2000
DOI: 10.1364/ol.25.000028
|View full text |Cite
|
Sign up to set email alerts
|

Securing information by use of digital holography

Abstract: An information security method that uses a digital holographic technique is presented. An encrypted image is stored as a digital hologram. The decryption key is also stored as a digital hologram. The encrypted image can be electrically decrypted by use of the digital hologram of the key. This security technique provides secure storage and data transmission. Experimental results are presented to demonstrate the proposed method.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
169
0
1

Year Published

2007
2007
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 460 publications
(177 citation statements)
references
References 10 publications
0
169
0
1
Order By: Relevance
“…With the approaches described in Refs. [7] and [11], two phase masks were inserted in the object wave path for DRPE; however, with our system, they are applied to the object and reference waves. The Fresnel-type DRPE uses three cipher keys: the phase distribution on the Fresnel domain, the distance of Fresnel diffraction, and the wavelength of laser; all of which that must be provided correctly to restore the plaintext image from the encrypted image.…”
Section: Encrypted Sensing Based On Drpementioning
confidence: 99%
See 2 more Smart Citations
“…With the approaches described in Refs. [7] and [11], two phase masks were inserted in the object wave path for DRPE; however, with our system, they are applied to the object and reference waves. The Fresnel-type DRPE uses three cipher keys: the phase distribution on the Fresnel domain, the distance of Fresnel diffraction, and the wavelength of laser; all of which that must be provided correctly to restore the plaintext image from the encrypted image.…”
Section: Encrypted Sensing Based On Drpementioning
confidence: 99%
“…DRPE is an optical symmetric-key encryption technique in which an optical image is encrypted by multiplying two random phase masks in the spatial and Fourier or Fresnel planes. To obtain an optically-encrypted image, digital holography (DH) [7]- [10] is commonly employed. DH makes it possible to not only capture an optical wavefront as holographic data, but also to reconstruct various styles of optical wavefront computationally from the holographic data.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Many techniques for the optical encryption of image data have been proposed and implemented in recent years [51][52][53][54][55][56][57][58][59][60][61][62]. Most perform encryption with a random phase mask positioned in the input, Fresnel, or Fraunhofer domain, or a combination of domains.…”
Section: Optical Image Encryptionmentioning
confidence: 99%
“…These invariably produce a complex-valued encrypted image. Digital holography [63][64][65][66][67][68][69][70] can be used to measure complex-valued wavefronts, and it has been applied to the encryption of 2D conventional (real-valued) images [57][58][59]. Of these, the techniques based on phase-shift interferometry [65,67,70] (PSI) make good use of detector resources in that they capture on-axis encrypted digital holograms [58,59].…”
Section: Optical Image Encryptionmentioning
confidence: 99%