Image hiding with computer-generated phase codes for optical authentication

被引:31
|
作者
Situ, GH [1 ]
Zhang, JJ [1 ]
机构
[1] Chinese Acad Sci, Grad Sch, Coll Phys Sci, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
image hiding; optical authentication; optical security; cascaded iterative Fourier transform algorithm; phase retrieval;
D O I
10.1016/j.optcom.2004.09.076
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
An image hiding technique with computer-generated phase codes is presented. Unlike the techniques proposed previously, this method transforms the hidden image into an original host image and makes it be a complex function, whose amplitude closely resembles the original host. Computer simulations show that this hiding technique is fragile, that is, sensitive to manipulations such as amplitude and phase extraction, amplitude and phase replacement, scratching, occluding part of the marked image and filtering. Therefore, this technique is appropriate for applying in authentication because introducing such manipulations to the hidden image may result in false authentication. Thus, forged credentials or identity cards can be verified confidently. Quantization effects of the computer-generated phase distributions to the revealed quality are also discussed. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:55 / 65
页数:11
相关论文
共 50 条
  • [31] COMPUTER-GENERATED TERNARY PHASE-DIAGRAM
    COMBS, LL
    LYNN, GW
    JOURNAL OF CHEMICAL EDUCATION, 1995, 72 (07) : 608 - 609
  • [32] Optical wavelet-based feature extraction of image with use of computer-generated hologram
    Zhang, Y
    Yang, GZ
    Gu, BY
    Dong, BZ
    OPTIK, 2000, 111 (01): : 45 - 47
  • [33] COMPUTER-GENERATED DIAGNOSIS AND IMAGE-ANALYSIS - AN OVERVIEW
    BARTELS, PH
    CANCER, 1992, 69 (06) : 1636 - 1638
  • [34] Angle Multiplexing Optical Image Encryption in the Fresnel Transform Domain Using Phase-Only Computer-Generated Hologram
    Chang, Hsuan T.
    Wang, Yao-Ting
    Chen, Chien-Yu
    PHOTONICS, 2020, 7 (01)
  • [35] COMPUTER-GENERATED 3-DIMENSIONAL IMAGE HOLOGRAMS
    LESEBERG, D
    APPLIED OPTICS, 1992, 31 (02) : 223 - 229
  • [36] IR IMAGE CONSTRUCTION WITH COMPUTER-GENERATED REFLECTION HOLOGRAMS
    ANGUS, JC
    COFFIELD, FE
    EDWARDS, RV
    MANN, JA
    RUGH, RW
    GALLAGHER, NC
    APPLIED OPTICS, 1977, 16 (11): : 2798 - 2799
  • [37] LOW VISIBILITY EFFECTS FOR COMPUTER-GENERATED IMAGE SYSTEMS
    SCHUMACK.RA
    ROUGELOT, RS
    SID INTERNATIONAL SYMPOSIUM DIGEST OF TECHNICAL PAPERS, 1971, 11 (MAY): : 70 - &
  • [38] Image Encryption Based on Interleaved Computer-Generated Holograms
    Kong, Dezhao
    Cao, Liangcai
    Shen, Xueju
    Zhang, Hao
    Jin, Guofan
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (02) : 673 - 678
  • [39] Image quality evaluation and control of computer-generated holograms
    Yoshikawa, Hiroshi
    Yamaguchi, Takeshi
    Uetake, Hiroki
    PRACTICAL HOLOGRAPHY XXX: MATERIALS AND APPLICATIONS, 2016, 9771
  • [40] COMPUTER-GENERATED IMAGE-ANALYSIS OF CAROTID ATHEROSCLEROSIS
    KADOWAKI, MH
    MASAWA, N
    SINGH, TM
    GIDDENS, DP
    ZARINS, CK
    GLAGOV, S
    ARTERIOSCLEROSIS, 1989, 9 (05): : A710 - A710