OSA's Digital Library

Applied Optics

Applied Optics


  • Editor: Joseph N. Mait
  • Vol. 50, Iss. 34 — Dec. 1, 2011
  • pp: H315–H326

Embedding of computer-generated hologram in a dithered image

Ken-ichi Tanaka  »View Author Affiliations

Applied Optics, Vol. 50, Issue 34, pp. H315-H326 (2011)

View Full Text Article

Enhanced HTML    Acrobat PDF (4951 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



We have developed an encryption method using a computer-generated hologram (CGH) embedded in a dithered image. First, confidential information is converted into a CGH. Next, the CGH data undergo two separate dithering processes in parallel: one corresponding to CGH white pixels and one corresponding to CGH black pixels. The results from both processes are used to form a dither matrix for creating the final dithered and encoded image. In this way, confidential information can be embedded into the image. The confidential information can be extracted using a technique similar to CGH optical reconstruction.

© 2011 Optical Society of America

OCIS Codes
(090.0090) Holography : Holography
(090.1760) Holography : Computer holography
(100.0100) Image processing : Image processing
(100.4995) Image processing : Pattern recognition, metrics

ToC Category:
Computer-Generated Holography

Original Manuscript: June 6, 2011
Revised Manuscript: August 28, 2011
Manuscript Accepted: October 28, 2011
Published: December 6, 2011

Virtual Issues
Digital Holography and 3D Imaging 2011 (2011) Applied Optics

Ken-ichi Tanaka, "Embedding of computer-generated hologram in a dithered image," Appl. Opt. 50, H315-H326 (2011)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. S. F. Ming and O. C. Au, “Data hiding in halftone images by stochastic error diffusion,” IEEE Trans. Image Process. 11, 477–484 (1997).
  2. P. Comesana, F. Perez-Gonzalez, and F. Balado, “On distortion-compensated dither modulation data-hiding with repetition coding,” IEEE Trans. Signal Process. 54, 585–600 (2006). [CrossRef]
  3. B. E. Bayer, “An optimum method for two-level rendition of continuous-tone pictures,” in IEEE Intl. Conf. on Communications (IEEE, 1976), pp. 2611–2615.
  4. M. Niimi, H. Noda, and E. Kawaguchi, “An image embedding in image by a complexity based region segmentation method,” in IEEE International Conference on Image Processing ’97 (IEEE, 1997), pp. 112–119.
  5. Y. Aoki, “Watermarking technique using computer-generated holograms,” Trans. IEICE (A) J82-A, 1092–1100 (1999).
  6. B. R. Brown and A. W. Lohmann, “Complex spatial filtering with binary masks,” Appl. Opt. 5, 967–969 (1966). [CrossRef]
  7. R. Hauck and O. Bryngdahl, “Computer-generated holograms with pulse-density modulation,” J. Opt. Soc. Am. A 1, 5–10 (1984). [CrossRef]
  8. R. Eschbach, “Comparison of error diffusion methods for computer-generated holograms,” Appl. Opt. 30, 3702–3710 (1991). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article

OSA is a member of CrossRef.

CrossCheck Deposited