OSA's Digital Library

Applied Optics

Applied Optics


  • Vol. 40, Iss. 17 — Jun. 10, 2001
  • pp: 2860–2863

Decomposition storage of information based on computer-generated hologram interference and its application in optical image encryption

Yongkang Guo, Qizhong Huang, Jinglei Du, and Yixiao Zhang  »View Author Affiliations

Applied Optics, Vol. 40, Issue 17, pp. 2860-2863 (2001)

View Full Text Article

Enhanced HTML    Acrobat PDF (288 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



An information-encryption method based on computer-generated hologram (CGH) interference is presented. In this method the original information is decomposed into two parts, and then each part is encoded on a separate CGH. When these two encoded CGHs are aligned and illuminated, a combined interference pattern is formed. The original information is obtained from this pattern. It is impossible to decrypt the original information from one CGH alone; two matched CGHs must be put together to make it available.

© 2001 Optical Society of America

OCIS Codes
(090.1760) Holography : Computer holography
(200.3050) Optics in computing : Information processing

Original Manuscript: March 21, 2000
Revised Manuscript: December 19, 2000
Published: June 10, 2001

Yongkang Guo, Qizhong Huang, Jinglei Du, and Yixiao Zhang, "Decomposition storage of information based on computer-generated hologram interference and its application in optical image encryption," Appl. Opt. 40, 2860-2863 (2001)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. B. Javidi, J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994). [CrossRef]
  2. B. Javidi, G. Zhang, J. Li, “Experimental demonstration of the random phase encoding for image encryption security verification,” Opt. Eng. 35, 2506–2512 (1996). [CrossRef]
  3. R. K. Wang, L. A. Watson, C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996). [CrossRef]
  4. Q. Huang, J. Du, Y. Guo, “Optical coding for storing confidential data,” in Algorithms, Devices, and Systems for Optical Information Processing, B. Javidi, D. Psaltis, eds., Proc. SPIE3159, 287–291 (1997). [CrossRef]
  5. Y. Zuliang, J. Guofan, Computer-Generated Hologram (Publishing House of Tsinghua University, Peiking, 1984), pp. 31–41.

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


Fig. 1 Fig. 2 Fig. 3
Fig. 4 Fig. 5

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited