OSA's Digital Library

Virtual Journal for Biomedical Optics

Virtual Journal for Biomedical Optics


  • Editors: Andrew Dunn and Anthony Durkin
  • Vol. 6, Iss. 3 — Mar. 18, 2011

Image hiding in Fourier domain by use of joint transform correlator architecture and holographic technique

Xiaoyan Shi and Daomu Zhao  »View Author Affiliations

Applied Optics, Vol. 50, Issue 5, pp. 766-772 (2011)

View Full Text Article

Enhanced HTML    Acrobat PDF (769 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



Based on joint transform correlator (JTC) architecture and holographic techniques, a new method for image hiding is presented. A hidden image encrypted by JTC architecture is embedded in the Fourier hologram of the host image. Inverse Fourier transform can be used to obtain the watermarked image, and JTC architecture is used to decode the hidden image from the watermarked hologram. Unlike other watermarking techniques, by prechoosing information, the noise added to the recovered hidden image by the host can be reduced. Unlike other watermarking systems based on double random-phase encoding, no conjugate key is used to recover the hidden image. Theoretical analyses have shown the system’s feasibility. Computer simulations are presented to verify the system’s validity and efficiency. Numerical simulations also show that the proposed system is robust enough to resist attacks, such as occlusion, noise, and filtering.

© 2011 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(100.2000) Image processing : Digital image processing
(090.1995) Holography : Digital holography

ToC Category:
Fourier Optics and Signal Processing

Original Manuscript: September 14, 2010
Revised Manuscript: December 19, 2010
Manuscript Accepted: December 19, 2010
Published: February 9, 2011

Virtual Issues
Vol. 6, Iss. 3 Virtual Journal for Biomedical Optics

Xiaoyan Shi and Daomu Zhao, "Image hiding in Fourier domain by use of joint transform correlator architecture and holographic technique," Appl. Opt. 50, 766-772 (2011)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. P. Réfrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef] [PubMed]
  2. B. Javidi, “Security information with optical technology,” Phys. Today 50(3), 27–32 (1997). [CrossRef]
  3. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000). [CrossRef]
  4. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004). [CrossRef] [PubMed]
  5. B. Javidi and T. Nomura, “Securing information by use of digital holography,” Opt. Lett. 25, 28–30 (2000). [CrossRef]
  6. T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031–2035(2000). [CrossRef]
  7. S. Kishk and B. Javidi, “Information hiding technique with double phase encoding,” Appl. Opt. 41, 5462–5470(2002). [CrossRef] [PubMed]
  8. N. Takai and Y. Mifune, “Digital watermarking by a holographic technique,” Appl. Opt. 41, 865–873 (2002). [CrossRef] [PubMed]
  9. H. T. Chang and C. L. Tsan, “Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain,” Appl. Opt. 44, 6211–6219 (2005). [CrossRef] [PubMed]
  10. S. Kishk and B. Javidi, “Watermarking of three-dimensional objects by digital holography,” Opt. Lett. 28, 167–169(2003). [CrossRef] [PubMed]
  11. Y. Shi, G. Situ, and J. Zhang, “Optical image hiding in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 8, 569–577 (2006). [CrossRef]
  12. Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding in the Fresnel domain,” Opt. Lett. 32, 1914–1916 (2007). [CrossRef] [PubMed]
  13. M. He, Q. Tan, L. Cao, Q. He, and G. Jin, “Security enhanced optical encryption system by random phase key and permutation key,” Opt. Express 17, 22462–22473 (2009). [CrossRef]
  14. H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine—cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278, 257–263 (2007). [CrossRef]
  15. D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001). [CrossRef]
  16. H. T. Chang and C. T. Chen, “Enhanced optical image verification based on joint transform correlator adopting Fourier hologram,” Opt. Rev. 11, 165–169 (2004). [CrossRef]
  17. C. L. Mela and C. Iemmi, “Optical encryption using phase-shifting interferometry in a joint transform correlator,” Opt. Lett. 31, 2562–2564 (2006). [CrossRef] [PubMed]
  18. O. Matoba and B. Javidi, “Optical retrieval of encrypted digital holograms for secure real-time display,” Opt. Lett. 27, 321–323 (2002). [CrossRef]
  19. J. W. Goodman, Introduction to Fourier Optics, 2nd ed. (McGraw-Hill, 1996).
  20. M. Born and E. Wolf, Principles of Optics, 7th ed. (Cambridge University, 1999).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited