Abstract

We have developed an encryption method using a computer-generated hologram (CGH) embedded in a dithered image. First, confidential information is converted into a CGH. Next, the CGH data undergo two separate dithering processes in parallel: one corresponding to CGH white pixels and one corresponding to CGH black pixels. The results from both processes are used to form a dither matrix for creating the final dithered and encoded image. In this way, confidential information can be embedded into the image. The confidential information can be extracted using a technique similar to CGH optical reconstruction.

© 2011 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Hologram-based watermarking capable of surviving print-scan process

Shuozhong Wang, Sujuan Huang, Xinpeng Zhang, and Wei Wu
Appl. Opt. 49(7) 1170-1178 (2010)

Three-dimensional scene encryption and display based on computer-generated holograms

Dezhao Kong, Liangcai Cao, Guofan Jin, and Bahram Javidi
Appl. Opt. 55(29) 8296-8300 (2016)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (25)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Tables (2)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (2)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription