2020
DOI: 10.1364/oe.383240
|View full text |Cite
|
Sign up to set email alerts
|

Visual cryptography in single-pixel imaging

Abstract: Two novel visual cryptography (VC) schemes are proposed by combining VC with single-pixel imaging (SPI) for the first time. It is pointed out that the overlapping of visual key images in VC is similar to the superposition of pixel intensities by a single-pixel detector in SPI. In the first scheme, QR-code VC is designed by using opaque sheets instead of transparent sheets. The secret image can be recovered when identical illumination patterns are projected onto multiple visual key images and a single detector … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
33
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 117 publications
(38 citation statements)
references
References 40 publications
(64 reference statements)
0
33
0
Order By: Relevance
“…But in the concept we proposing that will work on both the colour and black & white images and shadow image of the proposed scheme looks like as a single colour paper and no hacker or the people who is aware of this concept can never be able to detect the data inside it [9]. Not only that it helps by reducing risks of identification of the secret data while transmitting.…”
Section: Fig-11: Decryption Of Existing Systemmentioning
confidence: 99%
“…But in the concept we proposing that will work on both the colour and black & white images and shadow image of the proposed scheme looks like as a single colour paper and no hacker or the people who is aware of this concept can never be able to detect the data inside it [9]. Not only that it helps by reducing risks of identification of the secret data while transmitting.…”
Section: Fig-11: Decryption Of Existing Systemmentioning
confidence: 99%
“…This indirect imaging modality offers an alternative optical encryption approach, where a calculation is required and the series of patterns and bucket intensities act as the key and ciphertext, respectively ( 37 ). On the basis of the computational principle of SPI, different encryption schemes have been developed to enhance the number of encrypted images and the security, such as multipositioned image encryption ( 38 ), multicolored image encryption ( 39 ), and visual cryptography encryption ( 40 ). Nevertheless, the large numbers of patterns (i.e., the keys of encryption and decryption) would necessarily increase the burden of the data transmission process and easily attract the attention of eavesdroppers, which is the intrinsic shortcoming of SPI in the application of optical encryption.…”
Section: Introductionmentioning
confidence: 99%
“…Cai et al have proposed a cryptosystem based on equal-mode decomposition (EMD) [27], which decomposed a 2D vector into two 2D vectors, one of which is ciphertext and the other is a private key as a security constraint. This technique provided a reliable one-way function of trapdoor [28], and was widely used in image encryption, such as Fresnel-based cryptosystem [29], cascaded EMD cryptosystem [30], etc. However, the output of the conventional EMD is complex and only applicable to grayscale images.…”
Section: Introductionmentioning
confidence: 99%