已入深夜,您辛苦了!由于当前在线用户较少,发布求助请尽量完整地填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!祝你早点完成任务,早点休息,好梦!

Optical-hidden-visual-cryptography-based spoofing tracking system

可视密码 欺骗攻击 计算机科学 密码学 神经密码学 计算机视觉 跟踪(教育) 人工智能 计算机安全 加密 公钥密码术 心理学 秘密分享 教育学
作者
Cheng-Zhe Wu,Ruize Liu,Yishi Shi
出处
期刊:Chinese Physics [Acta Physica Sinica, Chinese Physical Society and Institute of Physics, Chinese Academy of Sciences]
卷期号:73 (14): 144201-144201
标识
DOI:10.7498/aps.73.20231721
摘要

A deception tracking system based on optical hidden visual code is proposed. The system uses visual cryptography to decompose the secret image into a number of realistic masked images, which can be used to conceal the secret information. One of the masked images is embedded with a fragile watermark to ensure that it is not modified. This image serves as an inspection key to verify the other images, and the inspection key is transmitted separately. The rest of the camouflaged image is hidden in the phase key using the phase recovery algorithm, which ensures good invisibility during transmission. If the pixel arrangement of the masked image is tampered with by a dishonest participant, it is called a fraudulent image. Each phase key is distributed to different participants to ensure that the corresponding deceiver can be identified when the spoofing image is traced. In the extraction process, only the diffraction transformation of the phase key is needed to obtain the mask image. During the inspection, the inspection key is incoherently superimposed with any masked image, and the appearance of the verification image indicates whether the masked image has been tampered with, thereby achieving the purpose of deception tracking. The secret image can be obtained by incoherently superimposing the masking images, provided that the number of superimposed masking images is is greater than or equal to the threshold <i>k</i>, along with the inspection key. When the inspection key is superimposed with any masked image, if there is a spoofed image, no verification image will appear, and as a result, the secret image will not be restored. If there is no spoofed image, the verification image will appear, indicating that the secret image can be restored by covering all the images. The system can be used to track internal fraudsters when actual information is transmitted through invisible visual cryptography.

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
PDF的下载单位、IP信息已删除 (2025-6-4)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
刚刚
zhonglv7应助核桃采纳,获得10
1秒前
Eatanicecube完成签到,获得积分10
3秒前
xxfsx应助桶桶要好好学习采纳,获得10
3秒前
深情的羞花完成签到 ,获得积分10
5秒前
科研通AI2S应助追寻夜香采纳,获得10
6秒前
我不到啊完成签到 ,获得积分10
6秒前
左肩微笑发布了新的文献求助10
7秒前
7秒前
深情安青应助壮观小懒虫采纳,获得10
7秒前
lxh完成签到 ,获得积分10
8秒前
万能图书馆应助添添采纳,获得10
13秒前
Canon完成签到,获得积分20
15秒前
iron完成签到,获得积分10
15秒前
Lucas应助左肩微笑采纳,获得10
15秒前
星辰大海应助晨曦呢采纳,获得10
17秒前
清一完成签到,获得积分10
19秒前
僦是卜够完成签到,获得积分10
20秒前
momo完成签到 ,获得积分10
21秒前
诸葛平卉完成签到 ,获得积分10
21秒前
逮劳完成签到 ,获得积分10
23秒前
害羞的书芹完成签到,获得积分10
25秒前
26秒前
aimynora完成签到 ,获得积分10
27秒前
sxl完成签到,获得积分10
28秒前
zhang完成签到,获得积分10
28秒前
30秒前
小马甲应助lucky采纳,获得10
34秒前
jingutaimi完成签到,获得积分10
35秒前
35秒前
36秒前
天天快乐应助Hermen采纳,获得10
36秒前
39秒前
小森完成签到,获得积分20
39秒前
Hillson完成签到,获得积分10
41秒前
娄心昊发布了新的文献求助10
42秒前
朝朝暮夕完成签到,获得积分10
42秒前
42秒前
柯学家完成签到 ,获得积分10
43秒前
45秒前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Iron toxicity and hematopoietic cell transplantation: do we understand why iron affects transplant outcome? 2000
List of 1,091 Public Pension Profiles by Region 1021
上海破产法庭破产实务案例精选(2019-2024) 500
Teacher Wellbeing: Noticing, Nurturing, Sustaining, and Flourishing in Schools 500
EEG in Childhood Epilepsy: Initial Presentation & Long-Term Follow-Up 500
Latent Class and Latent Transition Analysis: With Applications in the Social, Behavioral, and Health Sciences 500
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 生物化学 物理 纳米技术 计算机科学 内科学 化学工程 复合材料 物理化学 基因 遗传学 催化作用 冶金 量子力学 光电子学
热门帖子
关注 科研通微信公众号,转发送积分 5476197
求助须知:如何正确求助?哪些是违规求助? 4577817
关于积分的说明 14362993
捐赠科研通 4505761
什么是DOI,文献DOI怎么找? 2468812
邀请新用户注册赠送积分活动 1456457
关于科研通互助平台的介绍 1430101