Abstract

An information-encryption method based on computer-generated hologram (CGH) interference is presented. In this method the original information is decomposed into two parts, and then each part is encoded on a separate CGH. When these two encoded CGHs are aligned and illuminated, a combined interference pattern is formed. The original information is obtained from this pattern. It is impossible to decrypt the original information from one CGH alone; two matched CGHs must be put together to make it available.

© 2001 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram

Sixing Xi, Xiaolei Wang, Lipei Song, Zhuqing Zhu, Bowen Zhu, Shuai Huang, Nana Yu, and Huaying Wang
Opt. Express 25(7) 8212-8222 (2017)

Security validation based on orthogonal polarization multiplexing in three-dimensional space

Chao Lin and Jiancun Ren
Appl. Opt. 56(34) 9583-9591 (2017)

Encryption of digital hologram of 3-D object by virtual optics

Hyun Kim, Do-Hyung Kim, and Yeon H. Lee
Opt. Express 12(20) 4912-4921 (2004)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (5)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (7)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription