Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/107002
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Electrical and Electronic Engineering-
dc.creatorChen, Wen_US
dc.creatorChen, Xen_US
dc.date.accessioned2024-06-07T00:59:33Z-
dc.date.available2024-06-07T00:59:33Z-
dc.identifier.issn1559-128Xen_US
dc.identifier.urihttp://hdl.handle.net/10397/107002-
dc.language.isoenen_US
dc.publisherOptica Publishing Groupen_US
dc.rightsJournal © 2016 Optical Society of Americaen_US
dc.rights© 2016 Optica Publishing Group. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modifications of the content of this paper are prohibited.en_US
dc.rightsThe following publication Wen Chen and Xudong Chen, "Digital holography-secured scheme using only binary phase or amplitude as ciphertext," Appl. Opt. 55, 6740-6746 (2016) is available at https://doi.org/10.1364/AO.55.006740.en_US
dc.titleDigital holography-secured scheme using only binary phase or amplitude as ciphertexten_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage6740en_US
dc.identifier.epage6746en_US
dc.identifier.volume55en_US
dc.identifier.issue24en_US
dc.identifier.doi10.1364/AO.55.006740en_US
dcterms.abstractA digital holography-secured scheme is presented by using binary phase or amplitude. The input image is encrypted based on double random phase encoding, and a complex-valued wavefront in the charge-coupled device plane is extracted by using digital holography. Subsequently, only the phase component of the extracted complex-valued wavefront is maintained, and is further binarized. Different from conventional methods, an interesting finding in this paper is that in addition to binary phase, binary amplitude originating from the binarized phase pattern can also be applied as ciphertext. During optical decoding, the decrypted image cannot visually render clear information about the input, and the authentication is further conducted. The binary phase or amplitude pattern can be flexibly applied as ciphertext, and the fully optical approach can be implemented for the decoding. The ciphertext is effectively compressed, which can facilitate the storage and transmission in practical applications.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationApplied optics, 20 Aug. 2016, v. 55, no. 24, p. 6740-6746en_US
dcterms.isPartOfApplied opticsen_US
dcterms.issued2016-08-20-
dc.identifier.scopus2-s2.0-84983379684-
dc.identifier.eissn2155-3165en_US
dc.description.validate202405 bcch-
dc.description.oaAccepted Manuscripten_US
dc.identifier.FolderNumberEIE-0823-
dc.description.fundingSourceOthersen_US
dc.description.fundingTextHong Kong Polytechnic Universityen_US
dc.description.pubStatusPublisheden_US
dc.identifier.OPUS6670271-
dc.description.oaCategoryGreen (AAM)en_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Chen_Digital_Holography-Secured_Scheme.pdfPre-Published version2.27 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

4
Citations as of Jun 30, 2024

Downloads

2
Citations as of Jun 30, 2024

SCOPUSTM   
Citations

13
Citations as of Jun 21, 2024

WEB OF SCIENCETM
Citations

15
Citations as of Jun 27, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.