Article ID Journal Published Year Pages File Type
5007850 Optics and Lasers in Engineering 2017 9 Pages PDF
Abstract

•The proposed method allows only authorized users to access their information•The user images chosen by authorized users are anonymous to an unauthorized user.•The wavelength, radius, and angle provide sensitive keys.•The presented scheme can be implemented by using optoelectronic architectures.•Numerical simulation results show the viability and robustness of technique.

A novel multiple information encryption by user-image-based gyrator transform hologram is proposed. In encryption process, each channel of the user image is phase encoded, modulated by random phase function and then gyrator transformed to get the gyrator spectrum of user image. Subsequently, each channel of the secret image is normalized, phase encoded, multiplied by modulated user image, and then gyrator transformed to obtain the gyrator spectrum of secret image. The encrypted digital hologram is recorded by the interference between the gyrator spectrum of user image and the spherical wave function. Similarly, the digital hologram for decryption is recorded by the interference between the gyrator spectrum of secret image and the spherical wave function. The multiple encrypted digital holograms are multiplexed into a final encoded hologram and the corresponding digital holograms for decryption are multiplexed into a final hologram for decryption. The wavelength and radius of the spherical wave function, and angle of gyrator transform are all essential keys for decryption. The proposed system has two main features. First, the encrypted hologram has no information about secret image. Second, the hologram for decryption used as identification key. Consequently the two marked security layers of information protection are achieved. The proposal can be realized by optoelectronic system. Numerical simulation results demonstrate the feasibility and security of the proposed technique.

Related Topics
Physical Sciences and Engineering Engineering Electrical and Electronic Engineering
Authors
,