2018
DOI: 10.1364/oe.26.031995
|View full text |Cite
|
Sign up to set email alerts
|

Visual-cryptographic image hiding with holographic optical elements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(14 citation statements)
references
References 39 publications
0
14
0
Order By: Relevance
“…Since visual cryptography (VC) was developed (Naor and Shamir, 1995), there are many relevant studies for its applications. The VC offers a feasible and straightforward solution for the decryption of secret information based on human vision (Naor and Shamir, 1995;Blundo et al, 2000;Hou, 2003;Wan et al, 2018;Yang et al, 2018;Jiao et al, 2019;Li et al, 2019;Jiao et al, 2020). The first visual cryptographic technique was proposed by Naor and Shamir in 1995, which broke up a secret image into multiple shares (i.e., visual key images) (Naor and Shamir, 1995).…”
Section: Introductionmentioning
confidence: 99%
“…Since visual cryptography (VC) was developed (Naor and Shamir, 1995), there are many relevant studies for its applications. The VC offers a feasible and straightforward solution for the decryption of secret information based on human vision (Naor and Shamir, 1995;Blundo et al, 2000;Hou, 2003;Wan et al, 2018;Yang et al, 2018;Jiao et al, 2019;Li et al, 2019;Jiao et al, 2020). The first visual cryptographic technique was proposed by Naor and Shamir in 1995, which broke up a secret image into multiple shares (i.e., visual key images) (Naor and Shamir, 1995).…”
Section: Introductionmentioning
confidence: 99%
“…Visual cryptography (VC) [1][2][3][4][5][6][7][8][9][10][11][12] is a security technique for encrypting an image in a way that the original image can be visually decrypted. In VC, a secret image is randomly expanded to multiple visual key images and each visual key image is referred to as a share.…”
Section: Introductionmentioning
confidence: 99%
“…a paper sheet), it is hard to decode the secret image by overlapping. It is proposed that the visual key information can be physically embedded in holographic optical elements (HOE) in previous works [11,12]. Based on optical coherent diffraction and volume grating, the secret image can be visually displayed when the correct HOEs are placed in the optical setup and illuminated by laser.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Digital visible watermarking or image fusion technology has been widely used in the field of public information security such as copyright protection [23][24][25][26][27][28]. In SPI, many image fusion or watermarking schemes [29][30][31][32][33][34] have been proposed.…”
Section: Introductionmentioning
confidence: 99%