OSA's Digital Library

Chinese Optics Letters

Chinese Optics Letters


  • Vol. 11, Iss. 2 — Feb. 1, 2013
  • pp: 020901–

Fast numerical generation and hybrid encryption of a computer-generated Fresnel holographic video sequence

Peter Tsang, K.W.-K. Cheung, and T.-C. Poon  »View Author Affiliations

Chinese Optics Letters, Vol. 11, Issue 2, pp. 020901- (2013)

View Full Text Article

Acrobat PDF (296 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

  • Export Citation/Save Click for help


Research demonstrates that a Fresnel hologram can be generated and simultaneously encrypted numerically based on a secret symmetric key formed by the maximal length sequence (M-sequence). The method can be directly extended to encrypt a video holographic clip in a frame-by-frame manner. However, given the limited combination of signals in the family of M-sequence, hacking the secret key through trial and error can be time consuming but not difficult. In this letter, we propose a method that is difficult to crack with brute force for encrypting a holographic video sequence. An M-sequence is first randomly assigned to encrypt each frame of the holographic video signal. Subsequently, the index of the selected M-sequence, which is necessary to decrypt the hologram, is encrypted with the RSA algorithm before transmitting to the receiving end. At the receiving end, the decoder is provided with a private key to recover the index for each frame, and the corresponding M-sequence is used to decrypt the encoded hologram.

© 2013 Chinese Optics Letters

OCIS Codes
(090.0090) Holography : Holography
(090.1760) Holography : Computer holography
(090.1995) Holography : Digital holography

Peter Tsang, K.W.-K. Cheung, and T.-C. Poon, "Fast numerical generation and hybrid encryption of a computer-generated Fresnel holographic video sequence," Chin. Opt. Lett. 11, 020901- (2013)

Sort:  Author  |  Year  |  Journal  |  Reset


  1. Y.-H. Seo, H. J. Choi, and D. W. Kim, Opt. Commun. 282, 367 (2009).
  2. K. B. Doh, K. Dobson, T.-C. Poon, and P. S. Chung, Appl. Opt. 48, 134 (2009).
  3. J. Li, T. Zheng, Q.-Z. Liu, and R. Li, Opt. Commun. 285, 1704 (2012).
  4. Q. Guo, Z. Liu, and S. Liucora, Opt. Commun. 284, 3918 (2011).
  5. H. Hwang, H. Chang, and W. Lie, Opt. Express 17, 13700 (2009).
  6. G. Situ and J. Zhang, Opt. Lett. 29, 1584 (2004).
  7. S. Kishk and B. Javidi, Appl. Opt. 41, 5462 (2002).
  8. P. Tsang, W. Cheung, T. Poon, and C. Zhou, Opt. Express 19, 15205 (2011).
  9. T. Shimobaba, H. Nakayama, N. Masuda, and T. Ito, Opt. Express 19, 19504 (2010).
  10. P. W. M. Tsang, T.-C. Poon, and K. W. K. Cheung, Appl. Opt. 50, B46 (2011).
  11. S. W. Golomb, Shift Register Sequences (Aegean Park Press, California, 1981).
  12. R. L. Rivest, A. Shamir, and L. Adleman, Communication of the ACM 21, 120 (1978).
  13. "RFC 3447: Public-Key Cryptography Standards (PKCS)", http://rfc-ref.org/RFC-TEXTS/3447/chapter7.html#d4e442871.

Cited By

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited