2019
DOI: 10.3390/photonics7010001
|View full text |Cite
|
Sign up to set email alerts
|

Angle Multiplexing Optical Image Encryption in the Fresnel Transform Domain Using Phase-Only Computer-Generated Hologram

Abstract: We propose an angle multiplexing method for optics-based image encryption using a phase-only computer-generated hologram (POCGH) in the tilted Fresnel transform (TFrT) domain. Modified Gerchberg-Saxton algorithms, based on the three types of rotation manipulation in both the hologram and reconstruction planes, are used with their corresponding TFrT parameters to extract the phase-only functions (POFs) of the target images. All the extracted POFs are then phase-modulated and summed to obtain the final POCGH, wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 39 publications
(61 reference statements)
0
4
0
Order By: Relevance
“…Interference- [80,81], ghost imaging- [82,83] and holography [84][85][86]-based encryption algorithms represent innovative approaches to securing digital information, with applications ranging from communication to image protection [87][88][89][90][91][92][93]. Interference-based encryption harnesses the principles of wave interference, exploiting the complexity introduced by superimposing multiple light waves to encode information in a manner that id difficult to decipher without the correct key [94][95][96][97][98][99][100][101][102][103].…”
Section: Other Optical Encryption Algorithmsmentioning
confidence: 99%
“…Interference- [80,81], ghost imaging- [82,83] and holography [84][85][86]-based encryption algorithms represent innovative approaches to securing digital information, with applications ranging from communication to image protection [87][88][89][90][91][92][93]. Interference-based encryption harnesses the principles of wave interference, exploiting the complexity introduced by superimposing multiple light waves to encode information in a manner that id difficult to decipher without the correct key [94][95][96][97][98][99][100][101][102][103].…”
Section: Other Optical Encryption Algorithmsmentioning
confidence: 99%
“…However, they cannot obtain phase distribution, which is more important in the imaging of some transparent samples. To address this problem, the phase retrieval algorithm was proposed [1][2][3]. This is a type of technique to reconstruct the wavefront without interferometric measurement.…”
Section: Introductionmentioning
confidence: 99%
“…The optical encryption technology based on holographic has emerge as a new technology that has many has many advantages such as high speed, high capacity and is multi-dimensional as well [1][2][3]. For these reasons, the optical holographic encryption technology is gradually received great attention and considered as an enabling technology [4,5].…”
Section: Introductionmentioning
confidence: 99%