Skip to main content Accessibility help
×
Hostname: page-component-586b7cd67f-vdxz6 Total loading time: 0 Render date: 2024-11-23T13:08:59.787Z Has data issue: false hasContentIssue false

5 - Applications of Phase-Only Hologram in Display, Holographic Encryption, and Steganography

Published online by Cambridge University Press:  07 January 2021

Peter Wai Ming Tsang
Affiliation:
City University of Hong Kong
Get access

Summary

Digital holography has indeed led to numerous advancement of the classical, analog holographic technology that only permits a hologram to be permanently recorded onto a photographic film. In digital holography, a hologram can be captured from a real object. It can also be numerically generated as an array of numbers that can be stored as digital data, processed through computation, and distributed via digital communication links. In general, the primary purpose of holograms is to display 3-D images. Hence, a digital hologram in digital data form will not be of much practical use if it cannot be visually seen as a 3-D image. This is one of the major disadvantages of a digital hologram compared with the optical hologram, which can be readily captured with our eyes. However, a digital hologram can have different applications apart from generating 3-D images. In fact, recent research has shown that a digital hologram can be utilized in protecting sensitive data (a task referred to as cryptography), or in steganography for embedding large amount of additional data. This chapter describes some of the important applications of digital phase-only holograms in 3-D display, holographic cryptography, and steganography.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2021

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Refregier, P. and Javidi, B., “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett., vol. 20, pp. 767769 (1995).Google Scholar
Jiao, S., Li, G., Zhou, C., Zou, W., and Li, X., “Special ciphertext-only attack to double random phase encryption by plaintext shifting with speckle correlation,” J. Opt. Soc. Am. A, vol. 35, pp. A1A6 (2018).CrossRefGoogle ScholarPubMed
Li, G., Yang, W., Li, D., and Situ, G., “Cyphertext-only attack on the double random-phase encryption: experimental demonstration,” Opt. Exp., vol. 25, pp. 86908697 (2017).Google Scholar
Liu, X., Wu, J., He, W., Liao, M., Zhang, C., and Peng, X., “Vulnerability to ciphertext-only attack of optical encryption scheme based on double random phase encoding,” Opt. Exp., vol. 23, pp. 1895518968 (2015).CrossRefGoogle ScholarPubMed
Zhang, Y., Xiao, D., Wen, W., and Liu, H., “Vulnerability to chosen-plaintext attack of a general optical encryption model with the architecture of scrambling-then-double random phase encoding,” Opt. Lett., vol. 38, pp. 45064509 (2013).Google Scholar
Frauel, Y., Castro, A., Naughton, T., and Javidi, B., “Resistance of the double random phase encryption against various attacks,” Opt. Exp., vol. 15, pp. 1025310265 (2007).Google Scholar
Peng, X., Wei, H., and Zhang, P., “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett., vol. 31, pp. 32613263 (2006).CrossRefGoogle ScholarPubMed
Peng, X., Zhang, P., Wei, H., and Yu, B., “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett., vol. 31, pp. 10441046 (2006).CrossRefGoogle ScholarPubMed
Carnicer, A., Montes-Usategui, M., Arcos, S., and Juvells, I., “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett., vol. 30, pp. 16441646 (2005).Google Scholar
Chen, W. and Chen, X., “Double random phase encoding using phase reservation and compression,” J. Opt., vol. 16, art. no. 205402 (2014).Google Scholar
Markman, A. and Javidi, B., “Full-phase photon-counting double-random-phase encryption,” J. Opt. Soc. Am. A, vol. 31, pp. 394403 (2014).Google Scholar
Gong, Q., Liu, X., Li, G., and Qin, Y., “Multiple-image encryption and authentication with sparse representation by space multiplexing,” Appl. Opt., vol. 52, pp. 74867493 (2013).CrossRefGoogle ScholarPubMed
Unnikrishnan, G., Joseph, J., and Singh, K., “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett., vol. 25, pp. 887889 (2000).CrossRefGoogle ScholarPubMed
Tao, R., Xin, Y., and Wang, Y., “Double image encryption based on random phase encoding in the fractional Fourier domain,” Opt. Exp., vol. 15, pp. 1606716079 (2007).Google Scholar
Kumar, P., Kumar, A., Joseph, J., and Singh, K., “Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions,” Opt. Lett., vol. 34, pp. 331333 (2009).Google Scholar
Chen, W., Quan, C., Tay, C.J., “Optical color image encryption based on Arnold transform and interference method,” Opt Comm., vol. 282, no. 18, pp. 36803685 (2009).Google Scholar
Ren, Z., Su, P., Ma, J., and Jin, G., “Secure and noise-free holographic encryption with a quick-response code,” Chin. Opt. Lett., vol. 12, art. no. 010601 (2014).Google Scholar
Barrera, J., Mira, A., and Torroba, R., “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Exp., vol. 21, pp. 53735378 (2013).CrossRefGoogle ScholarPubMed
Tsang, P.W.M., “Single-random-phase holographic encryption of images,” Opt. Lasers Eng., vol. 89, pp. 2228 (2017).Google Scholar
Tsang, P.W.M., “Enhanced single random phase holographic encryption of optical images,” in Advanced Secure Optical Image Processing for Communications, Falou, A.A. (ed.) (IOP Publishing, 2018), pp. 9-1–9-12.Google Scholar
Tsang, P.W.M., Jiao, A., and Poon, T.-C., “Fast conversion of digital Fresnel hologram to phase-only hologram based on localized error diffusion and redistribution,” Opt. Exp., vol. 22, pp. 50605066 (2014).Google Scholar
Tsang, P.W.M. and Poon, T.-C., “Novel method for converting digital Fresnel hologram to phase-only hologram based on bidirectional error diffusion,” Opt. Exp., vol. 21, pp. 2368023686 (2013).Google Scholar
Tsang, P.W.M., Poon, T.-C., Wang, W., Zhu, X., and Chan, K., “Integrating multiple images in a sampled phase-only hologram,” Chin. Opt. Lett., vol. 17, art. no. 050901 (2019).CrossRefGoogle Scholar
Li, B. and Xu, J. W., “Period of Arnold transformation and its application in image scrambling,” J. Cen. South U. Tech., vol. 12, p. 278 (2005).Google Scholar
Hariyanto, E. and Rahim, R., “Arnold’s cat map algorithm in digital image encryption,” Intl J. Sci. Res., vol. 5, pp. 13631365 (2016).Google Scholar
Mishra, M., Kumar, S., and Mishra, S., “Security enhanced digital image steganography based on successive Arnold transformation,” in Advances in Computer Science, Engineering & Applications, Wyld, D., Zizka, J., and Nagamalai, D. (eds.) (Springer, 2012), pp. 221229.Google Scholar
Li, M., Liang, T., and He, Y.-J., “Arnold transform based image scrambling method,” Proc. 3rd Intl Conf. Multimedia Technology (ICMT-13) (2013).Google Scholar
Tsang, P.W.M. and Poon, T.-C., “Data-embedded-error-diffusion hologram (invited paper),” Chin. Opt. Lett., vol. 12, art. no. 060017 (2014).Google Scholar
Tsang, P.W.M., Poon, T.-C., and Jiao, A.S.M., “Embedding intensity image in grid-cross down-sampling (GCD) binary holograms based on block truncation coding,” Opt. Comm., vol. 304, p. 62 (2013).CrossRefGoogle Scholar
Tsang, P.W.M., Poon, T.-C., and Cheung, W.K., “Intensity image-embedded binary holograms,” Appl. Opt., vol. 52, pp. A26A32 (2013).Google Scholar
Delp, E. and Mitchell, O., “Image compression using block truncation coding,” IEEE Trans. Comm., vol. 27, no. 9, p. 1335 (1979).Google Scholar
Floyd, R.W. and Steinberg, L., “An adaptive algorithm for spatial grey scale,” Proc. Soc. Inf. Disp., vol. 17, pp. 7577 (1976).Google Scholar
Tsang, P.W.M., Poon, T.-C., Cheung, W.K., and Liu, J.P., “Computer generation of binary Fresnel holography,” Appl. Opt., vol. 50, pp. B88B95 (2011).Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×