Abstract

An information-encryption method based on computer-generated hologram (CGH) interference is presented. In this method the original information is decomposed into two parts, and then each part is encoded on a separate CGH. When these two encoded CGHs are aligned and illuminated, a combined interference pattern is formed. The original information is obtained from this pattern. It is impossible to decrypt the original information from one CGH alone; two matched CGHs must be put together to make it available.

© 2001 Optical Society of America

Full Article  |  PDF Article

References

  • View by:
  • |
  • |
  • |

  1. B. Javidi, J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).
    [CrossRef]
  2. B. Javidi, G. Zhang, J. Li, “Experimental demonstration of the random phase encoding for image encryption security verification,” Opt. Eng. 35, 2506–2512 (1996).
    [CrossRef]
  3. R. K. Wang, L. A. Watson, C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).
    [CrossRef]
  4. Q. Huang, J. Du, Y. Guo, “Optical coding for storing confidential data,” in Algorithms, Devices, and Systems for Optical Information Processing, B. Javidi, D. Psaltis, eds., Proc. SPIE3159, 287–291 (1997).
    [CrossRef]
  5. Y. Zuliang, J. Guofan, Computer-Generated Hologram (Publishing House of Tsinghua University, Peiking, 1984), pp. 31–41.

1996 (2)

B. Javidi, G. Zhang, J. Li, “Experimental demonstration of the random phase encoding for image encryption security verification,” Opt. Eng. 35, 2506–2512 (1996).
[CrossRef]

R. K. Wang, L. A. Watson, C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).
[CrossRef]

1994 (1)

B. Javidi, J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).
[CrossRef]

Chatwin, C.

R. K. Wang, L. A. Watson, C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).
[CrossRef]

Du, J.

Q. Huang, J. Du, Y. Guo, “Optical coding for storing confidential data,” in Algorithms, Devices, and Systems for Optical Information Processing, B. Javidi, D. Psaltis, eds., Proc. SPIE3159, 287–291 (1997).
[CrossRef]

Guo, Y.

Q. Huang, J. Du, Y. Guo, “Optical coding for storing confidential data,” in Algorithms, Devices, and Systems for Optical Information Processing, B. Javidi, D. Psaltis, eds., Proc. SPIE3159, 287–291 (1997).
[CrossRef]

Guofan, J.

Y. Zuliang, J. Guofan, Computer-Generated Hologram (Publishing House of Tsinghua University, Peiking, 1984), pp. 31–41.

Horner, J. L.

B. Javidi, J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).
[CrossRef]

Huang, Q.

Q. Huang, J. Du, Y. Guo, “Optical coding for storing confidential data,” in Algorithms, Devices, and Systems for Optical Information Processing, B. Javidi, D. Psaltis, eds., Proc. SPIE3159, 287–291 (1997).
[CrossRef]

Javidi, B.

B. Javidi, G. Zhang, J. Li, “Experimental demonstration of the random phase encoding for image encryption security verification,” Opt. Eng. 35, 2506–2512 (1996).
[CrossRef]

B. Javidi, J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).
[CrossRef]

Li, J.

B. Javidi, G. Zhang, J. Li, “Experimental demonstration of the random phase encoding for image encryption security verification,” Opt. Eng. 35, 2506–2512 (1996).
[CrossRef]

Wang, R. K.

R. K. Wang, L. A. Watson, C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).
[CrossRef]

Watson, L. A.

R. K. Wang, L. A. Watson, C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).
[CrossRef]

Zhang, G.

B. Javidi, G. Zhang, J. Li, “Experimental demonstration of the random phase encoding for image encryption security verification,” Opt. Eng. 35, 2506–2512 (1996).
[CrossRef]

Zuliang, Y.

Y. Zuliang, J. Guofan, Computer-Generated Hologram (Publishing House of Tsinghua University, Peiking, 1984), pp. 31–41.

Opt. Eng. (3)

B. Javidi, J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).
[CrossRef]

B. Javidi, G. Zhang, J. Li, “Experimental demonstration of the random phase encoding for image encryption security verification,” Opt. Eng. 35, 2506–2512 (1996).
[CrossRef]

R. K. Wang, L. A. Watson, C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).
[CrossRef]

Other (2)

Q. Huang, J. Du, Y. Guo, “Optical coding for storing confidential data,” in Algorithms, Devices, and Systems for Optical Information Processing, B. Javidi, D. Psaltis, eds., Proc. SPIE3159, 287–291 (1997).
[CrossRef]

Y. Zuliang, J. Guofan, Computer-Generated Hologram (Publishing House of Tsinghua University, Peiking, 1984), pp. 31–41.

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (5)

Fig. 1
Fig. 1

Illustration of information-decomposition storage based on holographic interference.

Fig. 2
Fig. 2

Diagram of the encryption and decryption processes.

Fig. 3
Fig. 3

Image information used in the experiment.

Fig. 4
Fig. 4

Part of printed CGH.

Fig. 5
Fig. 5

Photographs of decoding results.

Equations (7)

Equations on this page are rendered with MathJax. Learn more.

τH1  |O+R0|2=O02+R02+O0R0 expjϕo+O0R0 exp-jϕo,
τH2  |O+R0|2=O02+R02+O0R0 expjϕo+O0R0 exp-jϕo.
i1=O02+R02R0+O0R02 expjϕo+O0R02 exp-jϕo.
i2=O02+R02O02+R02R0+O0R02O02+R02×expjϕo+O0R02O02+R02exp-jϕo.
A=O0R02 expjϕo+O0R02O02+R02expjϕo.
Ix, y  1+cosϕox, y-ϕox, y=1+cosΔϕox, y,
Δϕox, y=ϕox, y-ϕox, y

Metrics