You have attempted to access the full-text of an Early Posting article. Access is available via an institutional subscription.

See the Early Posting FAQ page for additional information.

Speckle visual cryptography for credentials authentication

Applied Optics
  • Yishi Shi, anqing jiao, Zhu Yupeng, Zhaoke Mi, Long Zhou, Qiaofen Zhu, and changjun ke
  • received 03/04/2024; accepted 04/30/2024; posted 04/30/2024; Doc. ID 522918
  • Abstract: Based on the high random distribution characteristic of natural speckle image, a newmethod of speckle visual cryptography is designed by combining the natural speckle imagewith the secret key in visual cryptography. And for the first time, we design a authenticationsystem for user credentials by combining speckle visual cryptography and QR code. By usingspeckle visual cryptography method, the image of QR code carrying user authenticationinformation is hidden in the speckle image, and the speckle image is printed on the papercredentials. Through simulation and analog experiments, we verify the possibility of applyingspeckle visual cryptography to user credentials authentication system, and compare theimproved grayscale reordering algorithm and grayscale reordering algorithm, and prove thatthe improved grayscale reordering algorithm has more advantages in this system by comparingPSNR and SSIM. Finally, the anti-interference ability and the uniqueness of the virtual secretkey in the system are analyzed to prove that the secret key has high anti-interference abilityand security.