Multi-image encryption based on interference of computer generated hologram

被引:10
作者
Kong, Dezhao [1 ]
Shen, Xueju [1 ]
Shen, Yaqin [2 ]
Wang, Xin [1 ]
机构
[1] Mech Engn Coll, Dept Elect & Opt, Shijiazhuang 050003, Peoples R China
[2] Minist Ind & Informat Technol, Telecommun Res Inst, Beijing 100191, Peoples R China
来源
OPTIK | 2014年 / 125卷 / 10期
关键词
Image processing; Optical security and encryption; Computer holography; IMAGE ENCRYPTION; OPTICAL ENCRYPTION; INFORMATION; AMPLITUDE;
D O I
10.1016/j.ijleo.2013.10.066
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
A multi-image encryption scheme based on interference of computer generated holograms (CGH) is proposed. The encrypted information can be divided into several parts and recorded by corresponding CGHs that distribute randomly. With interference of all CGHs, the original information can be reconstructed. So the multi-image encryption is achieved, and every hologram can be regarded as the key to the corresponding image. Multi-user authentication and storage of information is implemented by applying unique CGH to interfere the common CGH. Furthermore, the CGHs can be cascaded to implement classification of images. When images of different level are assigned to corresponding user, hierarchical encryption is completed successfully. Numerical simulation verifies the feasibility of the method, and demonstrates the security of the algorithm and the decryption characteristics. Flexibility and variability of scheme can be higher than the existing methods. There are a lot of scheme's details still to consider and fulfill in the future. (C) 2014 Published by Elsevier GmbH.
引用
收藏
页码:2365 / 2368
页数:4
相关论文
共 17 条
  • [1] Three types of computer-generated hologram synthesized from multiple angular viewpoints of a three-dimensional scene
    Abookasis, David
    Rosen, Joseph
    [J]. APPLIED OPTICS, 2006, 45 (25) : 6533 - 6538
  • [2] Wavelength multiplexing encryption using joint transform correlator architecture
    Amaya, Dafne
    Tebaldi, Myrian
    Torroba, Roberto
    Bolognini, Nestor
    [J]. APPLIED OPTICS, 2009, 48 (11) : 2099 - 2104
  • [3] Multiplexing encryption technique by combining random amplitude and phase masks
    Barrera, John Fredy
    Tebaldi, Myrian
    Torroba, Roberto
    Bolognini, Nestor
    [J]. OPTIK, 2009, 120 (08): : 351 - 355
  • [4] Image encryption with fractional wavelet packet method
    Chen, Linfei
    Zhao, Daomu
    [J]. OPTIK, 2008, 119 (06): : 286 - 291
  • [5] Security enhancement of double-random phase encryption by amplitude modulation
    Cheng, X. C.
    Cai, L. Z.
    Wang, Y. R.
    Meng, X. F.
    Zhang, H.
    Xu, X. F.
    Shen, X. X.
    Dong, G. Y.
    [J]. OPTICS LETTERS, 2008, 33 (14) : 1575 - 1577
  • [6] Three-dimensional display using computer-generated hologram based on virtual optics
    Gao, Yiqing
    Zhang, Zhou
    Liu, Guodong
    [J]. OPTIK, 2010, 121 (15): : 1395 - 1400
  • [7] Optical image encryption based on multichannel fractional Fourier transform and double random phase encoding technique
    Jin, Weimin
    Yan, Caijie
    [J]. OPTIK, 2007, 118 (01): : 38 - 41
  • [8] Color image encryption using spatial bit-level permutation and high-dimension chaotic system
    Liu, Hongjun
    Wang, Xingyuan
    [J]. OPTICS COMMUNICATIONS, 2011, 284 (16-17) : 3895 - 3903
  • [9] Optical multi-image encryption based on frequency shift
    Liu, Zhengjun
    Zhang, Yan
    Zhao, Haifa
    Ahmad, Muhammad Ashfaq
    Liu, Shutian
    [J]. OPTIK, 2011, 122 (11): : 1010 - 1013
  • [10] Image encryption based on double random amplitude coding in random Hartley transform domain
    Liu, Zhengjun
    Ahmad, Muhammad Ashfaq
    Liu, Shutian
    [J]. OPTIK, 2010, 121 (11): : 959 - 964