OSA's Digital Library

Optics Letters

Optics Letters

| RAPID, SHORT PUBLICATIONS ON THE LATEST IN OPTICAL DISCOVERIES

  • Vol. 28, Iss. 3 — Feb. 1, 2003
  • pp: 167–169

Watermarking of three-dimensional objects by digital holography

Sherif Kishk and Bahram Javidi  »View Author Affiliations


Optics Letters, Vol. 28, Issue 3, pp. 167-169 (2003)
http://dx.doi.org/10.1364/OL.28.000167


View Full Text Article

Acrobat PDF (357 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

We present an optical method for information watermarking of three-dimensional (3D) objects by digital holography. A hidden image is embedded by double phase encoding in a phase-shift digital hologram of the 3D object. We decode the watermarked hologram to reconstruct the hidden image and the 3D object. We use either the entire hologram or a part of it to decode the hidden image. Experiments are presented to illustrate the ability to recover both the 3D object and the decoded hidden image. Digital holograms of the 3D object are obtained by optical experiments. The watermarking process, 3D object reconstruction, and hidden image recovery are performed digitally. To the best of our knowledge, this is the first report of 3D object watermarking by use of a phase encoding technique and digital holography.

© 2003 Optical Society of America

OCIS Codes
(070.4560) Fourier optics and signal processing : Data processing by optical means
(090.0090) Holography : Holography
(100.6890) Image processing : Three-dimensional image processing
(200.3050) Optics in computing : Information processing

Citation
Sherif Kishk and Bahram Javidi, "Watermarking of three-dimensional objects by digital holography," Opt. Lett. 28, 167-169 (2003)
http://www.opticsinfobase.org/ol/abstract.cfm?URI=ol-28-3-167


Sort:  Author  |  Year  |  Journal  |  Reset

References

  1. N. F. Johnson, Z. Duric, and S. Jajodia, Advances in Information Security, Vol. I of Information Hiding: Steganography and Watermarking—Attacks and Countermeasures (Kluwer Academic, Dordrecht, The Netherlands, 2001).
  2. W. Bender, D. Gruhl, N. Morimoto, and L. Lu, IBM Syst. J. 35, 313 (1996).
  3. J. Rosen and B. Javidi, Appl. Opt. 40, 3346 (2001).
  4. G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, IEEE Signal Process. Mag. 17(5), 20 (2000).
  5. C. Hosinger and M. Rabbani, presented at the International Conference on Information Technology: Coding and Computing, Las Vegas, Nev., March 27–29, 2000.
  6. P. Refregier and B. Javidi, Opt. Lett. 20, 767 (1995).
  7. S. Kishk and B. Javidi, Appl. Opt. 41, 5470 (2002).
  8. B. Javidi, A. Sergent, G. Zhang, and L. Guibert, Opt. Eng. 36, 992 (1997).
  9. H. J. Caulfield, Handbook of Optical Holography (Academic, London, 1979).
  10. J. H. Bruninig, D. R. Herriott, J. E. Gallagher, D. P. Rosenfeld, A. D. White, and D. J. Brangaccio, Appl. Opt. 13, 2693 (1974).
  11. I. Yamaguchi and T. Zhang, Opt. Lett. 22, 1268 (1997).
  12. B. Javidi and E. Tajahuerce, Opt. Lett. 25, 610 (2000).
  13. J. W. Goodman, Introduction to Fourier Optics (McGraw-Hill, New York, 1996).
  14. J. W. Goodman, Statistical Optics (Wiley, New York, 1985).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited