{"id":"https:\/\/openalex.org\/W4312108604","doi":"https:\/\/doi.org\/10.48550\/arxiv.2212.11233","title":"Realization Scheme for Visual Cryptography with Computer-generated Holograms","display_name":"Realization Scheme for Visual Cryptography with Computer-generated Holograms","publication_year":2022,"publication_date":"2022-12-10","ids":{"openalex":"https:\/\/openalex.org\/W4312108604","doi":"https:\/\/doi.org\/10.48550\/arxiv.2212.11233"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2212.11233","is_oa":true,"landing_page_url":"http:\/\/arxiv.org\/abs\/2212.11233","pdf_url":"https:\/\/arxiv.org\/pdf\/2212.11233","source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https:\/\/arxiv.org\/pdf\/2212.11233","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5100402028","display_name":"Changyuan Yu","orcid":"https:\/\/orcid.org\/0000-0002-3185-0441"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yu, Tao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5101619473","display_name":"Jinge Ma","orcid":"https:\/\/orcid.org\/0000-0002-7504-8362"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ma, Jinge","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5100601440","display_name":"Guilin Li","orcid":"https:\/\/orcid.org\/0000-0003-4261-7714"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Guilin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5101009989","display_name":"Dongyu Yang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yang, Dongyu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5100710178","display_name":"Rui Ma","orcid":"https:\/\/orcid.org\/0000-0002-0242-9797"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ma, Rui","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5064710473","display_name":"Yishi Shi","orcid":"https:\/\/orcid.org\/0000-0003-4970-3391"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shi, Yishi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https:\/\/openalex.org\/A5100402028"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T11408","display_name":"Advanced Optical Imaging Technologies","score":0.9800000190734863,"subfield":{"id":"https:\/\/openalex.org\/subfields\/2214","display_name":"Media Technology"},"field":{"id":"https:\/\/openalex.org\/fields\/22","display_name":"Engineering"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T11408","display_name":"Advanced Optical Imaging Technologies","score":0.9800000190734863,"subfield":{"id":"https:\/\/openalex.org\/subfields\/2214","display_name":"Media Technology"},"field":{"id":"https:\/\/openalex.org\/fields\/22","display_name":"Engineering"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.973800003528595,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T11017","display_name":"Chaos-based Image\/Signal Encryption","score":0.9502999782562256,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/visual-cryptography","display_name":"Visual cryptography","score":0.9497025012969971},{"id":"https:\/\/openalex.org\/keywords\/cryptography","display_name":"Cryptography","score":0.7806237936019897},{"id":"https:\/\/openalex.org\/keywords\/computer-science","display_name":"Computer science","score":0.7005506157875061},{"id":"https:\/\/openalex.org\/keywords\/holography","display_name":"Holography","score":0.6779114603996277},{"id":"https:\/\/openalex.org\/keywords\/neural-cryptography","display_name":"Neural cryptography","score":0.5598849058151245},{"id":"https:\/\/openalex.org\/keywords\/scheme","display_name":"Scheme (mathematics)","score":0.44642847776412964},{"id":"https:\/\/openalex.org\/keywords\/range","display_name":"Range (aeronautics)","score":0.4320928752422333},{"id":"https:\/\/openalex.org\/keywords\/realization","display_name":"Realization (probability)","score":0.4255695641040802},{"id":"https:\/\/openalex.org\/keywords\/computer-vision","display_name":"Computer vision","score":0.39018625020980835},{"id":"https:\/\/openalex.org\/keywords\/encryption","display_name":"Encryption","score":0.348436176776886},{"id":"https:\/\/openalex.org\/keywords\/computer-security","display_name":"Computer security","score":0.23734936118125916},{"id":"https:\/\/openalex.org\/keywords\/public-key-cryptography","display_name":"Public-key cryptography","score":0.19637927412986755},{"id":"https:\/\/openalex.org\/keywords\/mathematics","display_name":"Mathematics","score":0.18015286326408386},{"id":"https:\/\/openalex.org\/keywords\/optics","display_name":"Optics","score":0.14373061060905457},{"id":"https:\/\/openalex.org\/keywords\/engineering","display_name":"Engineering","score":0.09049764275550842},{"id":"https:\/\/openalex.org\/keywords\/physics","display_name":"Physics","score":0.06686246395111084}],"concepts":[{"id":"https:\/\/openalex.org\/C2779072331","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1597418","display_name":"Visual cryptography","level":4,"score":0.9497025012969971},{"id":"https:\/\/openalex.org\/C178489894","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q8789","display_name":"Cryptography","level":2,"score":0.7806237936019897},{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.7005506157875061},{"id":"https:\/\/openalex.org\/C187590223","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q527628","display_name":"Holography","level":2,"score":0.6779114603996277},{"id":"https:\/\/openalex.org\/C126954023","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q4316440","display_name":"Neural cryptography","level":4,"score":0.5598849058151245},{"id":"https:\/\/openalex.org\/C77618280","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.44642847776412964},{"id":"https:\/\/openalex.org\/C204323151","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.4320928752422333},{"id":"https:\/\/openalex.org\/C2781089630","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21856745","display_name":"Realization (probability)","level":2,"score":0.4255695641040802},{"id":"https:\/\/openalex.org\/C31972630","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q844240","display_name":"Computer vision","level":1,"score":0.39018625020980835},{"id":"https:\/\/openalex.org\/C148730421","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q141090","display_name":"Encryption","level":2,"score":0.348436176776886},{"id":"https:\/\/openalex.org\/C38652104","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3510521","display_name":"Computer security","level":1,"score":0.23734936118125916},{"id":"https:\/\/openalex.org\/C203062551","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q201339","display_name":"Public-key cryptography","level":3,"score":0.19637927412986755},{"id":"https:\/\/openalex.org\/C33923547","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q395","display_name":"Mathematics","level":0,"score":0.18015286326408386},{"id":"https:\/\/openalex.org\/C120665830","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q14620","display_name":"Optics","level":1,"score":0.14373061060905457},{"id":"https:\/\/openalex.org\/C127413603","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11023","display_name":"Engineering","level":0,"score":0.09049764275550842},{"id":"https:\/\/openalex.org\/C121332964","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q413","display_name":"Physics","level":0,"score":0.06686246395111084},{"id":"https:\/\/openalex.org\/C3087436","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1386603","display_name":"Secret sharing","level":3,"score":0},{"id":"https:\/\/openalex.org\/C105795698","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q12483","display_name":"Statistics","level":1,"score":0},{"id":"https:\/\/openalex.org\/C146978453","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3798668","display_name":"Aerospace engineering","level":1,"score":0},{"id":"https:\/\/openalex.org\/C134306372","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7754","display_name":"Mathematical analysis","level":1,"score":0}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2212.11233","is_oa":true,"landing_page_url":"http:\/\/arxiv.org\/abs\/2212.11233","pdf_url":"https:\/\/arxiv.org\/pdf\/2212.11233","source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"doi:10.48550\/arxiv.2212.11233","is_oa":true,"landing_page_url":"https:\/\/doi.org\/10.48550\/arxiv.2212.11233","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2212.11233","is_oa":true,"landing_page_url":"http:\/\/arxiv.org\/abs\/2212.11233","pdf_url":"https:\/\/arxiv.org\/pdf\/2212.11233","source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https:\/\/openalex.org\/W2565952052","https:\/\/openalex.org\/W134264063","https:\/\/openalex.org\/W2349124474","https:\/\/openalex.org\/W2906421360","https:\/\/openalex.org\/W4361829702","https:\/\/openalex.org\/W1983959762","https:\/\/openalex.org\/W4237677910","https:\/\/openalex.org\/W2896010704","https:\/\/openalex.org\/W3155236483","https:\/\/openalex.org\/W4312108604"],"abstract_inverted_index":{"We":[0],"propose":[1],"to":[2],"realize":[3],"visual":[4,22,42,51,79,87],"cryptography":[5,23,52,80],"in":[6],"an":[7],"indirect":[8],"way":[9],"with":[10,55],"the":[11,18,38,47,50,59,75,84],"help":[12],"of":[13,21,41,49,78,86],"computer-generated":[14,56],"hologram.":[15],"At":[16],"present,":[17],"recovery":[19],"method":[20,72],"is":[24,61],"mainly":[25],"superimposed":[26,31,68],"on":[27],"transparent":[28],"film":[29],"or":[30],"by":[32,63],"computer":[33],"equipment,":[34],"which":[35],"greatly":[36],"limits":[37],"application":[39,76],"range":[40,77],"cryptography.":[43,88],"In":[44],"this":[45],"paper,":[46],"shares":[48,60],"were":[53],"encoded":[54],"hologram,":[57],"and":[58,66,69,81],"reproduced":[62],"optical":[64],"means,":[65],"then":[67],"decrypted.":[70],"This":[71],"can":[73],"expand":[74],"further":[82],"increase":[83],"security":[85]},"counts_by_year":[],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}