| 注册
首页|期刊导航|物理学报|基于光学隐藏视觉密码的欺骗追踪系统

基于光学隐藏视觉密码的欺骗追踪系统

吴承哲 刘睿泽 史祎诗

物理学报2024,Vol.73Issue(14):63-71,9.
物理学报2024,Vol.73Issue(14):63-71,9.DOI:10.7498/aps.73.20231721

基于光学隐藏视觉密码的欺骗追踪系统

Optical-hidden-visual-cryptography-based spoofing tracking system

吴承哲 1刘睿泽 1史祎诗2

作者信息

  • 1. 河北工程大学数理科学与工程学院,邯郸 056038
  • 2. 中国科学院大学光电学院,北京 100049||中国科学院空天信息创新研究院,北京 100094
  • 折叠

摘要

Abstract

A deception tracking system based on optical hidden visual code is proposed.The system uses visual cryptography to decompose the secret image into a number of realistic masked images,which can be used to conceal the secret information.One of the masked images is embedded with a fragile watermark to ensure that it is not modified.This image serves as an inspection key to verify the other images,and the inspection key is transmitted separately.The rest of the camouflaged image is hidden in the phase key using the phase recovery algorithm,which ensures good invisibility during transmission.If the pixel arrangement of the masked image is tampered with by a dishonest participant,it is called a fraudulent image.Each phase key is distributed to different participants to ensure that the corresponding deceiver can be identified when the spoofing image is traced.In the extraction process,only the diffraction transformation of the phase key is needed to obtain the mask image.During the inspection,the inspection key is incoherently superimposed with any masked image,and the appearance of the verification image indicates whether the masked image has been tampered with,thereby achieving the purpose of deception tracking.The secret image can be obtained by incoherently superimposing the masking images,provided that the number of superimposed masking images is is greater than or equal to the threshold k,along with the inspection key.When the inspection key is superimposed with any masked image,if there is a spoofed image,no verification image will appear,and as a result,the secret image will not be restored.If there is no spoofed image,the verification image will appear,indicating that the secret image can be restored by covering all the images.The system can be used to track internal fraudsters when actual information is transmitted through invisible visual cryptography.

关键词

光学隐藏/视觉密码/相位密钥/欺骗追踪

Key words

optical hiding/visual cryptography/phase key/spoofing tracking

引用本文复制引用

吴承哲,刘睿泽,史祎诗..基于光学隐藏视觉密码的欺骗追踪系统[J].物理学报,2024,73(14):63-71,9.

基金项目

国家重点研发计划(批准号:2021YFB3602604)、国家自然科学基金(批准号:62131011,62075221,61975205)、中国科学院科教融合项目、中国科学院大学和中央高校基本科研业务费资助的课题. Project supported by the National Key Research and Development Program of China(Grant No.2021YFB3602604),the National Natural Science Foundation of China(Grant Nos.62131011,62075221,61975205),the Fusion Foundation of Research and Education of Chinese Academy of Sciences,University of Chinese Academy of Sciences,and the Fundamental Research Funds for the Central Universities of China. (批准号:2021YFB3602604)

物理学报

OA北大核心CSTPCD

1000-3290

访问量0
|
下载量0
段落导航相关论文