Suppr超能文献

一种基于计算机生成全息图加密的有价文件安全与防伪补充方法。

A Complementary Approach for Securing and Anti-Counterfeiting of Valuable Documents Based on Encryption of Computer-Generated Hologram.

作者信息

Ahmed Zakaria E, Abdelazeem Rania M, Attia Yasser A, Khattab Tawfik A, Falldorf Claas, Bergmann Ralf B, Agour Mostafa

机构信息

Laser Applications in Metrology, Photochemistry, and Agriculture Department, National Institute of Laser Enhanced Science, Cairo University, Giza 12613, Egypt.

Central Administration for Counterfeiting and Forgery Research, Forensic Medicine Authority, Ministry of Justice, Cairo 11797, Egypt.

出版信息

Sensors (Basel). 2025 Apr 10;25(8):2410. doi: 10.3390/s25082410.

Abstract

We present a novel approach for securing valuable documents using a complementary approach based on the encryption of computer-generated holograms (CGHs). The proposed approach utilizes the well-known iterative Fourier transform algorithm (IFTA) to generate a phase-only CGH for valuable digital and/or physical documents. The generated CGH is then secured by binary phase randomization, which is implemented using the symmetric encryption technique, exclusive OR (XOR). The reconstruction process for the calculated secured CGHs varied slightly depending on whether the documents were digital or physical. For digital documents, reconstruction was performed using a symmetric decryption key followed by an inverse Fourier transform (IFFT). On the other hand, the reconstruction of the physical document involved two additional processes: printing and scanning. To evaluate the quality of the digital reconstruction, the speckle signal-to-noise ratio (SSNR) was estimated for both printed grayscale and binary CGHs. The security analysis of the XOR-encrypted CGH was quantitatively evaluated to ensure the level of protection against various cryptographic attacks such as plaintext and brute-force attacks. The results revealed that the combination of phase CGHs and the XOR encryption/decryption provides robust cryptographic protection for valuable documents, benefiting document security and anti-counterfeiting.

摘要

我们提出了一种新颖的方法,通过基于计算机生成全息图(CGH)加密的互补方法来保护有价值的文件。所提出的方法利用著名的迭代傅里叶变换算法(IFTA)为有价值的数字和/或物理文件生成仅相位的CGH。然后,通过二进制相位随机化来保护生成的CGH,这是使用对称加密技术异或(XOR)实现的。对于计算出的安全CGH,其重建过程根据文件是数字的还是物理的而略有不同。对于数字文件,使用对称解密密钥进行重建,然后进行傅里叶逆变换(IFFT)。另一方面,物理文件的重建涉及两个额外的过程:打印和扫描。为了评估数字重建的质量,对打印的灰度和二进制CGH都估计了散斑信噪比(SSNR)。对异或加密的CGH的安全性分析进行了定量评估,以确保针对各种密码攻击(如明文攻击和暴力攻击)的保护级别。结果表明,相位CGH与异或加密/解密的组合为有价值的文件提供了强大的密码保护,有利于文件安全和防伪。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6c44/12031057/b45da6296033/sensors-25-02410-g001.jpg

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验