OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Vol. 40, Iss. 17 — Jun. 10, 2001
  • pp: 2860–2863

Decomposition Storage of Information Based on Computer-Generated Hologram Interference and its Application in Optical Image Encryption

Yongkang Guo, Qizhong Huang, Jinglei Du, and Yixiao Zhang  »View Author Affiliations


Applied Optics, Vol. 40, Issue 17, pp. 2860-2863 (2001)
http://dx.doi.org/10.1364/AO.40.002860


View Full Text Article

Acrobat PDF (288 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

An information-encryption method based on computer-generated hologram (CGH) interference is presented. In this method the original information is decomposed into two parts, and then each part is encoded on a separate CGH. When these two encoded CGHs are aligned and illuminated, a combined interference pattern is formed. The original information is obtained from this pattern. It is impossible to decrypt the original information from one CGH alone; two matched CGHs must be put together to make it available.

© 2001 Optical Society of America

OCIS Codes
(090.1760) Holography : Computer holography
(200.3050) Optics in computing : Information processing

Citation
Yongkang Guo, Qizhong Huang, Jinglei Du, and Yixiao Zhang, "Decomposition Storage of Information Based on Computer-Generated Hologram Interference and its Application in Optical Image Encryption," Appl. Opt. 40, 2860-2863 (2001)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-40-17-2860


Sort:  Author  |  Year  |  Journal  |  Reset

References

  1. B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).
  2. B. Javidi, G. Zhang, and J. Li, “Experimental demonstration of the random phase encoding for image encryption security verification,” Opt. Eng. 35, 2506–2512 (1996).
  3. R. K. Wang, L. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).
  4. Q. Huang, J. Du, and Y. Guo, “Optical coding for storing confidential data,” in Algorithms, Devices, and Systems for Optical Information Processing, B. Javidi and D. Psaltis, eds., Proc. SPIE 3159, 287–291 (1997).
  5. Y. Zuliang and J. Guofan, Computer-Generated Hologram (Publishing House of Tsinghua University, Peiking, 1984), pp. 31–41.

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited