Two-step phase-shifting interferometry and its application in image encryption

被引:321
作者
Meng, X. F. [1 ]
Cai, L. Z. [1 ]
Xu, X. F. [1 ]
Yang, X. L. [1 ]
Shen, X. X. [1 ]
Dong, G. Y. [1 ]
Wang, Y. R. [1 ]
机构
[1] Shandong Univ, Dept Opt, Jinan 250100, Peoples R China
关键词
D O I
10.1364/OL.31.001414
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Conventional phase-shifting interferometry (PSI) needs at least three interferograms. A novel algorithm of two-step PSI, with an arbitrary known phase step, by which a complex object field can be reconstructed with only two interferograms is proposed. This algorithm is then applied to an information security system based on double random-phase encoding in the Fresnel domain. The feasibility of this method and its robustness against occlusion and additional noise attacks are verified by computer simulations. This approach can considerably improve the efficiency of data transmission and is very suitable for Internet use. (c) 2006 Optical Society of America
引用
收藏
页码:1414 / 1416
页数:3
相关论文
共 21 条
[1]   Digital image encryption and watermarking by phase-shifting interferometry [J].
Cai, LZ ;
He, MZ ;
Liu, Q ;
Yang, XL .
APPLIED OPTICS, 2004, 43 (15) :3078-3084
[2]   Phase-shift extraction and wave-front reconstruction in phase-shifting interferometry with arbitrary phase steps [J].
Cai, LZ ;
Liu, Q ;
Yang, XL .
OPTICS LETTERS, 2003, 28 (19) :1808-1810
[3]   Multiple-phase retrieval for optical security systems by use of random-phase encoding [J].
Chang, HT ;
Lu, WC ;
Kuo, CJ .
APPLIED OPTICS, 2002, 41 (23) :4825-4834
[4]   Phase-only encryption and watermarking based on phase-shifting interferometry [J].
He, MZ ;
Cai, LZ ;
Liu, Q ;
Yang, XL .
APPLIED OPTICS, 2005, 44 (13) :2600-2606
[5]   Multiple image encryption and watermarking by random phase matching [J].
He, MZ ;
Cai, LZ ;
Liu, Q ;
Wang, XC ;
Meng, XF .
OPTICS COMMUNICATIONS, 2005, 247 (1-3) :29-37
[6]   Optical image encryption by random shifting in fractional Fourier domains [J].
Hennelly, B ;
Sheridan, JT .
OPTICS LETTERS, 2003, 28 (04) :269-271
[7]   Securing information by use of digital holography [J].
Javidi, B ;
Nomura, T .
OPTICS LETTERS, 2000, 25 (01) :28-30
[8]   Encryption of digital hologram of 3-D object by virtual optics [J].
Kim, H ;
Kim, DH ;
Lee, YH .
OPTICS EXPRESS, 2004, 12 (20) :4912-4921
[9]   Information hiding technique with double phase encoding [J].
Kishk, S ;
Javidi, B .
APPLIED OPTICS, 2002, 41 (26) :5462-5470
[10]   Wave front reconstruction by means of phase-shifting digital in-line holography [J].
Lai, SC ;
King, B ;
Neifeld, MA .
OPTICS COMMUNICATIONS, 2000, 173 (1-6) :155-160