Your browser doesn't support javascript.
loading
Speckle visual cryptography for credential authentication.
Appl Opt ; 63(16): 4351-4359, 2024 Jun 01.
Article em En | MEDLINE | ID: mdl-38856613
ABSTRACT
Based on the high random distribution characteristic of the natural speckle image, a new method of speckle visual cryptography, to the best of our knowledge, is designed by combining the natural speckle image with the secret key in visual cryptography. Specifically, we designed an authentication system for user credentials by combining speckle visual cryptography and the QR code. By using the speckle visual cryptography method, the image of the QR code carrying user authentication information is hidden in the speckle image, and the speckle image is printed on the paper credentials. Through a simulation and analog experiments, we verify the possibility of applying speckle visual cryptography to a user credentials authentication system, compare the improved grayscale reordering algorithm and grayscale reordering algorithm, and prove that the improved grayscale reordering algorithm has more advantages in this system by comparing the PSNR and SSIM. Finally, the y-interference ability and the uniqueness of the virtual secret key in the system are analyzed to prove that the secret key has high anti-interference ability and security.

Texto completo: 1 Base de dados: MEDLINE Idioma: En Ano de publicação: 2024 Tipo de documento: Article

Texto completo: 1 Base de dados: MEDLINE Idioma: En Ano de publicação: 2024 Tipo de documento: Article