Abstract

Visual cryptography (VC) is developed to be a promising approach to encoding secret information using pixel expansion rules. The useful information can be directly rendered based on human vision without the usage of decryption algorithms. However, many VC schemes cannot withstand occlusion attacks. In this paper, a new VC scheme is proposed using binary amplitude-only holograms (AOHs) generated by a modified Gerchberg-Saxton algorithm (MGSA). During the encryption, a secret image is divided into a group of unrecognizable and mutually-unrelated shares, and then the generated shares are further converted to binary AOHs using the MGSA. During image extraction, binary AOHs are logically superimposed to form a stacked hologram, and then the secret image can be extracted from the stacked hologram. Different from conventional VC schemes, the proposed VC scheme converts a secret image into binary AOHs. Due to the redundancy of the generated binary AOHs, the proposed method is numerically and experimentally verified to be feasible and effective, and possesses high robustness against occlusion attacks.

Highlights

  • Information security plays an important role nowadays, and has attracted much current attention (Javidi, 1997; Alfalou and Brosseau, 2009; Chen et al, 2014)

  • We propose a new visual cryptography (VC) scheme using binary amplitude-only holograms (AOHs) with a modified GerchbergSaxton algorithm (MGSA)

  • An image can be retrieved from the stacked hologram to visually render information of the secret image

Read more

Summary

INTRODUCTION

Information security plays an important role nowadays, and has attracted much current attention (Javidi, 1997; Alfalou and Brosseau, 2009; Chen et al, 2014). Binary AOHs rather than phaseonly holograms are integrated into VC scheme to convert visual key images into binary AOHs. Figure 2 shows a schematic of the FIGURE 2 | A schematic of the designed MGSA to generate binary AOHs. A: Amplitude; P: phase; IFT: Inverse Fourier transform; FT: Fourier transform. Since the redundancy of digital holograms provides high robustness, the generated binary AOHs can be used for secret-image retrieval, e.g., under occlusion attacks (Gerritsen et al, 1968; Kreis, 2005; Schnars and Jüptner, 2005; Hwang et al, 2009; Xu et al, 2017; Xu et al, 2020; Zhou et al, 2021). An image can be retrieved from the stacked hologram to visually render information of the secret image

Simulation Results and Discussion
Experimental Results and Discussion
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call