可视密码
欺骗攻击
计算机科学
密码学
神经密码学
计算机视觉
跟踪(教育)
人工智能
计算机安全
加密
公钥密码术
心理学
秘密分享
教育学
作者
Cheng-Zhe Wu,Ruize Liu,Yishi Shi
出处
期刊:Chinese Physics
[Acta Physica Sinica, Chinese Physical Society and Institute of Physics, Chinese Academy of Sciences]
日期:2024-01-01
卷期号:73 (14): 144201-144201
标识
DOI:10.7498/aps.73.20231721
摘要
A deception tracking system based on optical hidden visual code is proposed. The system uses visual cryptography to decompose the secret image into a number of realistic masked images, which can be used to conceal the secret information. One of the masked images is embedded with a fragile watermark to ensure that it is not modified. This image serves as an inspection key to verify the other images, and the inspection key is transmitted separately. The rest of the camouflaged image is hidden in the phase key using the phase recovery algorithm, which ensures good invisibility during transmission. If the pixel arrangement of the masked image is tampered with by a dishonest participant, it is called a fraudulent image. Each phase key is distributed to different participants to ensure that the corresponding deceiver can be identified when the spoofing image is traced. In the extraction process, only the diffraction transformation of the phase key is needed to obtain the mask image. During the inspection, the inspection key is incoherently superimposed with any masked image, and the appearance of the verification image indicates whether the masked image has been tampered with, thereby achieving the purpose of deception tracking. The secret image can be obtained by incoherently superimposing the masking images, provided that the number of superimposed masking images is is greater than or equal to the threshold <i>k</i>, along with the inspection key. When the inspection key is superimposed with any masked image, if there is a spoofed image, no verification image will appear, and as a result, the secret image will not be restored. If there is no spoofed image, the verification image will appear, indicating that the secret image can be restored by covering all the images. The system can be used to track internal fraudsters when actual information is transmitted through invisible visual cryptography.
科研通智能强力驱动
Strongly Powered by AbleSci AI