Image hiding with computer-generated phase codes for optical authentication

被引:31
|
作者
Situ, GH [1 ]
Zhang, JJ [1 ]
机构
[1] Chinese Acad Sci, Grad Sch, Coll Phys Sci, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
image hiding; optical authentication; optical security; cascaded iterative Fourier transform algorithm; phase retrieval;
D O I
10.1016/j.optcom.2004.09.076
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
An image hiding technique with computer-generated phase codes is presented. Unlike the techniques proposed previously, this method transforms the hidden image into an original host image and makes it be a complex function, whose amplitude closely resembles the original host. Computer simulations show that this hiding technique is fragile, that is, sensitive to manipulations such as amplitude and phase extraction, amplitude and phase replacement, scratching, occluding part of the marked image and filtering. Therefore, this technique is appropriate for applying in authentication because introducing such manipulations to the hidden image may result in false authentication. Thus, forged credentials or identity cards can be verified confidently. Quantization effects of the computer-generated phase distributions to the revealed quality are also discussed. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:55 / 65
页数:11
相关论文
共 50 条
  • [1] Optical image encryption and authentication using phase-only computer-generated hologram
    Wang, Wenqi
    Wang, Xiaogang
    Xu, Bijun
    Chen, Junlang
    OPTICS AND LASERS IN ENGINEERING, 2021, 146
  • [2] Computer-Generated Hologram Authentication via Optical Correlation
    Chen, Wen
    2016 IEEE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2016, : 536 - 540
  • [3] Computer-generated image hologram
    Takeshi Yamaguchi
    Hiroshi Yoshikawa
    Chinese Optics Letters, 2011, 9 (12) : 24 - 27
  • [4] Computer-generated image hologram
    Yamaguchi, Takeshi
    Yoshikawa, Hiroshi
    CHINESE OPTICS LETTERS, 2011, 9 (12)
  • [5] COMPUTER-GENERATED SUBSTRUCTURE CODES (BIT SCREENS)
    GRANITO, CE
    BECKER, GT
    ROBERTS, S
    WISWESSER, WJ
    WINDLINX, KJ
    JOURNAL OF CHEMICAL DOCUMENTATION, 1971, 11 (02): : 106 - +
  • [6] Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram
    Xi, Sixing
    Wang, Xiaolei
    Song, Lipei
    Zhu, Zhuqing
    Zhu, Bowen
    Huang, Shuai
    Yu, Nana
    Wang, Huaying
    OPTICS EXPRESS, 2017, 25 (07): : 8212 - 8222
  • [7] GENERATION OF OPTICAL-PHASE SINGULARITIES BY COMPUTER-GENERATED HOLOGRAMS
    HECKENBERG, NR
    MCDUFF, R
    SMITH, CP
    WHITE, AG
    OPTICS LETTERS, 1992, 17 (03) : 221 - 223
  • [8] Image shifts with computer-generated holograms
    Esquivel, MAA
    Sandoval, SG
    Lastras, L
    Nieto, J
    REVISTA MEXICANA DE FISICA, 2000, 46 (03) : 300 - 303
  • [9] Improvement of reconstruction image for double-phase computer-generated holograms
    Kodama, Daijirou
    Kayano, Hiroshi
    Electronics and Communications in Japan, Part II: Electronics (English translation of Denshi Tsushin Gakkai Ronbunshi), 1997, 80 (03): : 23 - 29
  • [10] Improvement of reconstruction image for double-phase computer-generated holograms
    Kodama, D
    Kayano, H
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART II-ELECTRONICS, 1997, 80 (03): : 23 - 29