Abstract

An information-encryption method based on computer-generated hologram (CGH) interference is presented. In this method the original information is decomposed into two parts, and then each part is encoded on a separate CGH. When these two encoded CGHs are aligned and illuminated, a combined interference pattern is formed. The original information is obtained from this pattern. It is impossible to decrypt the original information from one CGH alone; two matched CGHs must be put together to make it available.

© 2001 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Three-dimensional scene encryption and display based on computer-generated holograms

Dezhao Kong, Liangcai Cao, Guofan Jin, and Bahram Javidi
Appl. Opt. 55(29) 8296-8300 (2016)

Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram

Sixing Xi, Xiaolei Wang, Lipei Song, Zhuqing Zhu, Bowen Zhu, Shuai Huang, Nana Yu, and Huaying Wang
Opt. Express 25(7) 8212-8222 (2017)

Robust multidepth object encryption based on a computer-generated hologram with a cascaded structure

Mei-Lan Piao, Shi-Gang Wang, Yan Zhao, Jian Wei, Yu Zhao, and Nam Kim
Appl. Opt. 58(36) 9921-9930 (2019)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (5)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (7)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription