麻豆淫院

June 13, 2006

Scientists develop algorithm for ultra-secret security technique

Using a security technique called 鈥渙ptical Fresnel image hiding,鈥 scientists can hide a secret image (such as the woman on the right) using algorithm keys that modulate the image鈥檚 light amplitude from a host image (such as the tower on the left). In contrast to other optical image hiding methods, the secret image is not embedded into the host image, decreasing the risk of hacking. Image credit: Yishi Shi et al.
× close
Using a security technique called 鈥渙ptical Fresnel image hiding,鈥 scientists can hide a secret image (such as the woman on the right) using algorithm keys that modulate the image鈥檚 light amplitude from a host image (such as the tower on the left). In contrast to other optical image hiding methods, the secret image is not embedded into the host image, decreasing the risk of hacking. Image credit: Yishi Shi et al.

To achieve a high capacity security system that is exceedingly robust to attacks, scientists have developed a set of instructions to unlock secret information, avoiding the need for embedding images and the risks involved.

Information theft has become one of the most feared types of theft due to the vast power that comes with possessing certain information. Our numbers 鈥 social security numbers, credit card numbers, passwords, bank accounts, etc. 鈥 give authorization to access private documents and assets, and attempts to hack such accounts are ongoing.

Optical security, which consists of hiding a secret image and includes methods such as holography and virtual optics, has been a growing field in security over the last few years. Until now, optical techniques have required the embedment of a secret image in a host image. Although a logical hiding procedure, embedded images can often be found in watermarked images, jeopardizing the security of the system. (Watermarks are the visible but difficult-to-replicate marks used to protect against fraud, while the host image is the visible, normally printed image covering the secret information.)

To address this problem of finding the secret image in the watermark, scientists have developed a new optical security method that doesn鈥檛 require embedment. Instead, the technique uses a phase retrieval algorithm to generate specific optical and phase keys that extract the secret information when applied. The optical keys contain information and are distributed to an individual through a personal identification number (PIN). The information contained in the phase keys (the main source for determining extraction) is distributed to the individual separately.

Get free science updates with Science X Daily and Weekly Newsletters 鈥 to customize your preferences!

鈥淭he phase keys, designed by the phase retrieval algorithm, modulate the amplitude of the input [host] image into the amplitude of the secret image by the two Fresnel transformations,鈥 Yishi Shi, coauthor of the paper in a recent issue of Journal of Optics A, told 麻豆淫院Org.com. 鈥淭he phase keys are the main keys for the extraction of the secret image. The second type of key, the additional optical keys (which include the wavelength key and the mask position key) are also employed in our Fresnel system, which help to achieve a higher security level than can be achieved by Fourier systems.鈥

This technique, which the scientists call 鈥渙ptical Fresnel image hiding (OFIH)鈥, satisfies 鈥渢he three most important requirements in image hiding,鈥 according to the team. Because no embedding occurs 鈥 meaning that the secret image cannot be found in the watermarked image 鈥 the method satisfies the so-called 鈥渋mperceptibility requirement.鈥 Since the watermarked image contains no secret information, and the phase keys are the main method for extraction, the OFIH method also satisfies the 鈥渞obustness requirement.鈥 Finally, since the secret image is the same size as the host image, this method also satisfies the 鈥渃apacity requirement.鈥

Another advantage of this optical technique is that one host image can hide several different secret images. In addition, one secret image can be hidden in different host images. These multiple variations further enhance the flexibility and robustness of the system.

鈥淭his system is designed as a fragile system that may be used for authentication, and also could be designed as a robust or semi-fragile system for the purpose of image hiding or digital watermarking,鈥 said Shi. 鈥淚f we adopt the pure digital method to apply the Fresnel system, its realization will much easier. Thus, the flexibility of the designs for different application purposes is also obtained in the OFIH, allowing us to implement the system either by pure digital method or the opt-digital method.鈥

Citation: Shi, Yishi, Situ, Guohai and Zhang, Jingjuan. Optical image hiding in the Fresnel domain. Journal of Optics A: Pure and Applied Optics. 8 (2006) 569-577.

By Lisa Zyga, Copyright 2006 麻豆淫院Org.com. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Load comments (0)

This article has been reviewed according to Science X's and . have highlighted the following attributes while ensuring the content's credibility:

Get Instant Summarized Text (GIST)

This summary was automatically generated using LLM.