Suppr超能文献

一种基于计算机生成全息图加密的有价文件安全与防伪补充方法。

A Complementary Approach for Securing and Anti-Counterfeiting of Valuable Documents Based on Encryption of Computer-Generated Hologram.

作者信息

Ahmed Zakaria E, Abdelazeem Rania M, Attia Yasser A, Khattab Tawfik A, Falldorf Claas, Bergmann Ralf B, Agour Mostafa

机构信息

Laser Applications in Metrology, Photochemistry, and Agriculture Department, National Institute of Laser Enhanced Science, Cairo University, Giza 12613, Egypt.

Central Administration for Counterfeiting and Forgery Research, Forensic Medicine Authority, Ministry of Justice, Cairo 11797, Egypt.

出版信息

Sensors (Basel). 2025 Apr 10;25(8):2410. doi: 10.3390/s25082410.

Abstract

We present a novel approach for securing valuable documents using a complementary approach based on the encryption of computer-generated holograms (CGHs). The proposed approach utilizes the well-known iterative Fourier transform algorithm (IFTA) to generate a phase-only CGH for valuable digital and/or physical documents. The generated CGH is then secured by binary phase randomization, which is implemented using the symmetric encryption technique, exclusive OR (XOR). The reconstruction process for the calculated secured CGHs varied slightly depending on whether the documents were digital or physical. For digital documents, reconstruction was performed using a symmetric decryption key followed by an inverse Fourier transform (IFFT). On the other hand, the reconstruction of the physical document involved two additional processes: printing and scanning. To evaluate the quality of the digital reconstruction, the speckle signal-to-noise ratio (SSNR) was estimated for both printed grayscale and binary CGHs. The security analysis of the XOR-encrypted CGH was quantitatively evaluated to ensure the level of protection against various cryptographic attacks such as plaintext and brute-force attacks. The results revealed that the combination of phase CGHs and the XOR encryption/decryption provides robust cryptographic protection for valuable documents, benefiting document security and anti-counterfeiting.

摘要

我们提出了一种新颖的方法,通过基于计算机生成全息图(CGH)加密的互补方法来保护有价值的文件。所提出的方法利用著名的迭代傅里叶变换算法(IFTA)为有价值的数字和/或物理文件生成仅相位的CGH。然后,通过二进制相位随机化来保护生成的CGH,这是使用对称加密技术异或(XOR)实现的。对于计算出的安全CGH,其重建过程根据文件是数字的还是物理的而略有不同。对于数字文件,使用对称解密密钥进行重建,然后进行傅里叶逆变换(IFFT)。另一方面,物理文件的重建涉及两个额外的过程:打印和扫描。为了评估数字重建的质量,对打印的灰度和二进制CGH都估计了散斑信噪比(SSNR)。对异或加密的CGH的安全性分析进行了定量评估,以确保针对各种密码攻击(如明文攻击和暴力攻击)的保护级别。结果表明,相位CGH与异或加密/解密的组合为有价值的文件提供了强大的密码保护,有利于文件安全和防伪。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6c44/12031057/b45da6296033/sensors-25-02410-g001.jpg

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验