OSA's Digital Library

Applied Optics

Applied Optics


  • Vol. 43, Iss. 15 — May. 20, 2004
  • pp: 3078–3084

Digital Image Encryption and Watermarking by Phase-Shifting Interferometry

Lu-Zhong Cai, Ming-Zhao He, Qing Liu, and Xiu-Lun Yang  »View Author Affiliations

Applied Optics, Vol. 43, Issue 15, pp. 3078-3084 (2004)

View Full Text Article

Acrobat PDF (737 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



A method for both image encryption and watermarking by three-step phase-shifting interferometry is proposed. The image to be hidden is stored in three interferograms and then can be reconstructed by use of one random phase mask, several specific geometric parameters, and a certain algorithm. To further increase the security of the hidden image and confuse unauthorized receivers, images with the same or different content can be added to the interferograms, and these images will have no or only a small effect on the retrieval of the hidden image, owing to the specific property of this algorithm. All these features and the utility of this method for image retrieval from parts of interferograms are verified by computer simulations. This technique uses intensity maps as decrypted images for delivery, and both encryption and decryption can be conveniently achieved digitally. It is particularly suitable for the remote transmission of secret information via the Internet.

© 2004 Optical Society of America

OCIS Codes
(090.2880) Holography : Holographic interferometry
(100.2000) Image processing : Digital image processing
(100.3010) Image processing : Image reconstruction techniques
(100.3020) Image processing : Image reconstruction-restoration

Lu-Zhong Cai, Ming-Zhao He, Qing Liu, and Xiu-Lun Yang, "Digital Image Encryption and Watermarking by Phase-Shifting Interferometry," Appl. Opt. 43, 3078-3084 (2004)

Sort:  Author  |  Year  |  Journal  |  Reset


  1. P. Réfrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).
  2. O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).
  3. B. Javidi and T. Nomura, “Securing information by use of digital holography,” Opt. Lett. 25, 28–30 (2000).
  4. E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000).
  5. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).
  6. B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003).
  7. L. Yu, X. Peng, and L. Cai, “Parameterized multi-dimensional data encryption by digital optics,” Opt. Commun. 203, 67–77 (2002).
  8. Y. K. Guo, Q. Huang, J. Du, and Y. Zhang, “Decomposition storage of information based on computer-generated hologram interference and its application in image encryption,” Appl. Opt. 40, 2860–2863 (2001).
  9. N. Takai and Y. Mifune, “Digital watermarking by a holographic technique,” Appl. Opt. 41, 865–873 (2002).
  10. S. Kishk and B. Javidi, “Watermarking of three-dimensional objects by digital holography,” Opt. Lett. 28, 167–169 (2003).
  11. L. Z. Cai, Q. Liu, and X. L. Yang, “Phase-shift extraction and wave-front reconstruction in phase-shifting interferometry with arbitrary phase steps,” Opt. Lett. 19, 1808–1810 (2003).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited