• Acta Physica Sinica
  • Vol. 69, Issue 14, 144202-1 (2020)
Tao Yu, Dong-Yu Yang, Rui Ma, Yu-Peng Zhu, and Yi-Shi Shi*
Author Affiliations
  • School of Optoelectronics, University of Chinese Academy of Sciences, Beijing 100049, China
  • show less
    DOI: 10.7498/aps.69.20200496 Cite this Article
    Tao Yu, Dong-Yu Yang, Rui Ma, Yu-Peng Zhu, Yi-Shi Shi. Enhanced-visual-cryptography-based optical information hiding system[J]. Acta Physica Sinica, 2020, 69(14): 144202-1 Copy Citation Text show less
    EVC-based optical hiding system: The extraction process
    Fig. 1. EVC-based optical hiding system: The extraction process
    Extended-visual-cryptographic-based optical hiding system: The hiding process
    Fig. 2. Extended-visual-cryptographic-based optical hiding system: The hiding process
    Two shares (a), (b) are stacked together to recover the secret information (c)
    Fig. 3. Two shares (a), (b) are stacked together to recover the secret information (c)
    Examples of subpixel arrangements. Arranging two subpixels with and as the examples make , and
    Fig. 4. Examples of subpixel arrangements. Arranging two subpixels with and as the examples make , and
    A example of phase-keys generation algorithms: GS algorithm flow diagram
    Fig. 5. A example of phase-keys generation algorithms: GS algorithm flow diagram
    (a), (b) The original images of shares; (c) the secret image; (d), (e) the shares; (f) the secret images decrypted by stacked (d), (e) together; (g), (h) the phase keys; (i), (j) the reconstructed shares using (g), (h); (k) the recover secret images by stacking (i), (j) together
    Fig. 6. (a), (b) The original images of shares; (c) the secret image; (d), (e) the shares; (f) the secret images decrypted by stacked (d), (e) together; (g), (h) the phase keys; (i), (j) the reconstructed shares using (g), (h); (k) the recover secret images by stacking (i), (j) together
    Optical setup for the extraction process of EVCOH
    Fig. 7. Optical setup for the extraction process of EVCOH
    (a), (b) The shares, (c) the secret images decrypted by stacked (a), (b) together; (d), (e) the phase keys; (f), (g) the reconstructed shares that were taken with a CCD camera; (h) the recover secret images by stacking (f), (g) together
    Fig. 8. (a), (b) The shares, (c) the secret images decrypted by stacked (a), (b) together; (d), (e) the phase keys; (f), (g) the reconstructed shares that were taken with a CCD camera; (h) the recover secret images by stacking (f), (g) together
    Noise analysis of EVCOH
    Fig. 9. Noise analysis of EVCOH
    Noise analysis of EVCOH when the phase keys are four steps
    Fig. 10. Noise analysis of EVCOH when the phase keys are four steps
    Tao Yu, Dong-Yu Yang, Rui Ma, Yu-Peng Zhu, Yi-Shi Shi. Enhanced-visual-cryptography-based optical information hiding system[J]. Acta Physica Sinica, 2020, 69(14): 144202-1
    Download Citation