2011
DOI: 10.3807/josk.2011.15.3.244
|View full text |Cite
|
Sign up to set email alerts
|

2-step Phase-shifting Digital Holographic Optical Encryption and Error Analysis

Abstract: We propose a new 2-step phase-shifting digital holographic optical encryption technique and analyze tolerance error for this cipher system. 2-step phase-shifting digital holograms are acquired by moving the PZT mirror with phase step of 0 or π/2 in the reference beam path of the Mach-Zehnder type interferometer. Digital hologram with the encrypted information is Fourier transform hologram and is recorded on CCD camera with 256 gray-level quantized intensities. The decryption performance of binary bit data and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 35 publications
(19 citation statements)
references
References 19 publications
0
19
0
Order By: Relevance
“…(6), the phase difference of object beam and reference beam and the magnitude are calculated as follows. [22] …”
Section: Encryption and Decryptionmentioning
confidence: 99%
See 2 more Smart Citations
“…(6), the phase difference of object beam and reference beam and the magnitude are calculated as follows. [22] …”
Section: Encryption and Decryptionmentioning
confidence: 99%
“…In the previous papers [19,22], we described the encryption and decryption principle by using the 2-step phase-shifting digital holographic method.…”
Section: Encryption and Decryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…So a gray-level error on CCD camera pixels can be generated due to a small intensity variation, which is the so-called quantization error [2]. If there is no error, the decryption equation expression should be like Eq.…”
Section: Error Analysismentioning
confidence: 99%
“…Two random phase-only functions (POFs) are utilized in this method. The first POF improves the signal of a charge-coupled device (CCD), and the second POF is the encryption key in the system [2]. However, when the complex conjugate of the information obtained in the frequency domain is considered as the ciphertext, the decryption key must be identical to the second random POF so-called symmetric cryptography.…”
Section: Introductionmentioning
confidence: 99%