Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/77657
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Electronic and Information Engineering-
dc.creatorChen, W-
dc.date.accessioned2018-08-28T01:33:53Z-
dc.date.available2018-08-28T01:33:53Z-
dc.identifier.issn1559-128X-
dc.identifier.urihttp://hdl.handle.net/10397/77657-
dc.language.isoenen_US
dc.publisherOptical Society of Americaen_US
dc.rights© 2018 Optical Society of America. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modifications of the content of this paper are prohibited.en_US
dc.rightsThe following publication Wen Chen, "Computer-generated hologram marked by correlated photon imaging," Appl. Opt. 57, 1196-1201 (2018) is available at https://doi.org/10.1364/AO.57.001196.en_US
dc.titleComputer-generated hologram marked by correlated photon imagingen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage1196-
dc.identifier.epage1201-
dc.identifier.volume57-
dc.identifier.issue5-
dc.identifier.doi10.1364/AO.57.001196-
dcterms.abstractThe computer-generated hologram (CGH) has been studied for many applications. In this paper, CGH is watermarked by correlated photon imaging. An input image is encoded into two cascaded phase-only masks by using the CGH principle. Subsequently, two different marks are independently encoded into one-dimensional (1D) intensity points by using correlated photon imaging (or ghost imaging), and the recorded 1D intensity points are embedded into the extracted phase masks for optical watermarking. During the decoding, the input is recovered by using two watermarked phase masks. To verify copyright of the recovered input image, information embedded in two phase-only masks is retrieved and used to decode the hidden marks. The decoded marks do not visually render clear information due to only a few measurements and, instead, are authenticated. It is illustrated that the quality of the recovered input image is high, and a different imaging approach can be applied in the CGH system for optical watermarking. The proposed approach provides a promising strategy for optical information security.-
dcterms.accessRightsopen access-
dcterms.bibliographicCitationApplied optics, 10 Feb. 2018, v. 57, no. 5, p. 1196-1201-
dcterms.isPartOfApplied optics-
dcterms.issued2018-02-10-
dc.identifier.isiWOS:000424680800029-
dc.identifier.scopus2-s2.0-85041916554-
dc.identifier.eissn2155-3165-
dc.description.validate201808 bcrc-
dc.description.oaAccepted Manuscript-
dc.identifier.FolderNumbera0739-n21-
dc.identifier.SubFormID1349-
dc.description.fundingSourceRGC-
dc.description.fundingSourceOthers-
dc.description.fundingTextRGC: 25201416-
dc.description.fundingTextOthers: R2016A030, R2016A009, G-YBVU, 1-ZE5F, 4-BCDY, 4-ZZHM-
dc.description.pubStatusPublished-
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
21._AO-Watermarking-CGH-V3V3-2018.pdfPre-Published version2.64 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

50
Last Week
0
Last month
Citations as of Jun 19, 2022

Downloads

46
Citations as of Jun 19, 2022

SCOPUSTM   
Citations

5
Last Week
0
Last month
Citations as of Jun 23, 2022

WEB OF SCIENCETM
Citations

4
Last Week
0
Last month
Citations as of Jun 23, 2022

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.