OSA's Digital Library

Journal of the Optical Society of America A

Journal of the Optical Society of America A

| OPTICS, IMAGE SCIENCE, AND VISION

  • Editor: Franco Gori
  • Vol. 28, Iss. 7 — Jul. 1, 2011
  • pp: 1453–1461

Lensless optical data embedding system using concealogram and cascaded digital Fresnel hologram

Hone-Ene Hwang, Hsuan T. Chang, and Wen-Nung Lie  »View Author Affiliations


JOSA A, Vol. 28, Issue 7, pp. 1453-1461 (2011)
http://dx.doi.org/10.1364/JOSAA.28.001453


View Full Text Article

Enhanced HTML    Acrobat PDF (1024 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

A robust lensless optical data embedding system using both the computer-generated concealogram and the digital Fresnel hologram (DFH) is proposed. The concealogram and the DFH are cascaded as the input and filter planes, respectively. When the concealogram is illuminated by a plane wave, the hidden data can be extracted at the output plane without using any lenses. The longitudinal positions of the filter and the output planes, as well as the wavelength, can be used as the secret keys to enhance system security. Furthermore, the robustness of the proposed system against noise and distortion is also demonstrated.

© 2011 Optical Society of America

OCIS Codes
(100.3010) Image processing : Image reconstruction techniques
(100.5070) Image processing : Phase retrieval
(060.4785) Fiber optics and optical communications : Optical security and encryption

ToC Category:
Image Processing

History
Original Manuscript: September 14, 2010
Revised Manuscript: March 26, 2011
Manuscript Accepted: May 14, 2011
Published: June 21, 2011

Citation
Hone-Ene Hwang, Hsuan T. Chang, and Wen-Nung Lie, "Lensless optical data embedding system using concealogram and cascaded digital Fresnel hologram," J. Opt. Soc. Am. A 28, 1453-1461 (2011)
http://www.opticsinfobase.org/josaa/abstract.cfm?URI=josaa-28-7-1453


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. P. Réfrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef] [PubMed]
  2. B. Javidi, G. Zhang, and J. Li, “Encrypted optical memory using double-random phase encoding,” Appl. Opt. 36, 1054–1058(1997). [CrossRef] [PubMed]
  3. O. Matoba and B. Javidi, “Encrypted optical memory using multi-dimensional keys,” Opt. Lett. 24, 762–765 (1999). [CrossRef]
  4. O. Matoba and B. Javidi, “Encrypted optical storage with wavelength-key and random phase codes,” Appl. Opt. 38, 6785–6790 (1999). [CrossRef]
  5. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000). [CrossRef]
  6. X. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, “Secure optical storage that uses fully phase encryption,” Appl. Opt. 39, 6689–6694 (2000). [CrossRef]
  7. P. C. Mogensen and J. Glückstad, “Phase-only optical encryption,” Opt. Lett. 25, 566–568 (2000). [CrossRef]
  8. X. Peng, L. Yu, and L. Cai, “Double-lock for image encryption with virtual optical wavelength,” Opt. Express 10, 41–45(2002). [PubMed]
  9. X. Peng, P. Zhang, and L. Cai, “Information security system based on virtual-optics imaging methodology and public key infrastructure,” Optik 115, 420–426 (2004). [CrossRef]
  10. H. T. Chang and C. C. Chen, “Fully phase asymmetric image verification system based on joint transform correlator,” Opt. Express 14, 1458–1467 (2006). [CrossRef] [PubMed]
  11. H. T. Chang and C. T. Chen, “Asymmetric-image verification for security optical system based on joint transform correlator,” Opt. Commun. 239, 43–54 (2004). [CrossRef]
  12. H. T. Chang and C. T. Chen, “Enhanced optical image verification based on joint transform correlator adopting Fourier hologram,” Opt. Rev. 11, 165–169 (2004). [CrossRef]
  13. Y. C. Chang, H. T. Chang, and C. J. Kuo, “Hybrid image cryptosystem based on dyadic phase displacement in the Fourier domain,” Opt. Commun. 236, 245–257 (2004). [CrossRef]
  14. H. T. Chang, “Optical image encryption using separate amplitude-based virtual image and iteratively-retrieved phase information,” Opt. Eng. 40, 2165–2171 (2001). [CrossRef]
  15. H. T. Chang, W. C. Lu, and C. J. Kuo, “Multiple-phase retrieval for optical security systems by use of random-phase encoding,” Appl. Opt. 41, 4825–4834 (2002). [CrossRef] [PubMed]
  16. S. Kishk and B. Javidi, “Information hiding technique with double phase encoding,” Appl. Opt. 41, 5462–5470(2002). [CrossRef] [PubMed]
  17. G. S. Lin, H. T. Chang, W. N. Lie, and C. H. Chuang, “A public-key-based optical image cryptosystem based on data embedding techniques,” Opt. Eng. 42, 2331–2339 (2003). [CrossRef]
  18. N. K. Nishchal, J. Joseph, and K. Singh, “Fully phase encryption using digital holography,” Opt. Eng. 43, 2959–2966(2004). [CrossRef]
  19. H. Kim, D.-H. Kim, and Y. H. Lee, “Encryption of digital hologram of 3-D object by virtue optics,” Opt. Express 12, 4912–4921(2004). [CrossRef] [PubMed]
  20. G. Situ and J. Zhang, “A cascaded iterative Fourier transform algorithm for optical security applications,” Optik 114, 473–477(2003). [CrossRef]
  21. G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115–122 (2004). [CrossRef]
  22. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586(2004). [CrossRef] [PubMed]
  23. G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005). [CrossRef] [PubMed]
  24. H. T. Chang and C. L. Tsan, “Image watermarking by use of digital holography embedded in DCT domain,” Appl. Opt. 44, 6211–6219 (2005). [CrossRef] [PubMed]
  25. Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems based on a correlator with significant output image,” Appl. Opt. 39, 5295–5301 (2000). [CrossRef]
  26. D. Abookasis, O. Arazi, and B. Javidi, “Security optical systems based on a joint transform correlator with significant output,” Opt. Eng. 40, 1584–1589 (2001). [CrossRef]
  27. J. Rosen and B. Javidi, “Hidden images in halftone pictures,” Appl. Opt. 40, 3346–3353 (2001). [CrossRef]
  28. D. Abookasis, O. Montal, O. Abramson, and J. Rosen, “Watermarks encrypted in a concealogram and deciphered by a modified joint transform correlator,” Appl. Opt. 44, 3019–3023 (2005). [CrossRef] [PubMed]
  29. D. Mas, J. Garcia, C. Ferreira, L. M. Bernardo, and F. Marinho, “Fast algorithm for free-space diffraction patterns calculation,” Opt. Commun. 164, 233–245 (1999). [CrossRef]
  30. S. Deng, L. Liu, H. Lang, D. Zhao, and X. Liu, “Cascaded Fresnel digital hologram and its application to watermarking,” Opt. Appl. 36, 413–420 (2006).
  31. H. E. Hwang, H. T. Chang, and W. N. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems,” Opt. Express 17, 13700–13710 (2009). [CrossRef] [PubMed]
  32. B. R. Brown and A. W. Lohmann, “Complex spatial filtering with binary masks,” Appl. Opt. 5, 967–969 (1966). [CrossRef] [PubMed]
  33. J. W. Goodman, Introduction to Fourier Optics, 2nd ed. (McGraw-Hill, 1996), pp. 355–358.
  34. O. Ripoll, V. Kettunen, and H. P. Herzig, “Review of iterative Fourier-transform algorithms for beam shaping applications,” Opt. Eng. 43, 2549–2556 (2004). [CrossRef]
  35. H.P.Herzig, ed., Micro-Optics (Taylor & Francis, 1996).
  36. G. Tricoles, “Computer generated holograms: an historical review,” Appl. Opt. 26, 4351–4357 (1987). [CrossRef] [PubMed]
  37. R. W. Gerchberg and W. O. Saxton, “Phase determination for image and diffraction plane pictures in the electron microscope,” Optik 34, 275–284 (1971).
  38. R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).
  39. W. X. Cong, N. X. Chen, and B. Y. Gu, “Phase retrieval in the Fresnel transform system: a recursive algorithm,” J. Opt. Soc. Am. A 16, 1827–1830 (1999). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited