2017
DOI: 10.1364/ao.56.009126
|View full text |Cite
|
Sign up to set email alerts
|

Computer-generated hologram using binary phase with an aperture

Abstract: Computer-generated holograms (CGHs) have attracted more and more attention in some application fields, such as 3D displays, optical security, and beam shaping. In this paper, a strategy is presented for optical information verification based on CGH using binary phase (1 bit) with an aperture. The input is encoded into the cascaded phase-only masks based on CGH via iterative phase retrieval, and one extracted phase mask is binarized in which one part is selected according to an aperture and further embedded int… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 52 publications
0
3
0
Order By: Relevance
“…The effectiveness and flexibility of the proposed cryptosystem have been validated by the numerical simulation results. In the future, the cylindrical diffraction might be applied to the optical image authentication [38,39].…”
Section: Discussionmentioning
confidence: 99%
“…The effectiveness and flexibility of the proposed cryptosystem have been validated by the numerical simulation results. In the future, the cylindrical diffraction might be applied to the optical image authentication [38,39].…”
Section: Discussionmentioning
confidence: 99%
“…The 1D intensity points generated by correlated photon imaging are hidden into phase-only masks for optical watermarking. The proposed approach provides a promising strategy for optical information security [32][33][34][35][36][37][38][39].…”
Section: Discussionmentioning
confidence: 99%
“…Besides traditional image information security, [1,2] optical information security also has a lot of room to develop. Different kinds of optical information processing technologies have been put into application to realize more efficient security systems, such as phase retrieval algorithms, double random phase encoding (DRPE) technique, [3][4][5][6] digital holography, [7][8][9] phaseshifting interferometry, [10][11][12] ghost imaging, [13][14][15][16][17][18][19] aperture movement, [20] and sparse-phase multiplexing. [21] Phase retrieval is a typical technology for optical encryption and authentication, which usually encodes the information of the secret image into one or several pseudo-random phase masks.…”
Section: Introductionmentioning
confidence: 99%