物理学报2024,Vol.73Issue(14) :63-71.DOI:10.7498/aps.73.20231721

基于光学隐藏视觉密码的欺骗追踪系统

Optical-hidden-visual-cryptography-based spoofing tracking system

吴承哲 刘睿泽 史祎诗
物理学报2024,Vol.73Issue(14) :63-71.DOI:10.7498/aps.73.20231721

基于光学隐藏视觉密码的欺骗追踪系统

Optical-hidden-visual-cryptography-based spoofing tracking system

吴承哲 1刘睿泽 1史祎诗2
扫码查看

作者信息

  • 1. 河北工程大学数理科学与工程学院,邯郸 056038
  • 2. 中国科学院大学光电学院,北京 100049;中国科学院空天信息创新研究院,北京 100094
  • 折叠

摘要

提出了一种基于光学隐藏视觉密码的欺骗追踪系统.该系统将秘密图像分解为多幅有实际意义的掩饰图像,将其中一张掩饰图像嵌入脆弱水印,作为检验密钥,检验密钥单独传输.然后将其余掩饰图像隐藏在相位密钥中,进行传输时有很好的不可见性.掩饰图像的像素排列若被不诚实的参与者篡改,则称为欺骗图像.将每张相位密钥分发给不同的参与者,以保证在追踪到欺骗图像时可找到对应的欺骗者.在提取过程中,只需要对该相位密钥进行傅里叶变换,即可得到掩饰图像.检验时,将检验密钥与任一掩饰图像进行非相干叠加,以是否出现验证图像为条件,就可检验掩饰图像是否被篡改,以达到欺骗追踪的目的,将数量大于等于门限k的掩饰图像和检验密钥进行非相干叠加即可得到秘密图像,仿真实验结果表明,该系统可应用于利用不可见视觉密码术传递实际信息时,对内部欺骗者的追踪.

Abstract

A deception tracking system based on optical hidden visual code is proposed.The system uses visual cryptography to decompose the secret image into a number of realistic masked images,which can be used to conceal the secret information.One of the masked images is embedded with a fragile watermark to ensure that it is not modified.This image serves as an inspection key to verify the other images,and the inspection key is transmitted separately.The rest of the camouflaged image is hidden in the phase key using the phase recovery algorithm,which ensures good invisibility during transmission.If the pixel arrangement of the masked image is tampered with by a dishonest participant,it is called a fraudulent image.Each phase key is distributed to different participants to ensure that the corresponding deceiver can be identified when the spoofing image is traced.In the extraction process,only the diffraction transformation of the phase key is needed to obtain the mask image.During the inspection,the inspection key is incoherently superimposed with any masked image,and the appearance of the verification image indicates whether the masked image has been tampered with,thereby achieving the purpose of deception tracking.The secret image can be obtained by incoherently superimposing the masking images,provided that the number of superimposed masking images is is greater than or equal to the threshold k,along with the inspection key.When the inspection key is superimposed with any masked image,if there is a spoofed image,no verification image will appear,and as a result,the secret image will not be restored.If there is no spoofed image,the verification image will appear,indicating that the secret image can be restored by covering all the images.The system can be used to track internal fraudsters when actual information is transmitted through invisible visual cryptography.

关键词

光学隐藏/视觉密码/相位密钥/欺骗追踪

Key words

optical hiding/visual cryptography/phase key/spoofing tracking

引用本文复制引用

基金项目

国家重点研发计划(2021YFB3602604)

国家自然科学基金(62131011)

国家自然科学基金(62075221)

国家自然科学基金(61975205)

中国科学院科教融合项目()

中国科学院大学和中央高校基本科研业务费()

出版年

2024
物理学报
中国物理学会,中国科学院物理研究所

物理学报

CSTPCD北大核心
影响因子:1.038
ISSN:1000-3290
参考文献量25
段落导航相关论文