کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
5007850 1461701 2017 9 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Multiple information encryption by user-image-based gyrator transform hologram
موضوعات مرتبط
مهندسی و علوم پایه سایر رشته های مهندسی مهندسی برق و الکترونیک
پیش نمایش صفحه اول مقاله
Multiple information encryption by user-image-based gyrator transform hologram
چکیده انگلیسی


- The proposed method allows only authorized users to access their information
- The user images chosen by authorized users are anonymous to an unauthorized user.
- The wavelength, radius, and angle provide sensitive keys.
- The presented scheme can be implemented by using optoelectronic architectures.
- Numerical simulation results show the viability and robustness of technique.

A novel multiple information encryption by user-image-based gyrator transform hologram is proposed. In encryption process, each channel of the user image is phase encoded, modulated by random phase function and then gyrator transformed to get the gyrator spectrum of user image. Subsequently, each channel of the secret image is normalized, phase encoded, multiplied by modulated user image, and then gyrator transformed to obtain the gyrator spectrum of secret image. The encrypted digital hologram is recorded by the interference between the gyrator spectrum of user image and the spherical wave function. Similarly, the digital hologram for decryption is recorded by the interference between the gyrator spectrum of secret image and the spherical wave function. The multiple encrypted digital holograms are multiplexed into a final encoded hologram and the corresponding digital holograms for decryption are multiplexed into a final hologram for decryption. The wavelength and radius of the spherical wave function, and angle of gyrator transform are all essential keys for decryption. The proposed system has two main features. First, the encrypted hologram has no information about secret image. Second, the hologram for decryption used as identification key. Consequently the two marked security layers of information protection are achieved. The proposal can be realized by optoelectronic system. Numerical simulation results demonstrate the feasibility and security of the proposed technique.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Optics and Lasers in Engineering - Volume 92, May 2017, Pages 76-84
نویسندگان
,