Abstract

An information security method that uses a digital holographic technique is presented. An encrypted image is stored as a digital hologram. The decryption key is also stored as a digital hologram. The encrypted image can be electrically decrypted by use of the digital hologram of the key. This security technique provides secure storage and data transmission. Experimental results are presented to demonstrate the proposed method.

© 2000 Optical Society of America

Full Article  |  PDF Article

References

  • View by:
  • |
  • |
  • |

  1. H.-Y. S. Li, Y. Qiao, and D. Psaltis, Appl. Opt. 32, 5026 (1993).
    [CrossRef] [PubMed]
  2. B. Javidi and J. L. Horner, Opt. Eng. 33, 1752 (1994).
    [CrossRef]
  3. P. Réfrégier and B. Javidi, Opt. Lett. 20, 767 (1995).
    [CrossRef]
  4. F. Goudail, F. Bollaro, B. Javidi, and P. Réfrégier, J. Opt. Soc. Am. A 15, 2629 (1998).
    [CrossRef]
  5. C. L. Wilson, C. I. Watson, and E. G. Paek, Proc. SPIE 3073, 373 (1997).
    [CrossRef]
  6. D. Weber and J. Trolinger, Opt. Eng. 38, 62 (1999).
    [CrossRef]
  7. O. Matoba and B. Javidi, Opt. Lett. 24, 762 (1999).
    [CrossRef]
  8. U. Schnars and W. Juptner, Appl. Opt. 33, 179 (1994).
    [CrossRef] [PubMed]
  9. I. Yamaguchi and T. Zhang, Opt. Lett. 22, 1506 (1997).
    [CrossRef]
  10. E. Cuche, F. Bevilacqua, and C. Depeursinge, Opt. Lett. 24, 291 (1999).
    [CrossRef]

1999 (3)

1998 (1)

1997 (2)

C. L. Wilson, C. I. Watson, and E. G. Paek, Proc. SPIE 3073, 373 (1997).
[CrossRef]

I. Yamaguchi and T. Zhang, Opt. Lett. 22, 1506 (1997).
[CrossRef]

1995 (1)

1994 (2)

U. Schnars and W. Juptner, Appl. Opt. 33, 179 (1994).
[CrossRef] [PubMed]

B. Javidi and J. L. Horner, Opt. Eng. 33, 1752 (1994).
[CrossRef]

1993 (1)

Bevilacqua, F.

Bollaro, F.

Cuche, E.

Depeursinge, C.

Goudail, F.

Horner, J. L.

B. Javidi and J. L. Horner, Opt. Eng. 33, 1752 (1994).
[CrossRef]

Javidi, B.

Juptner, W.

Li, H.-Y. S.

Matoba, O.

Paek, E. G.

C. L. Wilson, C. I. Watson, and E. G. Paek, Proc. SPIE 3073, 373 (1997).
[CrossRef]

Psaltis, D.

Qiao, Y.

Réfrégier, P.

Schnars, U.

Trolinger, J.

D. Weber and J. Trolinger, Opt. Eng. 38, 62 (1999).
[CrossRef]

Watson, C. I.

C. L. Wilson, C. I. Watson, and E. G. Paek, Proc. SPIE 3073, 373 (1997).
[CrossRef]

Weber, D.

D. Weber and J. Trolinger, Opt. Eng. 38, 62 (1999).
[CrossRef]

Wilson, C. L.

C. L. Wilson, C. I. Watson, and E. G. Paek, Proc. SPIE 3073, 373 (1997).
[CrossRef]

Yamaguchi, I.

Zhang, T.

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (6)

Fig. 1
Fig. 1

Secure image/video–data-storage/transmission system that uses a combination of double-random phase encryption and a digital holographic technique: (a) transmitter–encoder, (b) receiver–decoder.

Fig. 2
Fig. 2

Optical experiment setup: SF, spatial filter; CL, collimating lens; M, mirrors; L’s, lenses; BS’s, beam splitters; P1, input plane; P2, Fourier plane.

Fig. 3
Fig. 3

Digitally reconstructed input images.

Fig. 4
Fig. 4

Digital holograms of (a) the encrypted data and (b) the Fourier phase mask.

Fig. 5
Fig. 5

Images that have been digitally reconstructed by inverse Fourier transformation of the digital hologram of the encrypted data.

Fig. 6
Fig. 6

Images that have been digitally reconstructed with the digital hologram of both the encrypted data and the Fourier phase mask.

Equations (4)

Equations on this page are rendered with MathJax. Learn more.

IEξ,η=Fξ,ηAξ,ηHξ,η2+Rξ,η2+Fξ,ηAξ,ηHξ,ηRξ,η*+Fξ,ηAξ,ηHξ,η*Rξ,η,
IEξ,η=Fξ,ηAξ,ηHξ,ηRξ,η*+Fξ,ηAξ,ηHξ,η*Rξ,η.
IMξ,η=Hξ,ηRξ,η*+Hξ,η*Rξ,η.
dx,y=FT-1Fξ,ηAξ,ηHξ,ηRξ,η*×Hξ,η*Rξ,η=FT-1Fξ,ηAξ,η=fx,yαx,y,

Metrics