Securing information by use of digital holography (original) (raw)
Related papers
Securing of Two and Three Dimensional Information Based on In-line Digital Holography
2000
A method that combines the high speed of digital encryption and the high security of optical encryption with the advantages of electronic transmission, storage, and decryption is introduced. The encryption is performed by use of multi-dimensional lock on the hologram plan, providing high security in the encrypted image and a key with many degrees of freedom. We described how our
Review on Cryptography of Image Using Computer Generated Holography
Journal of Network and Information Security, 2019
Holography is the process of capturing three dimensional images by recording patterns of light wave reflection. It is interference of two coherent light sources, one being scattered from an object and another reference light being sent directly into the holographic plate. This interference pattern is then used in a 3D holographic display to view the holographic representation of the object. This is done by passing the same reference light through the interference pattern fringe in the 3D display. Computer Generated Holography (CGH) is a simulation technique to generate the same interference pattern without the object being present. Usually this is done by taking an image or a 3D representation of the object and using numerical techniques to simulate the interference pattern of the light field. CGH has many applications and one of them is image encryption and decryption. In this paper compare traditional and advance hologram methods.
Holographic Data Encryption and Decryption Techniques- literature survey (2001)
This report is to summarize the literature search conducted so far on holographic data encryption techniques. The search indicates three major streams: the amplitude and phase random mask encoded, phase contrast and digital holography techniques. Other techniques outside those three streams are briefly reviewed next. Brief discussion and comments in comparison of the searched methods with the optical scanning method are also presented. In conclusion no prior method has been reported to be carried out using optical scanning holography technique. (note: survey conducted on 2001)
All-digital holography and application in digital image hiding
Holography, Diffractive Optics, and Applications II, 2005
It is presented here that the all-digital holography is applied to the digital image hiding. Computer Generated Hologram is generated and reconstructed by numerical method. The secret message and the host message are all still gray-images. The secret image is first transformed into a hologram (CGH), which is called holographic transform and then Arnold transform is performed. DCT is applied in the host image. Then the secret image is embedded into the DCT middle coefficients. The application of the holographic transform improves the transparency of the secret image; by controlling the parameter of the hologram the secrecy of the image is enhanced and add another key to have invisibility and certain robust.
Optics & Laser Technology, 2010
A digital holographic information system can process complex three-dimensional (3-D) object information. We demonstrate a scheme for securing complex and 3-D information in the context of in-line digital holography. Double random phase encoding in the free-space propagation domain of light is used to secure the complex information. Encrypted in-line digital holograms are recorded using the position-phase-shifting method. The encrypted complex image at the CCD recording plane is retrieved from the real-valued digital holograms, and is used for decryption. The robustness of the method has also been studied for various securing keys used in the method against blind decryption. A layer-bylayer information retrieval from the encrypted digital hologram is also discussed. The method can also be used to secure digital complex information in a virtual optics modality using holographic principles.
IRJET, 2022
Optical encryption is used to secure data in the transport layer of the network as it is carried over optical waves across fiber-optic cables. The acquisition and processing of holograms with a digital sensor array are called digital holograms. Combining both yields holographic encryption VOHE is a method of encrypting information over a Virtual Optical Holographic Encryption system. It includes a virtual optical system based on digital holography and Fourier lens. The VOHE system provides parameters such as propagation wavelength (λ) and focal length (f) of the Fourier lens which are keys that are used for encryption and decryption processes. This review highlights different optical encryption and decryption methods using different algorithms and reviews digital holograms. Diffie-Hellman and Expanded Diffie-Hellman key exchange were also briefly discussed.
Concealing information in security hologram using interferometry
Optica Applicata
A new method utilizing holographic interferometry technique is described to conceal information in security holograms for enhancing their anti-counterfeiting ability. This concealed information can only be imitated if security hologram is illuminated through correct decoding wavefront generated through a key hologram. In decoding process, three spatially separated focus spots emerge at predefined positions which upon divergence further generate interferometric fringes modulated with concealed information in them. When security hologram is perfectly aligned, interferometric fringes disappear and concealed information becomes visible. The advantage of encoding through this technique lies in the fact that relative repositioning of key and security hologram becomes much easier and also additionally brings multifold improvement in the security level of the verification systems.
Sandwich holography for storing information interferometrically with a high degree of security
Applied Optics, 1979
An entirely new method of storing confidential data is presented. The method is based on sandwich holography, and its-main principle is the following: The basic state of a surface is recorded in one plate of a sandwich'pair; in the other plate the same surface is recorded slightly deformed. When the two holograms are combined an interference fringe pattern is formed. By controlling the deformation of the surface it is possible to obtain exactly the interference pattern wainted. This controlled pattern can be used to create information that is either directly readable digital information or a binary coded information, suitable to automatic readout. The data stored in the holograms are not possible to read out from one hologram alone, but the two holograms must be put together to make the information available. The system is primarily meant to be applied on ID cards but can also be used for other applications where data have to be stored securely.
Image encryption based on pure intensity random coding and digital holography technique
Optik - International Journal for Light and Electron Optics, 2003
We propose a novel image encryption method that combines the pure intensity random encoding and the digital holography technique. A phase-shifting interferometer records both phase and amplitude information of a complex object with a CCD sensor array. The encryption is performed by placing two pure intensity random masks between the image to be encrypted and an intensity recording device. Electronic decryption can be performed with fast Fresnel reconstruction procedure. Numerical simulation results show the validity of the algorithm and an optoelectronic implementation setup is also presented.