2021
DOI: 10.1016/j.optlaseng.2021.106722
|View full text |Cite
|
Sign up to set email alerts
|

Optical image encryption and authentication using phase-only computer-generated hologram

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 39 publications
(18 citation statements)
references
References 30 publications
0
11
0
Order By: Relevance
“…A digital random phase or diffuser phase distribution evenly distributes the light energy across the hologram plane. The image information is distributed across the hologram that makes it robust and enhances the diffraction efficiency of the hologram [27,31,[39][40][41][42][43][44]. Mathematically,…”
Section: Phase Only Cghmentioning
confidence: 99%
See 1 more Smart Citation
“…A digital random phase or diffuser phase distribution evenly distributes the light energy across the hologram plane. The image information is distributed across the hologram that makes it robust and enhances the diffraction efficiency of the hologram [27,31,[39][40][41][42][43][44]. Mathematically,…”
Section: Phase Only Cghmentioning
confidence: 99%
“…In this approach, a pre ORAP is applied to the host image and then object light is multiplied by virtual convergence light that enhances reconstructed hologram quality and reduces speckle noise [30]. Then, computer generated holograms were proposed using various transforms and encryption techniques such as phase only computer generated hologram [31], chaos hologram [32], ghost imaging [33], 3D image encryption [34,35], interference based algorithms [36,37], and wavelength multiplexing and lens less Fresnel holograms [38].…”
Section: Introductionmentioning
confidence: 99%
“…Singh et al [10] proposed a grayscale image encryption scheme based on jigsaw transform and chaos, in which the random intensity mask was generated from the chaotic Logistic map. In addition to the DRPE-based and CRPE-based encryption schemes, researchers have also proposed a series of optical image encryption schemes based on digital holography [11,12], computer-generated holography [13,14], phase retrieval algorithm [15], interference [16], joint transform correlator [17], diffractive imaging [18], computational ghost imaging [19], single pixel imaging [20], ptychography [21], integral imaging [22] and deep learning [23].…”
Section: Introductionmentioning
confidence: 99%
“…CGHs don't require special holographic recording materials, but instead use Spatial Light Modulators (SLMs) to load CGHs. SLMs are highly flexible and are widely used in beam shaping [4], holographic displays [5] and atom trapping [6]. Since the current mainstream commercial SLMs can only modulate either the amplitude or the phase of the light wave, but not both directly, only phase-only or amplitude-only hologram can be loaded on the SLM [7].…”
Section: Introductionmentioning
confidence: 99%