Indirect vision password scheme achieved with photoelectricity method

A visual cryptography and scheme technology, applied in image data processing, user identity/authority verification, instruments, etc., can solve the problems of obvious target of decrypting ciphertext, inconvenient system integration and application, and insufficient security, achieving indirectness , Improve concealment and high security

Inactive Publication Date: 2015-06-17
UNIVERSITY OF CHINESE ACADEMY OF SCIENCES
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the present invention is to overcome the deficiencies of existing visual cryptography schemes, solve the problem of obvious targetness of decrypted ciphertext in visual cryptography schemes, poor concealment, insufficient security, and encryption systems that require more auxiliary systems, which are not convenient for system integration and application, etc. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Indirect vision password scheme achieved with photoelectricity method
  • Indirect vision password scheme achieved with photoelectricity method
  • Indirect vision password scheme achieved with photoelectricity method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034]In order to better explain the implementation process of the present invention, the operation process when two sub-graphs are used will be described in detail below in conjunction with the accompanying drawings. Since the present invention is fully based on the visual cryptography scheme proposed by Moni.Naor and Adi.Shamir in 1994 (see the background introduction part of this description), the visual cryptography scheme can be composed of "(2, 2)-visual cryptography scheme" The characteristics of extending to "(k, n)-visual encryption scheme" are also fully possessed in the present invention, that is, the indirect visual encryption scheme described in the present invention can also be extended to "( k,n) - Indirect Visual Cryptography Scheme".

[0035] figure 1 It is an optical path structure diagram of implementing the decryption of pure phase information by using the photoelectric method in the indirect visual cryptographic scheme of the present invention. The optic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an indirect vision password scheme achieved with a photoelectricity method. On the basis of a vision password scheme technology, a subgraph obtained by coding is made into a corresponding subgraph pure phase plate through software; the subgraph pure phase plate is modulated into a corresponding subgraph through a spatial light modulator, the subgraph is received by a receiving unit, software is used for adding received subgraph images, and human eye decryption is carried out; or the subgraph pure phase plate is made into a dynamic graph, the spatial light modulator is used for modulating the subgraph pure phase plate into a subgraph dynamic graph which is received by the receiving unit, receiving unit exposure time is adjusted to achieve subgraph adding in an equivalent mode, and human eye decryption is carried out. The pure phase plate is used as decryption cryptograph, diffraction effect is introduced, a whole system is complete, so that invisibility is good, anti-noise capacity is high, aligning can be well achieved, meanwhile, operation is easy and convenient, the problems that the vision password scheme is poor in invisibility, and multiple application restricts exist are effectively solved, and the indirect vision password scheme can be used in the field of information encryption with high safety and system integration requirements.

Description

technical field [0001] The invention relates to a visual encryption scheme, in particular to an indirect visual encryption scheme technology based on a pure phase element, utilizing the electro-optical modulation effect of a spatial light modulator, and adopting a photoelectric method through diffraction. Background technique [0002] Visual cryptography is a technique related to image encryption. He provides a way to divide an image carrying information to be encrypted into multiple encrypted sub-images, as long as the number of sub-images specified by the rules are precisely aligned and superimposed together, without any cryptographic calculations, it can be obtained by relying on human eyes A scheme for encrypting information. [0003] The technology originally originated from the Moore phenomenon of lattices proposed by Leon Glass in 1969, see (Nature 223:578-580, 1969). The article pointed out that when a random lattice pattern is rotated at a small angle along the ce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06T1/00
Inventor 史祎诗杨秀波李拓王雅丽张骏乔亮
Owner UNIVERSITY OF CHINESE ACADEMY OF SCIENCES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products