首页 > 论文 > 激光与光电子学进展 > 52卷 > 10期(pp:100902--1)

基于计算全息和随机相位编码的三维信息的加密与显示

Encryption and Display of Three-Dimensional Information Based Computer Generated Hologram and Random Phase Encoding

  • 摘要
  • 论文信息
  • 参考文献
  • 被引情况
  • PDF全文
分享:

摘要

提出了一种基于计算全息和随机相位编码的三维信息的加密与显示方案,在计算全息三维显示系统中,将随机相位掩模放置到计算全息的频谱信息中,重现时放置相应随机相位的共轭,并将此作为解密的密钥,实现对计算全息图中三维物体的解密和显示。该方案光路结构简单,在实现对三维物体显示的同时保证了信息的安全性,提高了加密的效率和信息的容量,数值模拟验证了方案的可行性。

Abstract

A scheme of three-dimensional (3D) object encryption and display based on computer generated hologram (CGH) and random phase is presented. In the scheme, according to the reconstruction system of three-dimensional objects, the random phase masks (RPMs) are embedded into spectral information of CGH, then the encrypted CGH (En-CGH) is obtained. When the En-CGH is decrypted, the conjugate random phases as the keys are placed in the right position, and the decryption and reconstruction of three-dimensional objects are realized. The system structure of this scheme is simple. The introduction of RPM improves the security of reconstruction system. The efficiency of the encryption and the capacity of information storage are both improved. The numerical simulation verifies the feasibility of the scheme.

Newport宣传-MKS新实验室计划
补充资料

中图分类号:O438

DOI:10.3788/lop52.100902

所属栏目:全息

基金项目:国家973 计划(2013CB328801)

收稿日期:2015-01-14

修改稿日期:2015-03-12

网络出版日期:2015-09-15

作者单位    点击查看

孔德照:石家庄军械工程学院电子与光学工程系, 河北 石家庄 050003清华大学精密仪器系, 精密测试技术及仪器国家重点实验室, 北京 100084
沈学举:石家庄军械工程学院电子与光学工程系, 河北 石家庄 050003
赵燕:清华大学精密仪器系, 精密测试技术及仪器国家重点实验室, 北京 100084
曹良才:清华大学精密仪器系, 精密测试技术及仪器国家重点实验室, 北京 100084
金国藩:清华大学精密仪器系, 精密测试技术及仪器国家重点实验室, 北京 100084

联系人作者:孔德照(kongoptics@126.com)

备注:孔德照(1989—),男,硕士研究生,主要从事光学信息安全方面的研究。

【1】Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Opt Lett, 1995, 20(70): 767-769.

【2】G Unnikrishnan, J Joseph, K Singh. Optical encryption by double-random phase encoding in the fractional Fourier domain[J]. Opt Lett, 2000, 25(12): 887-889.

【3】D Abookasis, O Arazi, J Rosen, et al.. Security optical systems based on a joint transform correlator with significant output images[J]. Opt Eng, 2001, 40(8): 1584-1589.

【4】T Nomura, B Javidi. Optical encryption using a joint transform correlator architecture[J]. Opt Eng, 2000, 39(8): 2031-2035.

【5】B Javidi, T Nomura. Securing information by use of digital holography[J]. Opt Lett, 2000, 25(l): 28-30.

【6】Zhu N, Wang Y T, Liu J, et al.. Optical image encryption based on interference of polarized light[J]. Opt Express, 2009, 17(16): 13418-13424.

【7】A Alfalou, C Brosseau. Dual encryption scheme of images using polarized light [J]. Opt Lett, 2010, 35(13): 2185-2187.

【8】Chen L F, Zhao D M. Optical image encryption based on fractional wavelet transform[J]. Opt Commun, 2005, 254(4-6): 361-367.

【9】Zhou N R, Wang Y X, Gong L H. Novel optical image encryption scheme based on fractional Mellin transform[J]. Opt Commun, 2011, 284(13): 3234-3242.

【10】Wang X G, Zhao D M. Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in fourier domain[J]. Opt Commun, 2011, 284(1): 148-152.

【11】Liu W, Liu Z J, Liu S T. Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm[J]. Opt Lett, 2013, 38(10): 1651-1653.

【12】Chen B, Wang H. Optically-induced-potential-based image encryption[J]. Opt Express, 2011, 19(23): 22619-22627.

【13】Carnicer A, Usategui M M, Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys[J]. Opt Lett, 2005, 30(13): 1644-1646.

【14】Wei Hengzheng, Peng Xiang, Zhang Peng, et al.. Chosen-plaintext attack on double phase encoding encryption technique [J]. Acta Optica Sinica, 2007, 27(5): 824-829.
位恒政, 彭翔, 张鹏, 等. 双随机相位加密系统的选择明文攻击[J]. 光学学报, 2007, 27(5): 824-829.

【15】Peng X, Wei H, Zhang P, Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain[J]. Opt Lett, 2006, 31(22): 3261-3263.

【16】Peng X, Zhang P, Wei H, et al.. Know-plaintext attack on optical encryption based on keys[J]. Opt Lett, 2006, 31(8): 1044-1046.

【17】Qin W, Peng X. Vulnerability to known-plaintext attack on optical encryption schemes based on two fractional Fourier transform order keys and double-random phase keys[J]. J Opt A: Pure Appl, 2009, 11(7): 075402.

【18】Wei Hengzheng, Peng Xiang. Known-plaintext attack on optical cryptosystem based on projection-onto-constraintsets algorithm and a 4f correlator[J]. Acta Optica Sinica, 2008, 28(3): 429-434.
位恒政, 彭翔. 约束集投影算法和4f 相关器的光学密码系统的已知明文攻击[J]. 光学学报, 2008, 28(3): 429-434.

【19】Guohai Situ, Giancarlo Pedrini, Wolfgang Osten. Strategy for cryptanalysis of optical encryption in the Fresnel domain [J]. Appl Opt, 2010, 49(3): 457-462.

【20】P A Blanche, A Bablumian, R Voorakaranam, et al.. Holographic three-dimensional telepresence using large-area photorefractive polymer[J]. Nature, 2010, 468 (7320): 80-83.

【21】Hao Zhang, Qiaofeng Tan, Guofan Jin. Holographic display system of a three-dimensional image with distortion-free magnification and zero-order elimination[J]. Opt Eng, 2012, 51(7): 075801.

引用该论文

Kong Dezhao,Shen Xueju,Zhao Yan,Cao Liangcai,Jin Guofan. Encryption and Display of Three-Dimensional Information Based Computer Generated Hologram and Random Phase Encoding[J]. Laser & Optoelectronics Progress, 2015, 52(10): 100902

孔德照,沈学举,赵燕,曹良才,金国藩. 基于计算全息和随机相位编码的三维信息的加密与显示[J]. 激光与光电子学进展, 2015, 52(10): 100902

被引情况

【1】杨玉婷,张廷蓉,龚 霞. 余弦高斯光束通过含球差分数傅里叶变换系统的传输. 光学学报, 2017, 37(2): 207001--1

【2】吴为民,陈家祯. 基于双快速反应码双随机相位加密系统的多重水印方法. 激光与光电子学进展, 2017, 54(12): 120901--1

您的浏览器不支持PDF插件,请使用最新的(Chrome/Fire Fox等)浏览器.或者您还可以点击此处下载该论文PDF