption, phase masks were placed on any path of the Mach-Zehnder interferometer. Through optical experiments, we confirmed that a secret binary image that was sliced could be recovered by the proposed method.read more
Citations
More filters
Journal ArticleDOI
XOR-based Visual Cryptography Schemes
TL;DR: This paper investigates Threshold Visual Secret Sharing schemes associated to XOR-based VC systems, and shows that n out of n schemes with optimal resolution and contrast exist, and that (2,n) schemes are equivalent to binary codes.
Journal ArticleDOI
Progressive color visual cryptography
TL;DR: A novel technique is developed that enables visual cryptography of color as well as gray-scale images with a unique flexibility that enables a single encryption of a color image but enables three types of decryptions on the same ciphertext.
Journal ArticleDOI
Step Construction of Visual Cryptography Schemes
Feng Liu,Chuankun Wu,Xi-Jun Lin +2 more
TL;DR: This paper proposes a step construction to construct VCSOR and VCSXOR for general access structure by applying (2,2)-VCS recursively, where a participant may receive multiple share images.
Journal ArticleDOI
Perfect contrast XOR-based visual cryptography schemes via linear algebra
TL;DR: This paper puts forward constructions of perfect contrast XVCS using the linear algebraic technique without any assumptions such as participants may carry multiple shares or prior information about the shares are to be submitted during the secret reconstruction phase.
Proceedings ArticleDOI
Coverage Analysis of Handoff Algorithm with Adaptive Hysteresis Margin
Shyam Lal,Deepak Kumar Panwar +1 more
TL;DR: The coverage of a handoff algorithm with dynamic hysteresis margin, based on the distance information between the mobile station and the serving base station, is analyzed for microcellular environment.
References
More filters
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI
Optical image encryption based on input plane and Fourier plane random encoding.
Philippe Réfrégier,Bahram Javidi +1 more
TL;DR: A new optical encoding method of images for security applications is proposed and it is shown that the encoding converts the input signal to stationary white noise and that the reconstruction method is robust.
Visual Cryptography
Moni Naor,Adi Shamir +1 more
TL;DR: In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.
Journal ArticleDOI
Optical pattern recognition for validation and security verification
Bahram Javidi,Joseph L. Horner +1 more
TL;DR: Computer simulation results and tests of the proposed system are provided to verify that both the phase mask and the primary pattern are separately readable and identifiable in an optical processor or correlator.
Posted Content
On the Contrast in Visual Cryptography Schemes.
TL;DR: This paper analyzes the contrast of the reconstructed image in k out of n visual cryptography schemes and gives a complete characterization of schemes having optimal contrast and minimum pixel expansion in terms of certain balanced incomplete block designs.