Invisible Visual Cryptography
[Abstract]:We propose to realize visual cryptography in an indirect way with the help of diffractive optics, the pure-amplitude keys being substituted with the phase-only keys that are invisible for common-used intensity detectors, leading to the significantly enhanced security and improved usability for practice. Three typical realizations are provided by using static or dynamic diffractive optical elements, and the new concept of invisible visual cryptography(IVC)may be established. This concept is demonstrated by a compact opto-electronic system with only one spatial light modulator within time-delayed exposure, maintaining the fast speed of decryption and no requirement to the calculation of decryption in conventional visual cryptography. Further, IVC shows the immunity to noises and good information capacity, which is partly inherited from diffractive optics. IVC might suggest a new strategy for visual cryptography with the respective of diverse realizations, such as opto-electronic or even bio-chemical or other methods.
【作者单位】: College
【基金】:Supported by the National Natural Science Foundation of China under Grant No 61575197 the K.C.Wong Education Foundation the Fusion Foundation of Research and Education of Chinese Academy of Sciences and the Youth Innovation Promotion Association of Chinese Academy of Sciences under Grant No 2017489
【分类号】:TN918.1
【相似文献】
相关期刊论文 前10条
1 ;Experimental realization of quantum cryptography communication in free space[J];Science in China(Series G:Physics,Mechanics & Astronomy);2005年02期
2 ;Real applications of quantum communications in China[J];Chinese Science Bulletin;2009年17期
3 ;Quantum asymmetric cryptography with symmetric keys[J];Science in China(Series G:Physics,Mechanics & Astronomy);2009年12期
4 ;The organization and traffic engineering of a quantum cryptography network[J];Science China(Physics,Mechanics & Astronomy);2012年09期
5 ;Field experiment on a robust hierarchical metropolitan quantum cryptography network[J];Chinese Science Bulletin;2009年17期
6 ;Research on Applications of Cryptography for Multi-Mobile Agent System[J];The Journal of China Universities of Posts and Telecommunications;2004年04期
7 ;Secure and efficient elliptic curve cryptography resists side-channel attacks[J];Journal of Systems Engineering and Electronics;2009年03期
8 张盛;王剑;唐朝京;;Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability[J];Chinese Physics B;2012年06期
9 ;An Efficient Two-Party Key Exchange Protocol with Strong Security[J];Wuhan University Journal of Natural Sciences;2010年03期
10 Hamid Reza AHMADI;Ali AFZALI-KUSHA;;A low-power and low-energy flexible GF(p) elliptic-curve cryptography processor[J];Journal of Zhejiang University-Science C(Computer & Electronics);2010年09期
相关会议论文 前3条
1 ;Families of distance measures for quantum states[A];中国电子学会第十五届信息论学术年会暨第一届全国网络编码学术年会论文集(上册)[C];2008年
2 ;Networks Documents Security using Combined Cryptography[A];第六届全国计算机应用联合学术会议论文集[C];2002年
3 ;High speed (10-40 Gb/s) electroabsorption modulator integrated devices for fiber communications[A];Proceedings of the Eighth Chinese Optoelectronics Symposium[C];2006年
,本文编号:2475871
本文链接:https://www.wllwen.com/kejilunwen/xinxigongchenglunwen/2475871.html