검색 전체 메뉴
PDF
맨 위로
OA 학술지
Joint-transform Correlator Multiple-image Encryption System Based on Quick-response Code Key
  • 비영리 CC BY-NC
  • 비영리 CC BY-NC
ABSTRACT

A method for joint-transform correlator (JTC) multiple-image encryption based on a quick-response (QR) code key is proposed. The QR codes converted from different texts are used as key masks to encrypt and decrypt multiple images. Not only can Chinese text and English text be used as key text, but also symbols can be used. With this method, users have no need to transmit the whole key mask; they only need to transmit the text that is used to generate the key. The correlation coefficient is introduced to evaluate the decryption performance of our proposed cryptosystem, and we explore the sensitivity of the key mask and the capability for multiple-image encryption. Robustness analysis is also conducted in this paper. Computer simulations and experimental results verify the correctness of this method.


KEYWORD
Optical information security , Multiple-image encryption , QR code key , JTC encryption system
  • I. INTRODUCTION

    Nowadays, optical information security has increasingly become an international hot issue, and a lot of studies have been done. Due to the advantages of optical encryption, many methods have been proposed [1-9], among them the JTC cryptosystem [3, 10-13], which has no need to generate a complex-conjugate key, and can be used without accurate optical alignment. Moreover, the ciphertext is the joint power spectrum. It can be recorded as the squared magnitude of the amplitude and phase information. Thus JTC encryption has become a practical system.

    To improve the encryption efficiency, many multipleimage optical encryption approaches have been researched [14-24]. For example, Situ et al. [14] used a wavelength multiplexing technique to encrypt multiple images. Rueda et al. [22] realized multiple-image encryption using key rotation. Chen et al. [23] encrypted multiple images through spiral-phase-mask topological-charge-number multiplexing, and Liu et al. [24] achieved parallel encryption for multi-channel images based on the JTC encryption system.

    Because noise-free recovery of the plaintext can be realized by using a QR code as an “information container”, a series of encryption methods based on QR codes have been studied and increasingly valued by the researchers in this field [25-33]. However, QR codes are used as the “information container” [29] in these encryption applications. To use the QR code more reasonably, we have considered a new application of the QR code, which is used as the key mask to realize multiple-image encryption in a JTC cryptosystem. Using this method, users have no need to transmit the whole key mask, but need only to transmit the key text. This masks key transmission more convenient, rapid and secure.

    In Section 2, a brief introduction to QR codes and QR code keys is presented, and the principle of multiple-image encryption is introduced. In Section 3, the correctness of our proposed method is verified by computer simulations. In Section 4, the actual experiment results are presented.

    II. PRINCIPLE

       2.1. QR Codes and QR Code Keys

    A QR code is a type of two-dimensional code that can encode various types of information, including text and image. It was first designed by a subsidiary of Toyota for the vehicle industry in 1994. When using the QR code, there is no need for a mechanical scanning device; only a semiconductor image sensor is needed. After being scanned by a smart phone, the QR code can respond quickly, and the data can be read correctly regardless of the viewpoint. Therefore, in recent years QR codes have become very popular in many fields.

    One of the most excellent features of QR codes is their level of error correction. Some redundant data are also created when information is encoded in a QR code, so a smart phone can read out the correct information from the QR code even if it is partially obstructed. The degree of error correction is classified according to four levels. The lowest is L level, which allows correct information to be read out if 7% of the QR code is obstructed. After that is M level, which provides 15% error correction, then Q level, which provides 25%, and finally there is H level, which provides 30%. Correct information can always be recovered without any noise, within the scope of the level of error correction. In this sense, a QR code can be seen as an “information container”. Figure 1 shows examples of QR codes with the different levels of error correction, all generated from the same text, “optical image encryption method”. Despite that the same text can be recovered from these QR codes by a smart phone, the structures of the QR codes with different levels of error correction are different. Of course, the structures of QR codes encoding different texts are also different, so we want to use QR codes as key masks to encrypt multiple images.

       2.2. Principle of Multiple-image Encryption

    To encrypt the multiple images, we convert the QR code Q(x,y) into a phase distribution h(x,y) , as Eq. (1).

    image

    A schematic diagram of the JTC cryptosystem is shown in Fig. 2.

    A confused random phase mask (RPM) p(x, y) is bonded to the original image f(x, y), and they are placed in the input plane of the cryptosystem; their center’s coordinate is (−a , 0) , and the center coordinate of h(x, y) is (a, 0) . The cryptosystem is illuminated by a plane wave, and the joint power spectrum (JPS) I(x', y') is obtained on the spectrum plane of the Fourier lens as in Eq. (2),

    image

    here F(u, v), P(u, v) and H(u, v) denote the Fourier transforms of f(x, y) , p(x, y) and h(x, y) , respectively. , ( )∗ ( ) and ( )* express the convolution operation and the complex conjugation, respectively. f is the focal length of the lens.

    |F(u, v) * P(u, v)|2 and |H(u, v)|2 are undesired directcurrent noise sources. To record the |H(u, v)|2 term using a CCD camera, we can block the image window. Similarly, to record |F(u, v) * P(u, v)|2 term, we can block the key window. Afterward, we subtract these two terms from Eq. (2), with the result as follows:

    image

    I'( x', y') is what we want, and we regard it as the new ciphertext.

    When we recover the plaintext, the key mask h(x, y) is placed at (a, 0) in the input plane of the decryption scheme as shown in Fig. 2(b), and the ciphertext I'(x, y) is illuminated by H(u, v) at the center of the spectrum plane. After inverse Fourier transforming, the decrypted image g(ξ, η) is recovered as follows:

    image

    We can see that the plaintext is recovered at (−a, 0) , from the first term in Eq. (4).

    The process of multiple-image encryption and decryption is similar to that for a single image. We can use several different texts to encode different QR codes, convert the QR codes into the phase key masks, and encrypt different images. Then, we subtract the two undesired direct-current quantities |F(u, v) ∗ P(u, v)|2 and |H(u, v)|2 corresponding to the nth image. After the above operation, we obtain the nth ciphertext corresponding to the nth image|H(u, v)|2. At last, we record these different ciphertexts and add them, their sum being

    image

    where denotes the nth ciphertext corresponding to the nth image, and is the complex ciphertext.

    If we want to decrypt the nth binary image fn(x, y) from the complex ciphertext, we can convert the key text corresponding to fn(x, y) into the QR code phase key mask. Then, we place the key mask at (a, 0) in the input plane of the decryption scheme, just asin Fig. 2(b). is placed at the center of the spectrum plane, and the Fourier spectrum of hn(x, y) illuminates it; then fn(x, y) is decrypted. The decryption process, which is similar to Eq. (4), is described in Eq. (6):

    image

    where Hn(u, v) denotes the Fourier spectrum of hn(x, y), and is the complex ciphertext.

    We can see that the nth plaintext is recovered at (−a, 0), from the first term in Eq. (6).

    Gaussian low-pass filtering is conducted to reduce the high-frequency niose in the decrypted images. The flow diagram of the method is shown in Fig. 3.

    III. SIMULATION AND RESULTS ANALYSIS

       3.1. Simulation of QR Multiplexing for Multiple-image Encryption

    In this paper, the value of the correlation coefficient (CC) is used as the criterionto evaluate the quality of the decrypted images The closer CC is to 1, the more similar the two images are, and the better the quality of the decrypted image is. The definition of CC is expressed in Eq. (7):

    image

    where i and j represent the pixel position at x and y direction, respectively. f and I represent the gray-level value of the original image and the decrypted image, respectively. and represent the average gray value of all pixels within the original image and the decrypted image, respectively. M and N are the total numbers of pixel at x and y directions, respectively.

    Computer simulations are conducted to verify the correctness of the method we have proposed. For simplity, three images of the letters A, B, and C are used as the original images in the simulation. The QR code phase key masks corresponding to the letters A, B, and C are converted using the texts “Shijiazhuang Engineering College”, “Yantai Aeronautical University”, and “Hangzhou Electronic School” respectively. The level of error correction for these three key masks is H. We use the software “QR code master” to convert the texts into QR codes. The size of the input plane background is 896 × 896 pixels, and the sizes of the original image and QR code phase mask are both 256 × 256 pixels. The center distance between the original image and the QR code phase mask is 640 pixels. The original images to be encrypted and the QR code phase masks on the input plane as shown in Fig. 4. The simulations are conducted according to Eqs. (2)~(5) and Fig. 2. Figures 5(a)~5(c) show the images recovered using the QR code phase masks converted from the texts “Shijiazhuang Engineering College”, “Yantai Aeronautical University” and “Hangzhou Electronic School”. Meanwhile, when an incorrectQR code phase mask, generated from the text “Control Engineering Department”, is used to decrypt the complex ciphertext, we can only see noise (Fig. 5(d)). Thus the simulation proves that we can recover the plaintext using the key mask generated from the correct texts; otherwise, we can recover nothing. The CC values are noted in Fig. 5.

    Another important index of a multiple-image encryption system is the number of encrypted images Nmax. According to Situ et al. [14], Nmax means the CC of recovered images is greater than 0.7; Nmax for Ref. [14] is 8, Nmax for ours is also 8. So, our method is good.

       3.2. Robustness Analysis

    Robustness is very important for an encryption system, so we test the robustness of our proposed system in this section. We conduct an occlusion attack on the ciphertext, and observe the quality of the decrypted images. The simulation conditions are the same as in Section 3.1. The ciphertexts with 10%, 25%, and 50% occluded are shown in Figs. 6(a), 6(e), and 6(i) respectively, and the decrypted images of the letters A, B, and C corresponding to these ciphertexts are shown in Figs. 6(b)~6(d), 6(f)~6(h), and 6(j)~6(l), respectively. The curve of CC value of decrypted image versus percent occluded area of the ciphertext is shown in Fig. 7. The CC values are all greater than 0.65, so the ability of our proposed system to resist an occlusion attack is good.

    The ability to resist a noise attack is another important index of robustness for an encryption system, so we also test this for our proposed system. The simulation conditions are also the same as in Section 3.1. We added salt-and-pepper noise to the ciphertext, and recorded the decrypted effect of the ciphertext being covered with different percentages of salt-and-pepper noise. The curve of CC value of decrypted image versus percentage area of ciphertext covered by noiseis shown in Fig. 8. The CC values are all less than 0.7, so it can be seen that noise attack has a slight impact on the system.

       3.3. Validation of the Level of Error Correction as a Key Parameter

    In order to verify that the level of error correction can be used as a key parameter, we replace the key mask in Figs. 4(a)~4(c) with that in Figs. 1(a)~1(c), other conditions being the same as in the above paragraph. The decrypted results as shown in Fig. 9. Figures 9(a)~9(c) are the decrypted images when the level of error correction of the QR code phase masks are L, M, and Q respectively. In Fig. 9(d) we use anincorrect key mask of error-correction level H to decrypt the complex ciphertext. From Fig. 9, we can see that the images can be recovered using the key with the right level of error correction, but we cannot recover anything using a key with the wrong level of error correction. This simulation proves that the level of error correction can be used as a key parameter. The CC values are noted in Fig. 9.

       3.4. Sensitivity of the QR Code Key

    Of course, the sensitivity of the key is an important feature. Similar text can convert to a similar QR code, so we should explore how many characters need to be wrong before we cannot recover the original image. We still use the QR code phase mask generated from the text “optical image encryption method” as the correct key to encrypt the original image letter E. The level of error correction of the key is H. We change a character of the correct text and encode a new QR code as a wrong key to decrypt the ciphertext generated from the right key and the original image letter E. The decrypted results are shown in Fig. 10. In Fig. 10(a), we use the QR code phase mask generated from the wrong text “aptical image encryption method” to decrypt the ciphertext. In Fig. 10(b), we use the key generated from the text “aatical image encryption method” to decrypt the ciphertext; in Figs. 10(c) and 10(d), the keys are generated from “aaaical image encryption method” and “aaaacal image encryption method” repectively. We can see that in the Figs. 10(a)~10(c), the outline of the image is clear, but after changing four characters, we cannot see any information about the original image. Thus we can conclude that the QR key mask is relatively sensitive to English characters.

    Chinese characters can also be encoded ina QR code, so the application scope of our proposed method is not limited to English text. To verify that a QR code encoded by Chinese characters can also be used as a key, simulations are conducted. Other conditions are the same as in Section 3.1; only the correct QR code key mask is changed. We use the QR code phase mask generated from the Chinese text “光学图像加密方法” as the correct key mask. (In Chinese, this means “optical image encryption method”). The wrong key is generated from the Chinese text “咣学 图像加密方法”, and is used to decrypt the ciphertext generated from the original image and the correct key mask. In the wrong key, the first Chinese character is changed to 咣; the shape and pronunciation of 咣 are similar to those of 光. The other Chinese characters are not changed. The key masks and simulation results are shown in Fig. 11. The right QR code key mask is shown in Fig. 11(a), and the wrong mask in Fig. 11(b). From Fig. 11(c), we can see that with a change in only one Chinese character in the text, the original image cannot be recovered. Thus we conclude that the QR key mask is very sensitive to Chinese characters.

       3.5. QR Code Key Generated by “Space Key Text”

    Not only texts can be encoded into QR code, but also the symbol “space” can be. Using this feature, we propose a method for “space key text”. The key text is madeentirely of “space” symbols. When this QR code is scanned, we cannot see any information; it seems blank, like there is no key text. This can be used to confuse an attacker or thief. We use the QR code phase mask generated from a key text made of different numbers spaces to encrypt different images. To verify this the correctness, three original image letters A, E, and U are used in the simulation. The key text corresponding to letters A, E, and U are texts consisting of 12, 13, and 14 “space” symbols respectively. An incorrect key text is also generated, which is made up of 15 spaces. Other conditions are the same as in Section 3.1. The images and masks on the input plane are shown in Fig. 12.

    The decrypted results are shown in Fig. 13. Figures 13(a)~13(c) are the decrypted images when the QR code mask is generated from key text consisting of spaces. The numbers of “space” symbolsare 12, 13, and 14 respectively. In Fig. 13(d) we use a wrong key mask with 15 spaces to decrypt the complex ciphertext. From Fig. 13, we can see that the images can be recovered using the key with the right number of spaces, but we cannot recover anything using a key with the wrong number of spaces. The CC values are included in Fig. 13.

    IV. EXPERIMENTAL RESULTS

    To confirm the correctness of the method, an experimental optical encryption system is established. Here the encryption process is optical, and the decryption process is digital. The experimental setup for encryption and decryption is shown in Fig. 14. In the cryptosystem, a He-Ne laser (wavelength 632.8 nm) is used as the light source, and a phase-only spatial light modulator (SLM) is used (Holoeye, PLUTO-VIS-014). The resolution of the SLM is 1920 × 1080 pixels, and the pixel pitch of the SLM is 8 µm. The resolution of the CCD camera is 768 × 576 pixels, with a pixel pitch of 8.3 µm. The focal length of the Fourier lens in this experiment is 300. The original images are binary images of the letters D, E, and O. The QR code phase key masks corresponding to these three images are generated from the texts “Shijiazhuang Engineering College”, “Yantai Aeronautical University”, and “Hangzhou Electronic School” respectively. The level of error correction for these three key masks is H. The input images and masks are illuminated by the collimated light source; we record the JPS and subtract the direct-current quantities, and at last add them together. The complex ciphertext after denoisingis shown in Fig. 15. The image is decrypted from the complex ciphertext using the key corresponding to the original image. The decrypted images in the experiment are shown in Fig. 16. They are all decrypted successfully, and we can see them clearly, verifying the correctness of this method.

    V. CONCLUSION

    In this paper, an optical method based on QR code keys to encrypt multiple images under a JTC encryption system is proposed. The QR codes generated from different texts can be used as key masks, and the error-correction level of the QR code can be used as a key parameter. We can encrypt multiple images into one ciphertext, and decrypt them using the QR code generated from the corresponding text. It is more convenient to transmit the text than the whole key mask. The QR code key mask is sensitive to both Chinese and English text, and even space-bar symbols. The ability of our proposed system to resist both occlusion and noise attacks is good. We also use the CC value to judge the encryption capability and decryption performance. Computer simulations and an initial experiment are conducted to confirm the feasibility of this method.

참고문헌
  • 1. Refregier P., Javidi B. 1995 Optical image encryption based on input plane and Fourier plane random encoding [Opt. Lett.] Vol.20 P.767-769 google cross ref
  • 2. Unnikrishnan G., Singh K. 2000 Double random fractional Fourier domain encoding for optical security [Opt. Eng.] Vol.39 P.2853-2859 google cross ref
  • 3. Nomura T., Javidi B. 2000 Optical encryption using a joint transform correlator architecture [Opt. Eng.] Vol.39 P.2031-2035 google cross ref
  • 4. Unnikrishnan G., Joseph J., Singh K. 2000 Optical encryption by double-random phase encoding in the fractional Fourier domain [Opt. Lett.] Vol.25 P.887-889 google cross ref
  • 5. Hennelly B., Sheridan J. T. 2003 Optical image encryption by random shifting in fractional Fourier domains [Opt. Lett.] Vol.28 P.269-271 google cross ref
  • 6. Javidi B., Carnicer A., Yamaguchi M., Nomura T., Perez-Cabre E., Millan M. S., Nishchal N. K., Torroba R., Barrera J. F., He W., Peng X., Stern A., Rivenson Y., Alfalou A., Brosseau C., Guo C., Sheridan J. T., Situ G., Naruse M., Matsumoto T., Juvells I., Tajahuerce E., Lancis J., Chen W., Chen X., Pinkse P. W. H., Mosk A. P., Markman A. 2016 Roadmap on optical security [J. Opt.] Vol.18 P.083001 google cross ref
  • 7. Yuan S., Liu X., Zhou X., Li Z. 2016 Optical encryption scheme with multiple users based on computational ghost imaging and orthogonal modulation [J. Opt. Soc. Korea] Vol.20 P.476-480 google cross ref
  • 8. Sun W., Wang L., Wang J., Li H., Wu Q. 2018 Optical image encryption technique based on hybrid-pattern phase keys [Curr. Opt. Photon.] Vol.2 P.540-546 google
  • 9. Jeon S. H., Gil S. K. 2019 Secret key sharing cryptosystem using optical phase-shifting digital holography [Curr. Opt. Photon.] Vol.3 P.119-127 google
  • 10. Park S. J., Kim J. Y., Bae J. K., Kim S. J. 2001 Fourier-plane encryption technique based on removing the effect of phase terms in a joint transform correlator [Opt. Rev.] Vol.8 P.413-415 google cross ref
  • 11. Mela C. L., Iemmi C. 2006 Optical encryption using phase-shifting interferometry in a joint transform correlator [Opt. Lett.] Vol.31 P.2562-2564 google cross ref
  • 12. Rueda E., Barrera J. F., Henao R., Torroba R. 2009 Optical encryption with a reference wave in a joint transform correlator architecture [Opt. Commun.] Vol.282 P.3243-3249 google cross ref
  • 13. Zea A. V., Barrera J. F., Torroba R. 2016 Three-dimensional joint transform correlator cryptosystem [Opt. Lett.] Vol.41 P.599-602 google cross ref
  • 14. Situ G., Zhang J. 2005 Multiple-image encryption by wavelength multiplexing [Opt. Lett.] Vol.30 P.1306-1308 google cross ref
  • 15. Situ G., Zhang J. 2006 Position multiplexing for multiple-image encryption [J. Opt. A: Pure Appl. Opt.] Vol.8 P.391-397 google cross ref
  • 16. Amaya D., Tebaldi M., Torroba R., Bolognini N. 2008 Multichanneled encryption via a joint transform correlator architecture [Appl. Opt.] Vol.47 P.5903-5907 google cross ref
  • 17. Alfalou A., Mansour A. 2009 Double random phase encryption scheme to multiplex and simultaneous encode multiple images, [Appl. Opt.] Vol.48 P.5933-5947 google cross ref
  • 18. Amaya D., Tebaldi M., Torroba R., Bolognini N. 2009 Wavelength multiplexing encryption using joint transform correlator architecture [Appl. Opt.] Vol.48 P.2099-2104 google cross ref
  • 19. Wang X., Zhao D. 2012 Fully phase multiple-image encryption based on superposition principle and the digital holographic technique [Opt. Commun.] Vol.285 P.4280-4284 google cross ref
  • 20. Barrera J. F., Tebaldi M., Rios C., Rueda E., Bolognini N., Torroba R. 2012 Experimental multiplexing of encrypted movies using a JTC architecture [Opt. Express] Vol.20 P.3388-3393 google cross ref
  • 21. Kong D., Shen X., Xu Q., Xin W., Guo H. 2013 Multiple-image encryption scheme based on cascaded fractional Fourier transform [Appl. Opt.] Vol.52 P.2619-2625 google cross ref
  • 22. Rueda E., Rios C., Barrera J. F., Henao R., Torroba R. 2011 Experimental multiplexing approach via code key rotations under a joint transform correlator scheme [Opt. Commun.] Vol.284 P.2500-2504 google cross ref
  • 23. Chen Q., Shen X., Dou S., Lin C., Wang L. 2018 Topological charge number multiplexingfor JTC multiple-image encryption [Opt. Commun.] Vol.412 P.155-160 google cross ref
  • 24. Liu J., Bai T., Shen X., Dou S., Lin C., Cai J. 2017 Parallel encryption for multi-channel images based on an optical joint transform correlator [Opt. Commun.] Vol.396 P.174-184 google cross ref
  • 25. Barrera J. F., Mira-Agudelo A., Torroba R. 2014 Experimental QR code optical encryption: noise-free data recovering [Opt. Lett.] Vol.39 P.3074-3077 google cross ref
  • 26. Wang Z.-P., Zhang S., Liu H.-Z., Qin Y. 2014 Single-intensity-recording optical encryption technique based on phase retrieval algorithm and QR code [Opt. Commun.] Vol.332 P.36-41 google cross ref
  • 27. Ren Z., Su P., Ma J., Jin G. 2014 Secure and noise-free holographic encryption with a quick-response code [Chin. Opt. Lett.] Vol.12 P.010601 google cross ref
  • 28. Qin Y., Gong Q. 2014 Optical information encryption based on incoherent superposition with the help of the QR code [Opt. Commun.] Vol.310 P.69-74 google cross ref
  • 29. Barrera J. F., Mira A., Torroba R. 2013 Optical encryption and QR codes: Secure and noise-free information retrieval [Opt. Express] Vol.21 P.5373-5378 google cross ref
  • 30. Lin C., Shen X., Li B. 2014 Four-dimensional key design in amplitude, phase, polarization and distance for optical encryption based on polarization digital holography and QR code [Opt. Express] Vol.22 P.20727-20739 google cross ref
  • 31. Trejos S., Barrera J. F., Torroba R. 2015 Optimized and secure technique for multiplexing QR code images of single characters: application to noiseless messages retrieval [Erratum, J. Opt.] Vol.17 P.129601 google
  • 32. Jaramillo A., Barrera J. F., Zea A. V., Torroba R. 2018 Fractional optical cryptographic protocol for data containers in a noise-free multiuser environment [Opt. Lasers Eng.] Vol.102 P.119-125 google cross ref
  • 33. Jiao S., Jin Z., Zhou C., Zou W., Li X. 2018 Is QR code an optimal data container in optical encryption systems from an error-correction coding perspective? [J. Opt. Soc. Am. A] Vol.35 P.A23-A29 google cross ref
이미지 / 테이블
  • [ FIG. 1. ]  QR codes with different levels of error correction, generated from the same text “optical image encryption method”: (a) L level, (b) M level, (c) Q level, (d) H level.
    QR codes with different levels of error correction, generated from the same text “optical image encryption method”: (a) L level, (b) M level, (c) Q level, (d) H level.
  • [ ] 
  • [ FIG. 2. ]  Schematic diagram of the JTC cryptosystem: (a) encryption scheme, (b) decryption scheme.
    Schematic diagram of the JTC cryptosystem: (a) encryption scheme, (b) decryption scheme.
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ FIG. 3. ]  Flow diagram of the method.
    Flow diagram of the method.
  • [ ] 
  • [ FIG. 4. ]  Input images and QR code key masks for the simulation.
    Input images and QR code key masks for the simulation.
  • [ FIG. 5. ]  Decrypted results using different keytexts: (a) “Shijiazhuang Engineering College”, (b) “Yantai Aeronautical University”, (c) “Hangzhou Electronic School”, (d) “Control Engineering Department”.
    Decrypted results using different keytexts: (a) “Shijiazhuang Engineering College”, (b) “Yantai Aeronautical University”, (c) “Hangzhou Electronic School”, (d) “Control Engineering Department”.
  • [ FIG. 6. ]  (a) The ciphertext with 10% occludedarea. (b)-(d) Decrypeted images of the letters A, B, and C, corresponding to the ciphertext with 10% occlusion. (e) The ciphertext with 25% occludedarea (f)-(h) Decrypeted images of the letters A, B, and C, corresponding to the the ciphertext with 25% occlusion. (i) The ciphertext with 50% occludedarea. (j)-(l) Decrypeted images of the letters A, B, and C, corresponding to the the ciphertext with 50% occlusion.
    (a) The ciphertext with 10% occludedarea. (b)-(d) Decrypeted images of the letters A, B, and C, corresponding to the ciphertext with 10% occlusion. (e) The ciphertext with 25% occludedarea (f)-(h) Decrypeted images of the letters A, B, and C, corresponding to the the ciphertext with 25% occlusion. (i) The ciphertext with 50% occludedarea. (j)-(l) Decrypeted images of the letters A, B, and C, corresponding to the the ciphertext with 50% occlusion.
  • [ FIG. 7. ]  CC versus percent occluded area of the ciphertext.
    CC versus percent occluded area of the ciphertext.
  • [ FIG. 8. ]  CC value versus areaof the ciphertextcovered by salt-and-pepper noise.
    CC value versus areaof the ciphertextcovered by salt-and-pepper noise.
  • [ FIG. 9. ]  Decrypted results using keys with different levels of error correction: (a) L level, (b) M level, (c) Q level, (d) H level.
    Decrypted results using keys with different levels of error correction: (a) L level, (b) M level, (c) Q level, (d) H level.
  • [ FIG. 10. ]  Decrypted results using the wrong key, when the key text is (a) “aptical image encryption method”, (b) “aatical image encryption method”, (c) “aaaical image encryption method”, and (d) “aaaacal image encryption method”.
    Decrypted results using the wrong key, when the key text is (a) “aptical image encryption method”, (b) “aatical image encryption method”, (c) “aaaical image encryption method”, and (d) “aaaacal image encryption method”.
  • [ FIG. 11. ]  (a) The QR code key generated from the Chinese text “光??像加密方法”. (b) The QR code key generated from the Chinese text “???像加密方法”. (c) Decrypted result using the key mask generated from the second text “???像加密方法”.
    (a) The QR code key generated from the Chinese text “光??像加密方法”. (b) The QR code key generated from the Chinese text “???像加密方法”. (c) Decrypted result using the key mask generated from the second text “???像加密方法”.
  • [ FIG. 12. ]  Images and QR code key masks on the input plane.
    Images and QR code key masks on the input plane.
  • [ FIG. 13. ]  Decrypted images using keysconsisting of (a) 12, (b) 13, (c) 14, and (d) 15 “space” symbols.
    Decrypted images using keysconsisting of (a) 12, (b) 13, (c) 14, and (d) 15 “space” symbols.
  • [ FIG. 14. ]  Experimental system: (1) He-Ne laser, (2,12) Attenuators, (3) Filter, (4) Collimating mirror, (5) Right-angle prism, (6) Aperture, (7) SLM, (8,10,13) Beam-splitting prisms, (9) Fourier lens, (11) CCD.
    Experimental system: (1) He-Ne laser, (2,12) Attenuators, (3) Filter, (4) Collimating mirror, (5) Right-angle prism, (6) Aperture, (7) SLM, (8,10,13) Beam-splitting prisms, (9) Fourier lens, (11) CCD.
  • [ FIG. 15. ]  Complex ciphertext after denoising.
    Complex ciphertext after denoising.
  • [ FIG. 16. ]  Decrypted results from the experiment, with the QR code masksgenerated from the texts (a) “Shijiazhuang Engineering College”, (b) “Yantai Aeronautical University”, and (c) “Hangzhou Electronic School”.
    Decrypted results from the experiment, with the QR code masksgenerated from the texts (a) “Shijiazhuang Engineering College”, (b) “Yantai Aeronautical University”, and (c) “Hangzhou Electronic School”.
(우)06579 서울시 서초구 반포대로 201(반포동)
Tel. 02-537-6389 | Fax. 02-590-0571 | 문의 : oak2014@korea.kr
Copyright(c) National Library of Korea. All rights reserved.