|国家科技期刊平台
首页|期刊导航|物理学报|基于光学隐藏视觉密码的欺骗追踪系统

基于光学隐藏视觉密码的欺骗追踪系统OA北大核心CSTPCD

Optical-hidden-visual-cryptography-based spoofing tracking system

中文摘要英文摘要

提出了一种基于光学隐藏视觉密码的欺骗追踪系统.该系统将秘密图像分解为多幅有实际意义的掩饰图像,将其中一张掩饰图像嵌入脆弱水印,作为检验密钥,检验密钥单独传输.然后将其余掩饰图像隐藏在相位密钥中,进行传输时有很好的不可见性.掩饰图像的像素排列若被不诚实的参与者篡改,则称为欺骗图像.将每张相位密钥分发给不同的参与者,以保证在追踪到欺骗图像时可找到对应的欺骗者.在提取过程中,只需要对该相位密钥进行傅里叶变换,即可得到掩饰图像.检验时,将检验密钥与任一掩饰图像进行非相干叠加,以是否出现验证图像为条件,就可检验掩饰图像是否被篡改,以达到欺骗追踪的目的,将数量大于等于门限k的掩饰图像和检验密钥进行非相干叠加即可得到秘密图像,仿真实验结果表明,该系统可应用于利用不可见视觉密码术传递实际信息时,对内部欺骗者的追踪.

A deception tracking system based on optical hidden visual code is proposed.The system uses visual cryptography to decompose the secret image into a number of realistic masked images,which can be used to conceal the secret information.One of the masked images is embedded with a fragile watermark to ensure that it is not modified.This image serves as an inspection key to verify the other images,and the inspection key is transmitted separately.The rest of the camouflaged image is hidden in the phase key using the phase recovery algorithm,which ensures good invisibility during transmission.If the pixel arrangement of the masked image is tampered with by a dishonest participant,it is called a fraudulent image.Each phase key is distributed to different participants to ensure that the corresponding deceiver can be identified when the spoofing image is traced.In the extraction process,only the diffraction transformation of the phase key is needed to obtain the mask image.During the inspection,the inspection key is incoherently superimposed with any masked image,and the appearance of the verification image indicates whether the masked image has been tampered with,thereby achieving the purpose of deception tracking.The secret image can be obtained by incoherently superimposing the masking images,provided that the number of superimposed masking images is is greater than or equal to the threshold k,along with the inspection key.When the inspection key is superimposed with any masked image,if there is a spoofed image,no verification image will appear,and as a result,the secret image will not be restored.If there is no spoofed image,the verification image will appear,indicating that the secret image can be restored by covering all the images.The system can be used to track internal fraudsters when actual information is transmitted through invisible visual cryptography.

吴承哲;刘睿泽;史祎诗

河北工程大学数理科学与工程学院,邯郸 056038中国科学院大学光电学院,北京 100049||中国科学院空天信息创新研究院,北京 100094

光学隐藏视觉密码相位密钥欺骗追踪

optical hidingvisual cryptographyphase keyspoofing tracking

《物理学报》 2024 (014)

63-71 / 9

国家重点研发计划(批准号:2021YFB3602604)、国家自然科学基金(批准号:62131011,62075221,61975205)、中国科学院科教融合项目、中国科学院大学和中央高校基本科研业务费资助的课题. Project supported by the National Key Research and Development Program of China(Grant No.2021YFB3602604),the National Natural Science Foundation of China(Grant Nos.62131011,62075221,61975205),the Fusion Foundation of Research and Education of Chinese Academy of Sciences,University of Chinese Academy of Sciences,and the Fundamental Research Funds for the Central Universities of China.

10.7498/aps.73.20231721

评论