Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Visual cryptography in single-pixel imaging

Open Access Open Access

Abstract

Two novel visual cryptography (VC) schemes are proposed by combining VC with single-pixel imaging (SPI) for the first time. It is pointed out that the overlapping of visual key images in VC is similar to the superposition of pixel intensities by a single-pixel detector in SPI. In the first scheme, QR-code VC is designed by using opaque sheets instead of transparent sheets. The secret image can be recovered when identical illumination patterns are projected onto multiple visual key images and a single detector is used to record the total light intensities. In the second scheme, the secret image is shared by multiple illumination pattern sequences and it can be recovered when the visual key patterns are projected onto identical items. The application of VC can be extended to more diversified scenarios by our proposed schemes.

© 2020 Optical Society of America under the terms of the OSA Open Access Publishing Agreement

1. Introduction

Visual cryptography (VC) [112] is a security technique for encrypting an image in a way that the original image can be visually decrypted. In VC, a secret image is randomly expanded to multiple visual key images and each visual key image is referred to as a share. Conventionally these visual key images are printed on transparent sheets and the secret image can be visually decoded when a qualified subset of the keys are overlapped. An example of VC with two visual keys is shown in Fig. 1. In VC, from one individual visual key, no information about the secret image can be extracted. After the multiple visual keys are overlapped, the secret image can be displayed but each individual key cannot be directly observed from the overlapped result. For different security applications, both the visual keys and the secret image can be protected as invisible to unauthorized users.

 figure: Fig. 1.

Fig. 1. Example of VC: (a) visual key 1; (b) visual key 2; (c) visually decoded secret image when the two visual keys printed on transparent sheets are overlapped.

Download Full Size | PDF

VC can be categorized as an optical encryption technique [1315] and the decryption of a secret image is realized optically. In comparison, both the encryption and decryption steps in conventional digital encryption schemes are implemented with computer algorithms. In the original design of VC [1,2], the visual key images are random binary patterns without carrying other meaningful information. Improved VC schemes [38] allow each visual key image to look like natural binary images, grayscale images or color images. In some recent works [9,10], each visual key is designed in the form of a Quick-Response (QR) code pattern.

In VC, the visual keys are usually printed on transparent sheets. If they are printed on opaque materials (e.g. a paper sheet), it is hard to decode the secret image by overlapping. It is proposed that the visual key information can be physically embedded in diffractive optical elements (DOE), holographic optical elements (HOE) or metasurface devices in previous works [11,12,1618]. For example, based on optical coherent diffraction and volume grating, the secret image can be visually displayed when the correct HOEs are placed in the optical setup and illuminated by laser [12]. This scheme has certain advantages compared with conventional transparency-based visual cryptography. However, the optical setup has high experimental complexity such as precise alignment requirement of optical elements, fabrication difficulty of HOEs and availability of laser source.

Different from the coherent imaging system [11,12,1618], an incoherent optical system such as a single-pixel imaging (SPI) system [1924] will have significantly lower experimental complexity. In fact, this has been revealed in some previous works about optical computing [25] and holography [26]. The object image is usually captured by a pixelated sensor array in a conventional optical imaging system. However, in SPI, the sensor only has one single pixel and it will collect the total light intensity of the entire object scene. The object image will be sequentially illuminated by different structured light intensity patterns and the total light intensity for each illumination is recorded by the single-pixel detector. Finally, the object image can be computationally reconstructed from the illumination patterns and the recorded single-pixel intensity sequence by various kinds of algorithms [27]. Some recent works also demonstrate that the image reconstruction can be possibly realized full-optically [28].

In VC, a key step is the overlapping of pixels from multiple transparent visual key images. In SPI, the light intensities of different pixels are superposed in the recorded light intensities by the single-pixel detector. These two schemes have common features from this perspective. In previous works [2935], optical encryption with SPI has been extensively investigated but the VC framework has never been attempted.

In this work, VC is proposed to be combined with SPI for the first time and two novel schemes are proposed. First, it is demonstrated that a secret image recovery can be implemented from multiple QR-code visual keys printed on opaque sheets. The visual keys are overlapped in the recorded single-pixel light intensities and the secret image can be reconstructed. Each individual QR-code visual key image is not directly captured by the detector. In addition, the visual key images disguised as readable QR codes have natural visual meaning and it is less noticeable by the attackers. Second, it is proposed that the visual keys can be embedded in the illumination patterns of SPI, instead of a transparent or opaque sheet. When multiple sets of illumination patterns are projected onto identical object images and only one single-pixel detector is used to collect the total light intensity, the secret image can be recovered in the reconstruction result.

For visual keys printed on opaque sheets, VC can be realized by conventional pixelated sensor-array digital cameras and subsequent digital overlapping processing. But SPI or a single-pixel camera demonstrates advantages in some invisible wavebands where conventional pixelated sensor arrays are expensive or even not available [19,20]. In addition, SPI can achieve indirect-line-of-sight imaging and weak-light imaging [19]. Single-pixel detectors have higher timing resolutions and refreshing rates than pixelated sensor-array devices for high-speed imaging [19]. VC can be implemented under these conditions in our proposed schemes when it is combined with SPI. For example, the visual key images have to be placed in the line of sight for a conventional digital camera. In SPI, the multiple visual key images and projection devices can be placed in different hidden corners. The total light intensity can still be collected by the single-pixel detector for secret image reconstruction, which will physically enhance the security. Another example is that, SPI can capture visual key images more easily than conventional cameras in invisible wavebands or under very weak lighting conditions, which is favorable for making the visual keys not noticeable by attackers. Similar to the advantages of single-pixel cameras over conventional cameras, our proposed single-pixel VC have unique advantages over conventional VC as well. The application of VC can be extended to more diversified scenarios by our proposed schemes.

2. Proposed visual cryptography (VC) schemes in single-pixel imaging (SPI)

2.1 Principles of single-pixel imaging (SPI)

In SPI, the projection device will sequentially project N different illumination patterns ${P_1}(x,y)$, ${P_2}(x,y)$, …, ${P_N}(x,y)$ onto the object image $O(x,y)$. Then a sequence of single-pixel light intensities ${I_1}$, ${I_2}$, …, ${I_N}$ is recorded by the single-pixel bucket detector. For the ${n_{th}}\,(1 \le n \le N)$ illumination pattern, ${I_n}$ is mathematically the inner product between $O(x,y)$ and ${P_n}(x,y)$ , given by Eq. (1).

$${I_n} = \int\!\!\!\int {O(x,y){P_n}(x,y)dxdy}$$
The object image $O(x,y)$ can be reconstructed from all the illumination patterns ${P_n}(x,y)\,(1 \le n \le N)$ and the single-pixel intensity sequence ${I_n}\,(1 \le n \le N)$ by various methods [27,28]. In this work, random binary illumination patterns are used and each pixel in ${P_n}(x,y)$ is randomly set to be 0 or 1. A typical optical setup for SPI is shown in Fig. 2.

 figure: Fig. 2.

Fig. 2. Optical setup of a single-pixel imaging system.

Download Full Size | PDF

2.2 Proposed opaque QR-code visual cryptography with single-pixel imaging

In our first proposed scheme, the secret image is first expanded to multiple QR-code patterns carrying the same information, which are employed as visual key images. The visual key images are printed on opaque sheets instead of conventional transparent sheets. When multiple visual key images are illuminated by multiple sets of identical illumination patterns under the recording of only one single-pixel detector, the secret image can be reconstructed from the recorded single-pixel intensity sequence.

In SPI, if the same set of illumination patterns ${P_n}(x,y)$ are projected to two different object images ${O_1}(x,y)$ and ${O_2}(x,y)$ in the object scene but only one single-pixel detector is used to record the total light intensity, the SPI model will be given by Eq. (2).

$${I_n} = \int\!\!\!\int {[{O_1}(x,y) + {O_2}(x,y)]{P_n}(x,y)dxdy}$$
The finally reconstructed image will be the overlapped result of ${O_1}(x,y)$ and ${O_2}(x,y)$, instead of each individual one. If each object image is one visual key printed on an opaque sheet in VC, a SPI system can perform the VC decoding and retrieve the secret image, shown in Fig. 3.

 figure: Fig. 3.

Fig. 3. QR-code-based opaque VC with SPI: (a) the first QR-code visual key is individually recorded and reconstructed; (b) the second QR-code visual key is individually recorded and reconstructed; (c) the two QR-code visual keys are simultaneously recorded by a single detector and the secret information “1” can be reconstructed.

Download Full Size | PDF

In the previous work [12], visual key images are embellished into QR-code-like appearance. But they are not true QR code patterns and no information can be retrieved from them by a QR code reader. In this work, each visual key is embedded in a true QR code pattern. The advantage of employing a QR code pattern as a visual key compared with a random binary pattern is that the visual key image will have natural visual meaning and becomes less noticeable by the attackers.

One QR code pattern is essentially a square dot matrix and the intensity of each dot (black or white) can represent a binary value (0 or 1). Various kinds of information such as texts and weblinks can be stored in a QR code. The stored information in a QR code can be easily retrieved by a reading device (e.g. a smart cellphone). Due to the error correction coding mechanism, if some square dots in the pattern (within a certain percentage) are modified, the original information can still be correctly retrieved [3638].

Each square dot has two possible intensity values 0 and 1. When two corresponding square dots in the two QR codes are superposed, there are three possible values 0, 1 and 2, shown in Table 1. If the intensity value after overlapping is 1, there is no way to determine whether it is 1 in the first dot and 0 in the second dot, or it is 0 in the first dot and 1 in the second dot, which has strong security features.

Tables Icon

Table 1. Superposed square dot intensity values when two QR codes printed on opaque sheets are overlapped.

For a binary square dot pattern (secret image) hidden in two QR codes by VC, the encoding is realized in the following manner. It is assumed that the secret binary image has the same resolution as the two QR codes. Originally the two visual keys (two QR codes) are identical and carry the same information. If one square dot in the secret image represents 0, the square dots at the corresponding positions in the two QR codes remain unchanged. If one square dot in the secret image represents 1, the square dot at the corresponding position in one of the two QR codes (randomly chosen) will be encoded as 1 and the square dot in another QR code will be encoded as 0. After encoding, when the two QR-code visual keys are overlapped, the secret image can be visually displayed. At the same time, each QR-code visual key still carries its original readable information due to the error correction coding mechanism stated above.

2.3 Proposed visual cryptography in the binary random illumination patterns of single-pixel imaging

Apart from being printed on transparent sheets or opaque sheets, the visual keys in VC can be embedded in the binary illumination patterns of SPI. Conventionally, there is only one sequence of illumination patterns ${P_n}(x,y)\,(1 \le n \le N)$ in SPI. To implement VC, two different sets of illumination patterns ${P_n}(x,y)\,(1 \le n \le N)$ and ${Q_k}(x,y)\,(1 \le k \le N)$ are used. Originally, two sequences are identical and every pixel in each illumination pattern has a random binary intensity value. Similar to the encoding scheme proposed in Section 2.2, the corresponding pixels will be encoded as one “1” and one “0” for each pair of illumination patterns (n = k) if one pixel in the secret image has an intensity of “1”. No change will be made if one pixel in the secret image has an intensity of “0”. Each individual set of illumination patterns can be used for capturing an object image in conventional SPI. However, when the two sets of patterns are simultaneously projected onto two identical object images, its equivalent that the object is illuminated by a set of virtually superposed illumination patterns containing the secret image, given by Eq. (3). It shall be noted that the illumination patterns are virtually overlapped but not actually superposed in all our experiments. In the regions of each virtually superposed pattern corresponding to the foreground of the secret image, all the pixels have identical intensity values and there is no spatial variation. Consequently, these regions will be missing in the reconstructed image based on the working mechanism of SPI. Finally, the secret image can be revealed in the reconstruction result, shown in Fig. 4. In the reconstruction of secret image, either illumination pattern sequence can be used.

$${I_n} = \int\!\!\!\int {O(x,y)[{P_n}(x,y) + {Q_n}(x,y)]dxdy}$$

 figure: Fig. 4.

Fig. 4. Visual cryptography in the binary illumination patterns of SPI: (a) the object image is individually illuminated by the first set of visual-key illumination patterns; (b) the object image is individually illuminated by the second set of visual-key illumination patterns; (c) the two identical object images are simultaneously illuminated by the two sets of visual-key illumination patterns under a single detector and the secret information “1“ can be reconstructed.

Download Full Size | PDF

3. Results and discussions

The two proposed schemes in this work are verified by simulation and experimental results. The experimental setup is shown in Fig. 5. The object image is printed on a paper card and the illumination patterns are projected by a JmGO G3 projector. The single-pixel light intensities are recorded by a Thorlabs FDS1010 photodiode detector and then the data is collected by a NI USB-6216 data acquisition card.

 figure: Fig. 5.

Fig. 5. Experimental setup of our single-pixel imaging system.

Download Full Size | PDF

First, the proposed opaque QR-code VC with SPI is verified. A 33×33 square-dot QR code pattern is generated by an open-source program [39] and it contains the text information “Nanophotonics Research Center”. The error correction level in the QR code generation is set to be “H” level. The text can be retrieved by any QR code reader from the QR code. Then a secret image containing the information “OK” is encoded as two QR-code visual keys by the method described in Section 2.2, shown in Fig. 6. The original information “Nanophotonics Research Center” can still be retrieved from these two modified QR codes in Fig. 6(c) and Fig. 6(d). At the same time, the secret image cannot be directly observed from each individual visual key.

 figure: Fig. 6.

Fig. 6. (a) Original QR code containing the information “Nanophotonics Research Center”; (b) Secret image; (c) QR-code visual key 1; (d) QR-code visual key 2.

Download Full Size | PDF

The two printed QR-code visual keys are employed as the target objects in the SPI experiment. One sequence of binary random illumination patterns with a resolution of 33×33 pixels are projected onto each of the two target objects. The number of illumination patterns is N = 2178. In the optical experiment, the QR-code visual keys are printed on opaque paper cards. First, QR-code visual key 1 is individually captured and reconstructed. Then, QR-code visual key 2 is individually captured and reconstructed. Finally, both two QR-code visual key are placed nearby in the object scene and they are illuminated by two set of identical illumination patterns. The total light intensity is recorded by a single detector. The image reconstruction from the single-pixel intensity sequence is realized by a total variation minimization algorithm [27]. The reconstruction results in the simulation and optical experiment are shown in Fig. 7.

 figure: Fig. 7.

Fig. 7. Simulated reconstruction results of SPI: (a) QR-code visual key 1; (b) QR-code visual key 2; (c) both visual keys are captured by a single detector. Optical experimental reconstruction results of SPI: (d) QR-code visual key 1; (e) QR-code visual key 2; (f) both visual keys are captured by a single detector.

Download Full Size | PDF

From Fig. 7, it can be observed that the binary secret image “OK” can be recovered when the two visual keys are illuminated by identical sequences of illumination patterns simultaneously and the light intensity is captured by a single detector. The reconstruction results in the optical experiments suffer from some noise contamination compared with the reconstruction results in the simulation. But the experimental results generally agree with the theoretical analysis and simulation results. The original information “Nanophotonics Research Center” can be retrieved from all the experimentally reconstructed QR code images by a reader even under noisy conditions, due to the error correction coding mechanism in QR coding, as stated in Section 2.

Our proposed VC in the binary random illumination patterns of SPI is verified as well. Two sets of random binary patterns containing the secret information “OK” are generated. Each pattern has a resolution of 37×37 pixels and there are totally 2738 patterns in each sequence. The first three patterns in each set are shown in Fig. 8 as examples.

 figure: Fig. 8.

Fig. 8. First three patterns in the two sets of illumination patterns and corresponding superposed results.

Download Full Size | PDF

From each individual set of illumination patterns, the secret image is not observable. But the secret information will be recovered whenever any two corresponding patterns from the two sets are superposed. In the SPI experiment, first each illumination pattern sequence is individually projected onto a “pepper” image printed on a paper card and the object image can be reconstructed by total variation minimization from the recorded single-pixel intensities, which is a conventional SPI process. Then, two copies of the same printed “pepper” image are placed in the object scene and they are separately illuminated by each set of illumination patterns. Only one single-pixel detector is used to record the total light intensity. The object image is reconstructed based on the single-pixel intensity sequence and either set of illumination patterns. Three different sampling ratios S = 2, S = 1, and S = 0.5 corresponding to N = 2738, N = 1369, and N = 685 are attempted. The reconstruction results are shown in Fig. 9.

 figure: Fig. 9.

Fig. 9. Reconstruction results for our proposed VC in the binary random illumination patterns of SPI: (a) only the first set of illumination patterns are projected onto the object; (b) only the second set of illumination patterns are projected onto the object; (c) two sets of illumination patterns are projected onto two identical objects and the first set of patterns are used for reconstruction; (d) two sets of illumination patterns are projected onto two identical objects and the second set of patterns are used for reconstruction.

Download Full Size | PDF

It can be observed that the object image can be reconstructed in a conventional way when either illumination sequence is individually projected. The quality of reconstructed images will be enhanced as the sampling ratio is higher. The experimental reconstruction results have some quality degradation compared with the simulation results due to noise and distortion. When the two illumination pattern sequences are projected onto two identical objects simultaneously, the secret image “OK” can be recovered in the reconstruction results. Even when the sampling ratio is reduced to 0.5, the secret image can still be observed. In the reconstruction, either illumination pattern sequence can be used and the visual qualities of recovered secret images are similar.

In addition, another different object image is tested under the same conditions and the results are shown in Fig. 10. It can be observed that the secret information “OK” can be recovered as well. Since the secret image is hidden in the two sets of illumination patterns, this scheme can be implemented for different object images as long as the designed illumination patterns are used.

 figure: Fig. 10.

Fig. 10. Recovered secret image for our proposed VC in the binary random illumination patterns of SPI when a different object image is used: (a) reconstruction with the first set of illumination patterns; (b) reconstruction with the second set of illumination patterns.

Download Full Size | PDF

In the current optical setup for these two visual cryptography schemes, the two object images are placed nearby and the two sets of illumination patterns are projected close to each other. In fact, the pattern illumination for the two objects are not necessarily performed nearby [30,33]. They can be separately performed out of the line-of-sight and even at two far-away locations. The total light intensity can be collected by the single-pixel detector as long as the two object scenes are within the detection range. In comparison, the visual keys have to be placed in the same location and overlapped for decryption in conventional VC. The potential advantage of long-distance VC in our proposed scheme will be favorable for some security applications.

The hiding capacity of secret image information in these two schemes is not unlimited. For the QR-code VC with SPI scheme, the hiding capacity is limited by the error correction capability of QR codes. Reed-Solomon (RS) error correction coding is adopted in QR codes [38]. In RS coding, every eight neighboring binary square dots in a QR code pattern constitute one symbol. One symbol is considered to be correct if all the square dots it contains are correct and one symbol is considered to be wrong as long as any one single square dot is wrong. For every n symbols, at maximum t wrong symbols can be corrected during decoding. For QR codes with H error correction level, t/n is around 30%. When the number of wrong symbols within a group of n symbols is beyond t, the errors cannot be fully corrected and the information stored in the QR code pattern may fail to be retrieved. In our proposed QR-code VC scheme, some square dots in the original QR code patterns are modified for hiding the secret image so there will be some wrong square dots in the two visual key QR codes. If the number of wrong symbols caused by these wrong square dots exceeds the error correction limit, the QR code patterns may become not readable. One example is shown in Fig. 11 when two “OK” texts are hidden in the two 33×33 QR-code visual keys. It can be found that the originally stored information “Nanophotonics Research Center” cannot be retrieved any more by a QR-code reading device. It shall be noted that the secret image can still be visually reconstructed in this case. But the QR-code visual keys are not readable by a reader and they will be less secure and more noticeable by the attackers.

 figure: Fig. 11.

Fig. 11. One example of embedded secret information exceeding the error correction limit in the QR-code VC with SPI scheme: (a) QR-code visual key 1; (b) QR-code visual key 2; (c) reconstructed secret image from the two visual keys.

Download Full Size | PDF

Under the same error correction limit, more complicated secret image information can be hidden by QR-code visual keys with larger sizes. For example, the texts of three authors’ names or a “hand” image can be hidden by readable QR-code visual keys consisting of 154×154 square dots, shown in Fig. 12. The abstract of this paper is originally stored in each visual key.

 figure: Fig. 12.

Fig. 12. Reconstructed secret image by QR-code visual keys with 154×154 square dots: (a) texts of three authors’ names; (b) “hand” image.

Download Full Size | PDF

Unlike the first proposed scheme, there is no error correction limit for the second proposed VC scheme in the binary random illumination patterns of SPI. When the number of pixels in each illumination pattern for hiding the secret image increases, the reconstructed object image quality will not be affected when one individual set of illumination patterns are used. Each individual set of illumination patterns remain to be random patterns regardless of how much information is hidden. However, the quality of the reconstruction result containing the secret image will be increasingly degraded as the secret image occupies more pixels in each illumination pattern when both sets of illumination patterns are projected onto identical objects. For random illumination patterns with 64×64 pixels, a “dog” secret image with varying foreground sizes is hidden by our second proposed scheme and the results are shown in Fig. 13. The PSNR values for Fig. 13(d), Fig. 13(e) and Fig. 13(f) are 21.9225 dB, 20.4904 dB and 18.2448 dB respectively. Therefore the number of foreground pixels in the secret image usually needs to be smaller than the number of pixels in each illumination pattern to a certain extent.

 figure: Fig. 13.

Fig. 13. Reconstruction results for our proposed VC in the binary random illumination patterns of SPI (Sampling Ratio = 2) when only the first set of illumination patterns are projected onto the object image: (a) small-size secret image; (b) medium-size secret image; (c) large-size secret image; when both sets of illumination patterns are projected onto two identical object images: (d) small-size secret image; (e) medium-size secret image; (f) large-size secret image.

Download Full Size | PDF

4. Conclusion

Visual cryptography (VC) is an optical image encryption technique allowing the secret image to be recovered when multiple visual key images are overlapped. Conventionally, the visual key images are printed on transparent sheets and they have to be placed at the same location for overlapping. In addition, each visual key image may be easily noticed by attackers.

In this work, VC is implemented under the framework of single-pixel imaging (SPI) and two new schemes are proposed. The overlapping of pixel intensities in VC is realized by the light intensity superposition under the single-pixel detection in SPI.

In the first proposed scheme, the visual key images are printed on opaque sheets instead of conventional transparent sheets. When multiple visual key images are illuminated by multiple sets of identical illumination patterns under the recording of only one single-pixel detector, the secret image can be reconstructed from the recorded single-pixel intensity sequence. In addition, secure visual keys disguised as readable QR code patterns are designed.

In the second proposed scheme, the visual key images are embedded in the binary random illumination patterns of SPI, which is hard to be noticed by attackers. When multiple visual-key illumination patterns are projected onto multiple identical items under the recording of only one single-pixel detector, the secret image can be reconstructed as well. From each individual illumination pattern sequence, the secret image is not observable.

These two proposed schemes are verified by simulation and experimental results. The application of VC can be extended to more diversified scenarios by our proposed schemes.

Funding

National Natural Science Foundation of China (61805145, 11774240); Leading Talents Program of Guangdong Province (00201505); Natural Science Foundation of Guangdong Province (2016A030312010).

Disclosures

The authors declare no conflicts of interest.

References

1. O. Kafri and E. Keren, “Encryption of pictures and shapes by random grids,” Opt. Lett. 12(6), 377–379 (1987). [CrossRef]  

2. M. Naor and A. Shamir, “Visual cryptography,” Lect. Notes Comput. Sci. 950, 1–12 (1995). [CrossRef]  

3. Z. Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography,” IEEE Trans. Image Process. 15(8), 2441–2453 (2006). [CrossRef]  

4. C. Blundo, A. D. Santis, and M. Naor, “Visual cryptography for grey level images,” Inform. Process. Lett. 75(6), 255–259 (2000). [CrossRef]  

5. G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Extended capabilities for visual cryptography,” Theor. Comput. Sci. 250(1-2), 143–161 (2001). [CrossRef]  

6. Y. C. Hou, “Visual cryptography for color images,” Pattern Recogn. Lett. 36(7), 1619–1629 (2003). [CrossRef]  

7. C. C. Lin and W. H. Tsai, “Visual cryptography for gray-level images by dithering techniques,” Pattern Recogn. Lett. 24(1-3), 349–358 (2003). [CrossRef]  

8. Z. Wang, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography via error diffusion,” IEEE Trans. Inf. Foren. Sec. 4(3), 383–396 (2009). [CrossRef]  

9. Y. W. Chow, W. Susilo, G. Yang, J. G. Phillips, I. Pranata, and A. M. Barmawi, “Exploiting the error correction mechanism in QR codes for secret sharing,” In Proceedings of Australasian Conference on Information Security and Privacy (Springer, 2016), pp. 409–425.

10. S. Wan, Y. Lu, X. Yan, Y. Wang, and C. Chang, “Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions,” J. Real-Time Image Proc. 14(1), 25–40 (2018). [CrossRef]  

11. Y. Shi and X. Yang, “Optical hiding with visual cryptography,” J. Opt. 19(11), 115703 (2017). [CrossRef]  

12. N. Yang, Q. Gao, and Y. Shi, “Visual-cryptographic image hiding with holographic optical elements,” Opt. Express 26(24), 31995–32006 (2018). [CrossRef]  

13. W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photonics 6(2), 120–155 (2014). [CrossRef]  

14. S. Liu, C. Guo, and J. T. Sheridan, “A review of optical image encryption techniques,” Opt. Laser Technol. 57, 327–342 (2014). [CrossRef]  

15. S. Jiao, C. Zhou, Y. Shi, W. Zou, and X. Li, “Review on optical image hiding and watermarking techniques,” Opt. Laser Technol. 109, 370–380 (2019). [CrossRef]  

16. D. Lu, M. Liao, W. He, Q. Xing, G. Verma, and X. Peng, “Experimental optical secret sharing via an iterative phase retrieval algorithm,” Opt. Laser. Eng. 126, 105904 (2020). [CrossRef]  

17. Y. Shi and X. Yang, “Invisible visual cryptography,” Chin. Phys. Lett. 34(11), 114204 (2017). [CrossRef]  

18. Z. Li, G. Dong, D. Yang, G. Li, S. Shi, K. Bi, and J. Zhou, “Efficient dielectric metasurface hologram for visual-cryptographic image hiding,” Opt. Express 27(14), 19212–19217 (2019). [CrossRef]  

19. M. P. Edgar, G. M. Gibson, and M. J. Padgett, “Principles and prospects for single-pixel imaging,” Nat. Photonics 13(1), 13–20 (2019). [CrossRef]  

20. M. F. Duarte, M. A. Davenport, D. Takhar, J. N. Laska, T. Sun, K. F. Kelly, and R. G. Baraniuk, “Single-pixel imaging via compressive sampling,” IEEE Sig. Process. Mag. 25(2), 83–91 (2008). [CrossRef]  

21. B. Sun, M. P. Edgar, R. Bowman, L. E. Vittert, S. Welsh, A. Bowman, and M. J. Padgett, “3D computational imaging with single-pixel detectors,” Science 340(6134), 844–847 (2013). [CrossRef]  

22. E. Salvador-Balaguer, P. Latorre-Carmona, C. Chabert, F. Pla, J. Lancis, and E. Tajahuerce, “Low-cost single-pixel 3D imaging by using an LED array,” Opt. Express 26(12), 15623–15631 (2018). [CrossRef]  

23. Z. Zhang, X. Ma, and J. Zhong, “Single-pixel imaging by means of Fourier spectrum acquisition,” Nat. Commun. 6(1), 6225 (2015). [CrossRef]  

24. S. Jiao, M. Sun, Y. Gao, T. Lei, Z. Xie, and X. Yuan, “Motion estimation and quality enhancement for a single image in dynamic single-pixel imaging,” Opt. Express 27(9), 12841–12854 (2019). [CrossRef]  

25. S. Jiao, J. Feng, Y. Gao, T. Lei, Z. Xie, and X. Yuan, “Optical machine learning with incoherent light and a single-pixel detector,” Opt. Lett. 44(21), 5186–5189 (2019). [CrossRef]  

26. J. P. Liu, T. Tahara, Y. Hayasaki, and T. C. Poon, “Incoherent digital holography: a review,” Appl. Sci. 8(1), 143 (2018). [CrossRef]  

27. L. Bian, J. Suo, Q. Dai, and F. Chen, “Experimental comparison of single-pixel imaging algorithms,” J. Opt. Soc. Am. A 35(1), 78–87 (2018). [CrossRef]  

28. G. Wang, H. Zheng, Y. Zhou, H. Chen, J. Liu, Y. He, Y. Yuan, F. Li, and Z. Xu, “All-optical naked-eye ghost imaging,” arXiv:1904.06530 (2019).

29. P. Clemente, V. Durán, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35(14), 2391–2393 (2010). [CrossRef]  

30. Z. Zhang, S. Jiao, M. Yao, X. Li, and J. Zhong, “Secured single-pixel broadcast imaging,” Opt. Express 26(11), 14578–14591 (2018). [CrossRef]  

31. M. Tanha, R. Kheradmand, and S. Ahmadi-Kandjani, “Gray-scale and color optical encryption based on computational ghost imaging,” Appl. Phys. Lett. 101(10), 101108 (2012). [CrossRef]  

32. S. Yuan, X. Liu, X. Zhou, and Z. Li, “Multiple-image encryption scheme with a single-pixel detector,” J. Mod. Opt. 63(15), 1457–1465 (2016). [CrossRef]  

33. C. Zhang, W. He, B. Han, M. Liao, D. Lu, X. Peng, and C. Xu, “Compressive optical steganography via single-pixel imaging,” Opt. Express 27(9), 13469–13478 (2019). [CrossRef]  

34. S. Jiao, T. Lei, Y. Gao, Z. Xie, and X. Yuan, “Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging,” IEEE Access 7, 119557–119565 (2019). [CrossRef]  

35. C. Zhang, B. Han, W. He, X. Peng, and C. Xu, “A novel compressive optical encryption via single-pixel imaging,” IEEE Photonics J. 11(4), 1–8 (2019). [CrossRef]  

36. S. Jiao, W. Zou, and X. Li, “QR code based noise-free optical encryption and decryption of a gray scale image,” Opt. Commun. 387, 235–240 (2017). [CrossRef]  

37. J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21(5), 5373–5378 (2013). [CrossRef]  

38. S. Jiao, Z. Jin, C. Zhou, W. Zou, and X. Li, “Is QR code an optimal data container in optical encryption systems from an error-correction coding perspective?” J. Opt. Soc. Am. A 35(1), A23–A29 (2018). [CrossRef]  

39. http://generator.onbarcode.com/online-qr-code-barcode-generator.aspx

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (13)

Fig. 1.
Fig. 1. Example of VC: (a) visual key 1; (b) visual key 2; (c) visually decoded secret image when the two visual keys printed on transparent sheets are overlapped.
Fig. 2.
Fig. 2. Optical setup of a single-pixel imaging system.
Fig. 3.
Fig. 3. QR-code-based opaque VC with SPI: (a) the first QR-code visual key is individually recorded and reconstructed; (b) the second QR-code visual key is individually recorded and reconstructed; (c) the two QR-code visual keys are simultaneously recorded by a single detector and the secret information “1” can be reconstructed.
Fig. 4.
Fig. 4. Visual cryptography in the binary illumination patterns of SPI: (a) the object image is individually illuminated by the first set of visual-key illumination patterns; (b) the object image is individually illuminated by the second set of visual-key illumination patterns; (c) the two identical object images are simultaneously illuminated by the two sets of visual-key illumination patterns under a single detector and the secret information “1“ can be reconstructed.
Fig. 5.
Fig. 5. Experimental setup of our single-pixel imaging system.
Fig. 6.
Fig. 6. (a) Original QR code containing the information “Nanophotonics Research Center”; (b) Secret image; (c) QR-code visual key 1; (d) QR-code visual key 2.
Fig. 7.
Fig. 7. Simulated reconstruction results of SPI: (a) QR-code visual key 1; (b) QR-code visual key 2; (c) both visual keys are captured by a single detector. Optical experimental reconstruction results of SPI: (d) QR-code visual key 1; (e) QR-code visual key 2; (f) both visual keys are captured by a single detector.
Fig. 8.
Fig. 8. First three patterns in the two sets of illumination patterns and corresponding superposed results.
Fig. 9.
Fig. 9. Reconstruction results for our proposed VC in the binary random illumination patterns of SPI: (a) only the first set of illumination patterns are projected onto the object; (b) only the second set of illumination patterns are projected onto the object; (c) two sets of illumination patterns are projected onto two identical objects and the first set of patterns are used for reconstruction; (d) two sets of illumination patterns are projected onto two identical objects and the second set of patterns are used for reconstruction.
Fig. 10.
Fig. 10. Recovered secret image for our proposed VC in the binary random illumination patterns of SPI when a different object image is used: (a) reconstruction with the first set of illumination patterns; (b) reconstruction with the second set of illumination patterns.
Fig. 11.
Fig. 11. One example of embedded secret information exceeding the error correction limit in the QR-code VC with SPI scheme: (a) QR-code visual key 1; (b) QR-code visual key 2; (c) reconstructed secret image from the two visual keys.
Fig. 12.
Fig. 12. Reconstructed secret image by QR-code visual keys with 154×154 square dots: (a) texts of three authors’ names; (b) “hand” image.
Fig. 13.
Fig. 13. Reconstruction results for our proposed VC in the binary random illumination patterns of SPI (Sampling Ratio = 2) when only the first set of illumination patterns are projected onto the object image: (a) small-size secret image; (b) medium-size secret image; (c) large-size secret image; when both sets of illumination patterns are projected onto two identical object images: (d) small-size secret image; (e) medium-size secret image; (f) large-size secret image.

Tables (1)

Tables Icon

Table 1. Superposed square dot intensity values when two QR codes printed on opaque sheets are overlapped.

Equations (3)

Equations on this page are rendered with MathJax. Learn more.

I n = O ( x , y ) P n ( x , y ) d x d y
I n = [ O 1 ( x , y ) + O 2 ( x , y ) ] P n ( x , y ) d x d y
I n = O ( x , y ) [ P n ( x , y ) + Q n ( x , y ) ] d x d y
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.