DOI QR코드

DOI QR Code

A Hybrid Encryption Technique for Digital Holography using DCT and DWT

  • Received : 2011.03.21
  • Accepted : 2011.04.14
  • Published : 2011.06.30

Abstract

In this paper, we present a hybrid encryption for a digital hologram which is the most valuable image content. The encryption algorithm is based on a hybrid technique implementation a four-dimensional transform combining the discrete wavelet transform(DWT) and the discrete cosine transform (DCT). The encryption scheme is composed on the basis of the energy distribution. The experimental results showed that encrypting only 0.0244% of the entire data was enough to hide the constants of the hologram. The encryption algorithm expected to be used effectively on the researches on encryption and others for digital holographic display.

Keywords

References

  1. B. R. Brown and A. W. Lohmann, "Computer-generated Binary Holograms," IBM Journal of research and Development, Vol. 13, No. 2, pp.160-168, March 1969. https://doi.org/10.1147/rd.132.0160
  2. B. Javidi and F. Okano, "Three Dimensional Television, Video, and Display Technologies," Springer Verlag Berlin. March 2002.
  3. P. Hariharan, "Basics of Holography," Cambridge University Press, 2002.
  4. H. Yosikawa, "Digital holographic signal processing," Proc. TAO First International Symposium on Three Dimensional Image Communication Technologies, 1993.
  5. X. Wang, D. Zhao, and L. Chen, "Image encryption based on extended fractional Fourier transform and digital holography technique," Optics Communication, Vol. 260, pp. 449-453, 2006. https://doi.org/10.1016/j.optcom.2005.11.006
  6. L. Chen and D. Zhao, "Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms," Optics Express, Vol. 14, No. 19, Sept. 2006.
  7. Y.-Y. Wang, Y.-R. Wang, Y. Wang, H.-J. Li, and W.-J. Sun, "Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology," Optics and Lasers Eng., Vol. 45, pp. 761-765, 2007. https://doi.org/10.1016/j.optlaseng.2007.01.003
  8. E. Tajahuerce and B. Javidi, "Encryption three-dimensional information with digital holography," Appl. Opt. Vol. 39, pp. 6595-6601, Dec. 2000. https://doi.org/10.1364/AO.39.006595
  9. H. Kim, D.-H. Kim, and Y. H. Lee, "Encryption of digital hologram of 3-D object by virtual optics," Optics Express, Vol. 12, No. 20, pp. 4912-4921, Oct. 2004. https://doi.org/10.1364/OPEX.12.004912
  10. T. J. Naughton and B. Javidi, "Compression of encrypted threedimensional objects using digital holography," Opt. Eng., Vol. 43, No. 10, pp. 2233-2238, Oct. 2004. https://doi.org/10.1117/1.1783280
  11. D.-W. Kim, H.-J. Choi, Y.-G. Choi, J.-S. Yoo, and Y.-H. Seo, "Information hiding for digital holograms by electronic partial encryption methods," Optics communication, Vol. 277, Issue 2, pp. 277-287, Sept. 2007. https://doi.org/10.1016/j.optcom.2007.05.065
  12. R. C. Gonzalez and R. E. Woods, Digital Image Processing, 3rd Edition, Pearson Prentice Hall, 2009, pp. 291-298.
  13. R. M. Rao, A. S. Bopardikar, and T. Boros, "Wavelet transforms, introduction to theory and application," Prentice Hall PTR, 1st edition, Sept. 1998.
  14. Y.-H. Seo, H.-J. Choi, and D.-W. Kim, "Lossy Coding Technique for Digital Holographic Signal", SPIE Optical Engineering, Vol. 45, No. 6, pp. 065802-1-065802-10, Jun. 2006. https://doi.org/10.1117/1.2215387