A Complementary Approach for Securing and Anti-Counterfeiting of Valuable Documents Based on Encryption of Computer-Generated Hologram

基于计算机生成全息图加密的贵重文件安全防伪补充方法

阅读:1

Abstract

We present a novel approach for securing valuable documents using a complementary approach based on the encryption of computer-generated holograms (CGHs). The proposed approach utilizes the well-known iterative Fourier transform algorithm (IFTA) to generate a phase-only CGH for valuable digital and/or physical documents. The generated CGH is then secured by binary phase randomization, which is implemented using the symmetric encryption technique, exclusive OR (XOR). The reconstruction process for the calculated secured CGHs varied slightly depending on whether the documents were digital or physical. For digital documents, reconstruction was performed using a symmetric decryption key followed by an inverse Fourier transform (IFFT). On the other hand, the reconstruction of the physical document involved two additional processes: printing and scanning. To evaluate the quality of the digital reconstruction, the speckle signal-to-noise ratio (SSNR) was estimated for both printed grayscale and binary CGHs. The security analysis of the XOR-encrypted CGH was quantitatively evaluated to ensure the level of protection against various cryptographic attacks such as plaintext and brute-force attacks. The results revealed that the combination of phase CGHs and the XOR encryption/decryption provides robust cryptographic protection for valuable documents, benefiting document security and anti-counterfeiting.

特别声明

1、本页面内容包含部分的内容是基于公开信息的合理引用;引用内容仅为补充信息,不代表本站立场。

2、若认为本页面引用内容涉及侵权,请及时与本站联系,我们将第一时间处理。

3、其他媒体/个人如需使用本页面原创内容,需注明“来源:[生知库]”并获得授权;使用引用内容的,需自行联系原作者获得许可。

4、投稿及合作请联系:info@biocloudy.com。