2004
DOI: 10.1364/opex.12.004912
|View full text |Cite
|
Sign up to set email alerts
|

Encryption of digital hologram of 3-D object by virtual optics

Abstract: We present a simple technique to encrypt a digital hologram of a three-dimensional (3-D) object into a stationary white noise by use of virtual optics and then to decrypt it digitally. In this technique the digital hologram is encrypted by our attaching a computer-generated random phase key to it and then forcing them to Fresnel propagate to an arbitrary plane with an illuminating plane wave of a given wavelength. It is shown in experiments that the proposed system is robust to blind decryptions without knowin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
35
0
3

Year Published

2007
2007
2021
2021

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 85 publications
(38 citation statements)
references
References 0 publications
0
35
0
3
Order By: Relevance
“…From Eq. (1), if f(x, y) is an on pixel, the influence of individual on-pixels can be assumed to be white noise across the entire image plane due to the first random phase mask ฯ†(x, y) in the Fresnel region (Situ and Zhang 2005;Kim et al 2004). For this reason, the spatial distribution of on-pixels in the original image can be considered to be negligible.…”
Section: Analysis Of Crosstalk Noise In Individual Imagesmentioning
confidence: 99%
“…From Eq. (1), if f(x, y) is an on pixel, the influence of individual on-pixels can be assumed to be white noise across the entire image plane due to the first random phase mask ฯ†(x, y) in the Fresnel region (Situ and Zhang 2005;Kim et al 2004). For this reason, the spatial distribution of on-pixels in the original image can be considered to be negligible.…”
Section: Analysis Of Crosstalk Noise In Individual Imagesmentioning
confidence: 99%
“…In recent years, due to the high-speed processing and parallel ability, the optical information security has drawn more and more attention with the rapid development of information technology, since the double random phase encoding (DRPE) scheme was invented by Refregier and Javidi [1]; some other optical information processing techniques or transforms, such as digital holography [2,3], fractional Fourier transform [4][5][6], phase-shifting interferometry [7,8], phase retrieval [9][10][11][12], Fresnel transform [13,14], gyrator transform [15], fractional Mellin transform [16], joint transform correlator [17], two beam's interference [18,19], diffractive imaging [20], polarization encoding [21], aperture movement [22], phase reservation and compression [23], ghost imaging [24], have been combined with DRPE to build more versatile security systems.…”
Section: Introductionmentioning
confidence: 99%
“…Among various encryption strategies, the optical encryption technique is considered an important topic, since it possesses unique characteristics, such as multi-parameter capability and parallel processing [1][2][3][4][5][6]. The pioneering work on optical encryption, which was devoted by Refregier and Javidi in 1995, is based on double random phase encoding (DRPE) scheme [7].…”
Section: Introductionmentioning
confidence: 99%