• Acta Optica Sinica
  • Vol. 41, Issue 16, 1607001 (2021)
Ye Tao, Yupeng Zhu, Dongyu Yang, Wenjin Lü, and Yishi Shi*
Author Affiliations
  • School of Optoelectronics, University of Chinese Academy of Sciences, Beijing 100049, China
  • show less
    DOI: 10.3788/AOS202141.1607001 Cite this Article Set citation alerts
    Ye Tao, Yupeng Zhu, Dongyu Yang, Wenjin Lü, Yishi Shi. Remote Optical Information Authentication System Based on Visual Cryptography[J]. Acta Optica Sinica, 2021, 41(16): 1607001 Copy Citation Text show less
    References

    [1] Naor M. Perugia, Italy. Heidelberg:, Springer, 1-12(1994).

    [2] Lin C, Shen X J, Lei M et al. Optical security validation based on orthogonal polarization multiplexing in three-dimensional space[J]. Acta Optica Sinica, 36, 0307001(2016).

    [3] Sun X K, Zhang S G, Ma R et al. Natural speckle-based watermarking with random-like illuminated decoding[J]. Optics Express, 28, 31832-31843(2020).

    [4] Melkemi M, Hammoudi K. Voronoi-based image representation applied to binary visual cryptography[J]. Signal Processing: Image Communication, 87, 115913(2020).

    [5] Shi Y S, Yang X B. Invisible visual cryptography[J]. Chinese Physics Letters, 34, 114204(2017).

    [6] Shi Y S, Yang X B. Optical hiding with visual cryptography[J]. Journal of Optics, 19, 115703(2017).

    [7] Li Z F, Dong G Y, Yang D Y et al. Efficient dielectric metasurface hologram for visual-cryptographic image hiding[J]. Optics Express, 27, 19212-19217(2019).

    [8] Yang N, Gao Q K, Shi Y S. Visual-cryptographic image hiding with holographic optical elements[J]. Optics Express, 26, 31995-32006(2018).

    [9] Yang X B, Li T, Shi Y S. Indirect visual cryptography scheme[J]. Proceedings of SPIE, 9675, 96752Q(2015).

    [10] Yu T, Yang D Y, Ma R et al. Enhanced-visual-cryptography-based optical information hiding system[J]. Acta Physica Sinica, 69, 144202(2020).

    [11] Wang H J, Zhao T F, Shang D L et al[J]. Non-expanded (2, 2) visual cryptography scheme with masked image Journal of Nanjing University (Natural Science Edition), 2018, 157-162.

    [12] Gan M, Gan Z, Chen K F. A visual secret sharing scheme with covert image[J]. Computer Applications and Software, 22, 1-2,88(2005).

    [13] Fu Z X, Yu B, Fang L G. Operation-based multi-secret visual cryptography scheme with disguised patterns[J]. Computer Science, 38, 90-92(2011).

    [14] Ulutas M. Meaningful share generation for increased number of secrets in visual secret-sharing scheme[J]. Mathematical Problems in Engineering, 2010, 593236(2010).

    [15] Kumari K, Bhatia S. Multi-pixel visual cryptography for color images with meaningful shares[J]. International Journal of Engineering Science and Technology, 2, 2398-2407(2010).

    [16] Machizaud J, Fournel T. Two-out-of-two color matching based visual cryptography schemes[J]. Optics Express, 20, 22847-22859(2012).

    [17] Yamamoto H, Hayasaki Y, Nishida N. Secure information display with limited viewing zone by use of multi-color visual cryptography[J]. Optics Express, 12, 1258-1270(2004).

    [18] Sudharsanan S I. Visual cryptography for JPEG color images[J]. Proceedings of SPIE, 5601, 171-178(2004).

    [19] Blundo C, Bonis A D, Santis A D. Improved schemes for visual cryptography[J]. Designs, Codes and Cryptography, 24, 255-278(2001).

    [20] Cimato S, Prisco R D, Santis A D. Optimal colored threshold visual cryptography schemes[J]. Designs, Codes and Cryptography, 35, 311-335(2005).

    [21] Niu D M[J]. 2, 2) visual cryptography schemes based halftoning Network & Computer Security, 2009, 53-54.

    [22] Hou Y C. Visual cryptography for color images[J]. Pattern Recognition, 36, 1619-1629(2003).

    [23] Yamamoto H, Hayasaki Y, Nishida N. Securing information display by use of visual cryptography[J]. Optics Letters, 28, 1564-1566(2003).

    [24] Yang C N. New visual secret sharing schemes using probabilistic method[J]. Pattern Recognition Letters, 25, 481-494(2004).

    [25] Wang F H, Yen K K, Jain L C et al. Multiuser-based shadow watermark extraction system[J]. Information Sciences, 177, 2522-2532(2007).

    [26] Yang C N, Chen P W, Shih H W et al. Aspect ratio invariant visual cryptography by image filtering and resizing[J]. Personal and Ubiquitous Computing, 17, 843-850(2013).

    [27] Qiao M Q, Zhao Z Z. Variable visual cryptography[J]. Journal of Cryptologic Research, 7, 48-55(2020).

    [28] Cai C. Design and application of scope anti-shake system[D]. Harbin: Harbin Institute of Technology(2008).

    [29] Wang X Y. Design and realization of the image stabilizing system for telescope[D]. Harbin: Harbin Institute of Technology(2007).

    [30] Wu M, Tang E, Lin B. Data hiding in digital binary image[C]∥1st IEEE International Conference on Multimedia and Expo (ICME2000), July 30--August 2, New York, USA., 393-396.

    [31] Su Z M, Lin X L. The arbitrary share of visual secrets[J]. Chinese Journal of Computers, 19, 293-299(1996).

    Ye Tao, Yupeng Zhu, Dongyu Yang, Wenjin Lü, Yishi Shi. Remote Optical Information Authentication System Based on Visual Cryptography[J]. Acta Optica Sinica, 2021, 41(16): 1607001
    Download Citation