CN102289609A - Digital encrypting and decrypting method based on optical holographic principle - Google Patents
Digital encrypting and decrypting method based on optical holographic principle Download PDFInfo
- Publication number
- CN102289609A CN102289609A CN2011101254798A CN201110125479A CN102289609A CN 102289609 A CN102289609 A CN 102289609A CN 2011101254798 A CN2011101254798 A CN 2011101254798A CN 201110125479 A CN201110125479 A CN 201110125479A CN 102289609 A CN102289609 A CN 102289609A
- Authority
- CN
- China
- Prior art keywords
- hologram sheet
- encryption
- method based
- key
- digital
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Holo Graphy (AREA)
Abstract
The invention discloses a digital encrypting and decrypting method based on an optical holographic principle, which avoids the inconvenience caused by high manufacturing cost, difficulty in storage and copying, precise alignment of phase holographic plates and the like. In an encryption stage, at first, the amplitude or phase distribution of the holographic plates and key images used for decryption and having random amplitudes or phase distribution are generated by a beam shaping algorithm; then, the holographic plates and the key images are optically encrypted to obtain encrypted holographic plates; and finally, the encrypted holographic plates are printed for anti-fake labels or hiding confidential information. In the decryption stage, at first, the encrypted holographic plates are taken down by a scanner or a camera and other equipment to be preprocessed by a computer; and finally, the stored key images and preprocessed images are optically decrypted by the computer. The digital encrypting and decrypting method has high security level and low cost, and is simple to operate, easy to implement and able to be widely used.
Description
Technical field
The invention belongs to information encryption/deciphering field, relate to a kind of digital encryption and decryption method based on the optical holography principle.
Background technology
Along with the arriving of information age, human storage and the quantity of information sharp increase of transmitting.Merchandise news, personal information, Financial Information, national defence or military secrecy etc. all need to encrypt when transmitting, prevent that content is stolen or distorts, and the product quality information in the daily life, ticket information, card card information etc. also needs to accomplish can ONLINE RECOGNITION and be difficult to be cracked or imitated.The optical encryption method is difficult to crack because have the level of encryption height, and advantage that can physical operations is considered to one of most effectual way that is applied in above-mentioned field.Optical encryption method commonly used at present has: the random phase method
[1-3], the holographic watermark method
[4-5], the virtual optics method
[5], and other method
[6,7]Deng.Though the level of encryption of optical holography method is very high, in practical operation, there is many difficulties and is difficult to carry out.For example, the phase-type hologram sheet needs expensive micro production equipment to make, and the position photo of making is very difficult attached to other object such as paper, and on the materials such as plastics, it duplicates also very difficult.Main is, because the hologram sheet of encryption and decryption is formed by small pixel (being generally micron level),, require to aim at one by one with between key hologram sheet and the pixel of encrypting hologram sheet and the pixel if will finish deciphering, otherwise, just can't realize normal deciphering.As seen, realize the physical alignment requirement of hologram sheet, have only the configuration micron even the mechanical mobile device of nano-precision and the optical microphotograph imaging system of high multiple just can finish, this causes the optical holography encrypting/decrypting method can't obtain real application in daily life.
Summary of the invention
Technical matters to be solved by this invention is to propose a kind of digital encryption and decryption method based on the optical holography principle, should based on the digital encryption of optical holography principle and decryption method have simple to operate, level of security is high, be easy to realize, with low cost, can widely used advantage.
Technical solution of the present invention is as follows:
A kind of digital encryption and decryption method based on the optical holography principle, ciphering process is:
Step 1: input needs encrypted content;
Step 2: employing beam shaping algorithm obtains amplitude type or the phase type hologram sheet based on the need encrypted content;
Step 3: producing at random binary amplitude or phase type key is the key hologram sheet, and binary amplitude or phase type key are encrypted amplitude type or phase type hologram sheet and obtained encrypting hologram sheet at random to utilize this; This encrypts hologram sheet by printing device or printing equipment output;
Decrypting process is:
Step a: the encryption hologram sheet after the picked-up output, thereby the encryption hologram sheet of electron gain form;
Step b: the encryption hologram sheet to this electronic format carries out pre-service;
Step c: utilize described type of binary amplitude at random or phase type key that pretreated encryption hologram sheet is decrypted, the content after finally obtaining deciphering.
The beam shaping algorithm be in Gerberg-Saxton algorithm, simulated annealing and the genetic algorithm any.
Being encrypted as in the step 3 adopts direct iteration method or joint transform correlation method to encrypt.
Adopt computer random to produce binary amplitude type or phase type key at random.
Pretreated process among the step b is: make that the size of pretreated encryption hologram sheet is identical with the key hologram sheet of storage with picture number size.
For the image after avoiding deciphering goes out a problem about centrosymmetric 2 images, with implicit information only be defined as one, two quadrant occurs, perhaps, hologram sheet and the key hologram sheet method by the phase coding that makes a circulation of encrypting is designed to 4 rank or high-order position facies pattern hologram sheet more.
Encrypt hologram sheet and be designed to form, when deciphering, utilize existing optical character recognition directly numeral or character to be read, and numeral or character are changed into encryption original amplitude of hologram sheet or phase information distribution by computing machine by numeral or character code.
The encryption hologram sheet of step 3 utilizes printer or printing equipment to be printed on paper, plastics, metal or the cement.
Utilize photographic attachment or scanner to obtain the digital pictures of encrypting hologram sheet, utilize computing machine logarithmic code picture to carry out pre-service.
Optical holography utilizes the relevant interference of light of two bundles that the amplitude of object all is recorded on the hologram sheet mutually with the position, utilizes a branch of coherent light irradiation hologram sheet to reproduce the three-dimensional information of object then.Along with development of computer, hologram sheet does not need actual light path to write down interference pattern, but can design its amplitude or position distribution mutually by the algorithm that moves on the computing machine, and the method by micro production realizes then.Hologram sheet is divided into amplitude type or phase-type by its wavefront modulation type to light.The amplitude type hologram sheet is made up of the different pixel of numerous reflectance/transmittance; The phase-type hologram sheet by reflectance/transmittance constant but the position mutually different pixels form.Compared to the phase-type hologram sheet, though the diffraction efficiency of amplitude type hologram sheet is lower,, the amplitude type hologram sheet can utilize existing printing or copier to make, and its content can be scanned equipment such as instrument or digital camera and directly obtains.
Main method of the present invention is as follows.In the encryption stage, at first input needs information encrypted (as literal or picture), and the amplitude or the position that utilize the beam shaping algorithm to produce hologram sheet on computers then distribute mutually, make this hologram sheet can reproduce the information encrypted of wanting.Adoptable beam shaping algorithm has multiple, as Gerberg-Saxton (G-S) algorithm
[8], simulated annealing
[9], genetic algorithm
[10]Deng.Select a kind of optical encryption method then for use, as direct iteration method
[1], joint transform correlation method (JTC)
[11]Deng, and utilize computing machine to produce the key hologram sheet.The hologram sheet and the key hologram sheet that will comprise information are done the optical encryption computing, have just produced the hologram sheet of encrypting.At last, utilize printer or other printing equipment will encrypt hologram sheet and print, make the picture of coding forms such as two-dimentional black and white or gray scale.In the deciphering stage, utilize equipment such as scanner or camera that picture is absorbed, make digital photograph, then digital photograph is written into computing machine and carries out the picture adjustment, make the size of this picture, direction, encoded contents etc. are identical with the key hologram sheet of storage.At last, the encryption hologram sheet after utilizing the key hologram sheet preserved in the computing machine and handling carries out the optics decrypt operation, obtains encrypting the information that hologram sheet implies.
The present invention will encrypt hologram sheet and be designed to directly to print or to be printed on picture on the various material such as paper, cloth, plastics, metal, timber, cement, and encrypt picture and can be used for trade mark, bill, the pass, the encryption of classified papers etc. or false proof.
Beneficial effect:
The present invention proposes a kind of digital encryption/decryption technology based on the optical holography principle, has avoided the high cost of manufacture of phase-type hologram sheet, has stored and duplicate caused inconvenience such as fine registration between difficulty and the position photo.This method is specially: in the encryption stage, at first utilize the beam shaping algorithm, produce the amplitude of hologram sheet or position distribute mutually and be used to decipher have a key picture that random amplitude or position distribute mutually, then, hologram sheet and key picture are done the optical encryption computing, obtain to encrypt hologram sheet, last, utilize printing device such as laser printer etc. will encrypt hologram sheet and be printed on the materials such as commodity or financial document, be used for anti-false sign or hiding confidential information; In the deciphering stage, at first, utilizing equipment such as scanner or camera will encrypt hologram sheet absorbs, pre-service through computing machine, make the picture after the processing have identical size and pixel with the original encryption hologram sheet, at last, utilize computing machine that the key picture and the pretreated picture of storage are made the optics decrypt operation, obtain to encrypt the content that hologram sheet implied.That this invention has is simple to operate, level of security is high, be easy to realize, with low cost, can widely used advantage.
The present invention has taken into full account based on the high security advantage of optical encryption method and two aspects such as difficulty in the practical operation.At first, the present invention utilizes equipment such as printer that the hologram sheet such as the distribution of amplitudes of encrypting is printed as black white image, utilize scanner or digital photographing apparatus picked-up picture then, through the image pre-service, the last digital decrypted that on computers this image is realized optical holography.This kind method has been saved the making and the retain costs of hologram sheet costliness, and has avoided the high physical alignment requirement of precision, has the safe coefficient height, and easy and simple to handle, cost is low, but the advantage of widespread use.
The present invention utilizes computing machine to finish encryption, and freely selects for use the very high optical encryption/decryption method of a kind of level of security to realize, therefore, this method has very high security.
The present invention utilizes the accurate aligning of computer realization hologram sheet, and the precision optical machinery of having avoided in the actual light path encrypting pixel and pixel between hologram sheet and the key picture fully is to alignment request.
The present invention can adopt the coding of various ways, as codings such as gray scale, color, shape, size, numeral, characters.During deciphering, through the computing machine pre-service, the picture that causes distortion, tilts, amplifies or dwindle in taking is reduced into size and the pixel size identical with former encryption picture, then pretreated picture and the key picture that is stored in the computing machine is carried out the optics decrypt operation.Especially,, just can utilize existing optical character identification (OCR) software directly to read, and convert it into original amplitude of hologram sheet or position distribution mutually by computing machine if hologram sheet is designed to be made up of numeral or character code.
Among the present invention, the hologram sheet of encryption scanning or picked-up be for behind the digital photograph, and mode that can be by internet or radio communication to the deciphering center, realizes that the strange land deciphers or ONLINE RECOGNITION with its teletransmission.
Description of drawings
Fig. 1 is the process flow diagram (a is the ciphering process process flow diagram, and b is the decrypting process process flow diagram) of encryption and decryption optical holography picture;
Fig. 2 is an information to be encrypted;
Fig. 3 is the binary amplitude hologram sheet that utilizes the G-S algorithm to obtain.(image is that monochrome pixels distributes, and size is 64 * 64 pixels, and pixel size is 50 μ m * 50 μ m.)
Fig. 4 utilizes hologram sheet shown in Figure 3 to make the resulting reproduced image of Fourier transform;
Fig. 5 utilizes the black and white picture of the binary random value that computing machine produces (this picture will be used for encryption and decryption as key.Picture size is all consistent with Fig. 3 with the pixel size.)
Fig. 6 passes through the picture among Fig. 3 and Fig. 5 the encryption hologram sheet that produces after the logical OR computing.(picture size is still consistent with Fig. 3 with the pixel size.)
Fig. 7 is the encryption hologram sheet that is printed on the paper.
Fig. 8 is the pretreated result of encryption hologram sheet process computing machine of picked-up.(picture size still reverts to 64 * 64, and pixel size is 50 μ m * 50 μ m.)
Fig. 9 is that the key picture that is stored in the computing machine is decrypted the implicit information that the back is acquired to the picture among Fig. 8.
Figure 10 is for directly carrying out resulting content behind the Fourier transform to the picture among Fig. 8.
Embodiment
Below with reference to the drawings and specific embodiments the present invention is described in further details:
Embodiment 1:
Operating process among the present invention is divided into ciphering process and decrypting process by the flowchart text shown in Fig. 1.Illustrate concrete operating process below.At first input needs the content " 1234 " of encryption, as shown in Figure 2.Then, utilize the G-S algorithm to produce a hologram sheet, the content as Fig. 2 can be deposited in wherein.This hologram sheet be designed and sized to 64 * 64 pixels, each pixel size is 50 μ m * 50 μ m, and the transmittance/reflectance of pixel is 1 or 0, i.e. black and white picture, as shown in Figure 3.The size, pixel size, gray-scale value (i.e. coding) etc. that it is pointed out that hologram sheet can be chosen according to actual conditions optimization.If directly Fig. 3 is carried out Fourier transform, just the content that can obtain reproducing, as shown in Figure 4.Distribute because this hologram sheet is designed to binary amplitude, promptly the pixel point value is light transmission or does not see through, and centrosymmetric two reproduced images therefore unavoidably can occur.If we when design with implicit information only be defined as one, the two quadrant appearance, just can prevent that centrosymmetric two reproduced images from overlapping each other; Another method is to be 4 rank or high-order position facies pattern hologram sheet more with the method for hologram sheet by circuitous phase coding with hologram design, the problem of center symmetric graph picture in the time of also can avoiding hologram reconstruction to occur.Fourier transform can utilize software programming or thin lens imaging to realize.Because Fourier transform is the most the most frequently used method in Flame Image Process.
Adopt at random the binary amplitude picture to encrypt the hologram sheet shown in Fig. 3.At first, utilize computer random to produce the binary amplitude type hologram sheet that an amplitude is 1 or 0 stochastic distribution, its size is 64 * 64, and pixel size still is 50 μ m * 50 μ m.This random amplitude type hologram sheet is stored as key in computing machine, will be used for encryption and decryption.The key hologram sheet as shown in Figure 5.Then, random amplitude type hologram sheet (being the key hologram sheet) and unencryption hologram sheet shown in Figure 3 mode with logical OR are superposeed, the encryption hologram sheet that is produced will still be the black and white distribution, and size still is 64 * 64 pixels, as shown in Figure 6.Notice that though this hologram sheet gray-coded expression distribution of amplitudes can be used for also representing that the binary position distributes mutually, promptly on behalf of the position, gray scale 1 be worth ∏ mutually, on behalf of the position, gray scale 0 be worth 0 mutually.
Because the pixel of picture is bigger shown in Fig. 6, is 50 μ m * 50 μ m, therefore, can utilize existing printer or other printing device to be printed on the paper, as shown in Figure 7 easily.This holography picture can also be printed on the various material such as plastics, metal, fiber, cement, as commodity counterfeit prevention sign or bank signature etc.
In the deciphering stage, at first, utilize scanner or camera to absorb the encryption hologram sheet that is printed on the paper.Because the picture of picked-up is in size, gray scale, placement directions etc. might not be identical with former encryption picture, therefore, need carry out pre-service to the picked-up picture of distortion, be about to picture size, gray scale, direction etc. are adjusted to consistent with former encryption picture.Picture among Fig. 7 has 64 * 64 pixels after through the computing machine pre-service equally, and the pixel size is 50 μ m * 50 μ m, as shown in Figure 8.Pretreated encryption picture (shown in Figure 8) and the key picture (shown in Figure 5) that is stored in the calculating are carried out the logical OR computing, just obtained the holographic picture after the deciphering, will decipher picture and carry out promptly obtaining decryption content behind the Fourier transform, as shown in Figure 9.Comparison diagram 4 and Fig. 9, we can find both content unanimities.In addition, in order to improve the resolution of shown decryption content among Fig. 9, we can design the more hologram sheet of pixel, as 128 * 128,256 * 256 etc., or the efficient of raising computing machine Preprocessing Algorithm, the picture of picked-up can be returned to as far as possible and the consistent degree of former encryption hologram sheet.
As if without the key of key or use mistake the encryption picture being deciphered and being carried out Fourier transform, what then obtain is mess code, without any distinguishable content.For not using key, directly the encryption hologram sheet among Fig. 6 is carried out the resulting reproduced image of Fourier transform as shown in figure 10.This shows, encrypt hologram sheet and have very high level of security.
On the other hand, the encryption hologram sheet that is printed on the article such as commodity or bill might cause stainedly in transportation or use, causes partial content to differentiate.If picked-up suffers stained encryption hologram sheet, after through the computing machine pre-service, can only obtain to encrypt the distinguishable partial content in hologram sheet surface.But we find that this stained hologram sheet still can obtain clear and legible whole implicit informations after the hologram sheet that has only the distinguishable content of part surface is made decrypt operation.Therefore, this method also has stronger anti-damage capability, promptly encrypts hologram sheet and meets with stainedly, an or disappearance part still can decrypt whole implicit informations.
It is to be noted, this method can also be used for long-range deciphering or above the ONLINE RECOGNITION, be to deliver to the deciphering center by radio communication or internet after the user utilizes camera or other electron scanning equipment will encrypt the hologram sheet shooting, after the deciphering of deciphering center, again decryption content returned to the user.
List of references:
1.Javidi B, Zhang G, Li J., based on the experiment of the image encryption and the safety verification of random phase encryption technology, " optical engineering " 35 volumes, 9 phases, 2506-2512 page or leaf, 1996.[Javidi?B,Zhang?G,Li?J.,Experimental?demonstration?of?the?random?phase?encoding?technique?for?image?encryption?and?security?verification,Optical?Engineering?35(9),2506-2512(1996).]
2. the Liu Fu people, Zhai Hongchen, Yang Xiaoping encrypts " Acta Physica Sinica " 52 (10), 2462-2465 (2003) based on the random phase of kinoform iteration.
3. in refined, Peng Xiang, based on the optical image encryption of cascade phase place recovery algorithms, " optics journal " 25 (7), 881-884 (2005).
4. Chen Linsen, Zhou Xiaohong, Shao Jie, a kind of large information capacity digital hologram watermark of encrypting mutually, " photon journal " 34 (4), 616-620 (2005) based on the binary position.
5. Peng Xiang, Zhang Peng, ox is foolish stupid, based on the three dimensions digital watermarking system of virtual optics, " optics journal " 24 (11), 1507-1510 (2004).
6.X.-C.Yuan, S.H.Tao, W.C.Cheong, Y.W.Chen, M.S.Lim, K.J.Moh, A.T.S.Ho, the diffraction optical element of making based on the micro production method is used for the technology of mixed type encrypt and decrypt, " optical engineering " 43 volumes, 11 phases, 2493-2494 page or leaf .[X.-C.Yuan in 2004, S.H.Tao, W.C.Cheong, Y.W.Chen, M.S.Lim, K.J.Moh and A.T.S.Ho, Hybrid encryption and decryption technique using microfabricated diffractive optical elements, Optical Engineering 43 (11), 2493-2494 (2004) .]
7.Javidi B, Nomura T., the digital hologram method is used for information security, " optics letter " 25 volumes, 1 phase, 28-30 page or leaf, .[Javidi B in 2000, Nomura T.Securing information by use of digital holography, Optics Letters25 (1), 28-30 (2000) .]
8.R.W.Gerchberg, W.O.Saxton, determine the efficient algorithm that the position distributes mutually from image with diffraction plane, " optics " 35 phases, 237-246 page or leaf .[R.W.Gerchberg and W.O.Saxton in 1972, A practical algorithm for the determination of phase from image and diffraction plane pictures, Optik, 35,237-246 (1972) .]
9.S.Kirkpatrick, C.D.Gellatt, M.P.Vecchi, optimization method based on simulated annealing, " science " 220 phases, 671-680 page or leaf, nineteen eighty-three .[S.Kirkpatrick, C.D.Gellatt, and M.P.Vecchi, Optimization by simulated annealing, Science, 220,671-680 (1983) .]
10.Jianyu Ye, XiaoCong Yuan, Guangya Zhou, genetic algorithm are used for the optimal design of beam shaping diffraction optical element, " SPIE proceedings " 4594 volumes, 118 pages, calendar year 2001 .[Jianyu Ye, XiaoCong Yuan and Guangya Zhou, Genetic algorithm for optimization design of diffractive optical elements in laser beam shaping, Proc.SPIE 4594,118 (2001) .]
11.Nomura T, Javidi B, the joint transform correlator method is used for optical encryption, " optical engineering " 39 volumes, 8 phases, the 2031-2035 page or leaf, .[Nomura T in 2000, Javidi B, Optical encryption using a joint transform correlator architecture, Optical Engineering 39 (8), 2031-2035 (2000) .]
Claims (9)
1. digital encryption and decryption method based on an optical holography principle is characterized in that ciphering process is:
Step 1: input needs encrypted content;
Step 2: employing beam shaping algorithm obtains amplitude type or the phase type hologram sheet based on the need encrypted content;
Step 3: producing at random binary amplitude or phase type key is the key hologram sheet, and binary amplitude or phase type key are encrypted amplitude type or phase type hologram sheet and obtained encrypting hologram sheet at random to utilize this; This encrypts hologram sheet by printing device or printing equipment output;
Decrypting process is:
Step a: the encryption hologram sheet after the picked-up output, thereby the encryption hologram sheet of electron gain form;
Step b: the encryption hologram sheet to this electronic format carries out pre-service;
Step c: utilize described type of binary amplitude at random or phase type key that pretreated encryption hologram sheet is decrypted, the content after finally obtaining deciphering.
2. digital encryption and decryption method based on the optical holography principle according to claim 1 is characterized in that, the beam shaping algorithm be in Gerberg-Saxton algorithm, simulated annealing and the genetic algorithm any.
3. digital encryption and decryption method based on the optical holography principle according to claim 1 is characterized in that, being encrypted as in the step 3 adopts direct iteration method or joint transform correlation method to encrypt.
4. digital encryption and decryption method based on the optical holography principle according to claim 1 is characterized in that, adopt computer random to produce binary amplitude type or phase type key at random.
5. digital encryption and decryption method based on the optical holography principle according to claim 1 is characterized in that, the pretreated process among the step b is: make that the size of pretreated encryption hologram sheet is identical with the key hologram sheet of storage with picture number size.
6. according to claim 1-5 each described digital encryption and decryption method based on the optical holography principle, it is characterized in that, for the image after avoiding deciphering goes out a problem about centrosymmetric 2 images, with implicit information only be defined as one, two quadrant occurs, perhaps, hologram sheet and the key hologram sheet method by the phase coding that makes a circulation of encrypting is designed to 4 rank or high-order position facies pattern hologram sheet more.
7. digital encryption and decryption method based on the optical holography principle according to claim 1, it is characterized in that, encrypting hologram sheet is designed to be made up of numeral or character code, when deciphering, utilize existing optical character recognition directly numeral or character to be read, and numeral or character are changed into encryption original amplitude of hologram sheet or phase information distribution by computing machine.
8. according to claim 1-5 each described digital encryption and decryption method, it is characterized in that the encryption hologram sheet of step 3 utilizes printer or printing equipment to be printed on paper, plastics, metal or the cement based on the optical holography principle.
9. digital encryption and decryption method based on the optical holography principle according to claim 8 is characterized in that, utilize photographic attachment or scanner to obtain the digital pictures of encrypting hologram sheet, utilize computing machine logarithmic code picture to carry out pre-service.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011101254798A CN102289609A (en) | 2011-05-16 | 2011-05-16 | Digital encrypting and decrypting method based on optical holographic principle |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011101254798A CN102289609A (en) | 2011-05-16 | 2011-05-16 | Digital encrypting and decrypting method based on optical holographic principle |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102289609A true CN102289609A (en) | 2011-12-21 |
Family
ID=45336029
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011101254798A Pending CN102289609A (en) | 2011-05-16 | 2011-05-16 | Digital encrypting and decrypting method based on optical holographic principle |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102289609A (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103645562A (en) * | 2013-12-20 | 2014-03-19 | 中南大学 | Beam shaping method for simultaneously modulating amplitude and phase |
CN104735409A (en) * | 2015-02-10 | 2015-06-24 | 浙江科技学院 | Single-optical-path surveillance video watermark physical hiding device and digital detection method thereof |
CN106993198A (en) * | 2017-04-20 | 2017-07-28 | 努比亚技术有限公司 | Image ciphering method, terminal and computer-readable recording medium |
CN107106905A (en) * | 2015-01-04 | 2017-08-29 | 佩美克西斯有限公司 | Three-dimensional lottery ticket |
CN107481179A (en) * | 2017-05-17 | 2017-12-15 | 上海冠众光学科技有限公司 | Antifalsification label recognition methods with watermarked information and device |
CN108171642A (en) * | 2016-12-07 | 2018-06-15 | 中国科学院大学 | The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography |
CN109901370A (en) * | 2019-01-22 | 2019-06-18 | 四川大学 | The optical imagery encipher-decipher method of phase-only hologram and single random phase encoding |
CN110008532A (en) * | 2019-03-18 | 2019-07-12 | 华中科技大学 | A kind of Phase Change Opportunity of three-phase imbalance commutation determines method and commutation system |
CN111559572A (en) * | 2020-06-12 | 2020-08-21 | 山东泰宝信息科技集团有限公司 | Point light source recognition laser encryption holographic anti-counterfeiting gasket and preparation method thereof |
CN111572236A (en) * | 2020-04-29 | 2020-08-25 | 中山大学 | Pattern combining optical encryption and digital encryption and manufacturing method thereof |
US20210232093A1 (en) * | 2020-01-27 | 2021-07-29 | Texas Instruments Incorporated | Projector with phase hologram modulator |
CN114552344A (en) * | 2022-02-27 | 2022-05-27 | 北京工业大学 | High-energy high-beam-quality optical fiber solid-mixed picosecond laser amplifier |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101542559A (en) * | 2006-11-24 | 2009-09-23 | 拜尔创新有限责任公司 | Coding method, decoding method, codec and data storage medium for holographic storage |
-
2011
- 2011-05-16 CN CN2011101254798A patent/CN102289609A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101542559A (en) * | 2006-11-24 | 2009-09-23 | 拜尔创新有限责任公司 | Coding method, decoding method, codec and data storage medium for holographic storage |
Non-Patent Citations (1)
Title |
---|
王怀彬 等: "一种新的信息加-解密技术的研究", 《光电子.激光》 * |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103645562A (en) * | 2013-12-20 | 2014-03-19 | 中南大学 | Beam shaping method for simultaneously modulating amplitude and phase |
CN103645562B (en) * | 2013-12-20 | 2015-10-21 | 中南大学 | The beam shaping method of modulated amplitude and phase place while of a kind of |
CN107106905A (en) * | 2015-01-04 | 2017-08-29 | 佩美克西斯有限公司 | Three-dimensional lottery ticket |
CN104735409A (en) * | 2015-02-10 | 2015-06-24 | 浙江科技学院 | Single-optical-path surveillance video watermark physical hiding device and digital detection method thereof |
CN104735409B (en) * | 2015-02-10 | 2018-08-21 | 浙江科技学院 | A kind of monochromatic light road monitor video watermark physics concealing device and Digital Detecting Method |
CN108171642A (en) * | 2016-12-07 | 2018-06-15 | 中国科学院大学 | The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography |
CN106993198A (en) * | 2017-04-20 | 2017-07-28 | 努比亚技术有限公司 | Image ciphering method, terminal and computer-readable recording medium |
CN107481179A (en) * | 2017-05-17 | 2017-12-15 | 上海冠众光学科技有限公司 | Antifalsification label recognition methods with watermarked information and device |
CN109901370A (en) * | 2019-01-22 | 2019-06-18 | 四川大学 | The optical imagery encipher-decipher method of phase-only hologram and single random phase encoding |
CN110008532A (en) * | 2019-03-18 | 2019-07-12 | 华中科技大学 | A kind of Phase Change Opportunity of three-phase imbalance commutation determines method and commutation system |
US20210232093A1 (en) * | 2020-01-27 | 2021-07-29 | Texas Instruments Incorporated | Projector with phase hologram modulator |
CN111572236A (en) * | 2020-04-29 | 2020-08-25 | 中山大学 | Pattern combining optical encryption and digital encryption and manufacturing method thereof |
CN111572236B (en) * | 2020-04-29 | 2021-09-10 | 中山大学 | Anti-counterfeiting element combining optical encryption and digital encryption and manufacturing method thereof |
CN111559572A (en) * | 2020-06-12 | 2020-08-21 | 山东泰宝信息科技集团有限公司 | Point light source recognition laser encryption holographic anti-counterfeiting gasket and preparation method thereof |
CN111559572B (en) * | 2020-06-12 | 2023-06-02 | 山东泰宝信息科技集团有限公司 | Point light source reading laser encryption holographic anti-counterfeiting gasket and preparation method thereof |
CN114552344A (en) * | 2022-02-27 | 2022-05-27 | 北京工业大学 | High-energy high-beam-quality optical fiber solid-mixed picosecond laser amplifier |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102289609A (en) | Digital encrypting and decrypting method based on optical holographic principle | |
Javidi | Securing information with optical technologies | |
US8781153B2 (en) | Method, system, and computer-accessible medium for authentication of paper using a speckle pattern | |
WO2003046806A1 (en) | A digital anti-forging method | |
Huang et al. | Optical watermarking for printed document authentication | |
Cheremkhin et al. | QR code optical encryption using spatially incoherent illumination | |
US20120327450A1 (en) | Methods and devices for securing and authenticating documents | |
MX2013007923A (en) | High value document authentication system & method. | |
CN101537751A (en) | Novel method for processing anti-counterfeit printing | |
US7212323B2 (en) | Methods and apparatus for mass manufacturing two-dimensional binary information on transparent substrates using phase contrast modulated templates | |
Chen et al. | Optical information authentication using optical encryption and sparsity constraint | |
CN106339979A (en) | Calculating holographic encryption method based on Hash function | |
Aggarwal et al. | Concealed moiré pattern encoded security holograms readable by a key hologram | |
Kumar et al. | Speckle coding for optical and digital data security applications | |
CN105954991A (en) | Optical encryption method based on holographic calculation | |
Pérez-Cabré et al. | Near infrared multifactor identification tags | |
Javidi | Optical information processing for encryption and security systems | |
KR20000051918A (en) | The puzzling security principle of image data and supporting device | |
CN102658741A (en) | Visual-cryptography-based visible anti-copying technique | |
Babu et al. | Anti-counterfeiting using reflective micro structures-Based on random positioning of microstructures | |
Vanitha et al. | Augmenting data security: Physical Unclonable Functions for digital holography based quadratic phase cryptography | |
Wang et al. | 3D Copyright Protection Based on Binarized Computational Ghost Imaging Encryption and Cellular Automata Transform | |
CN106447589A (en) | Double random phase optical image encryption method based on Fourier transform | |
Abookasis et al. | Watermarks encrypted in a concealogram and deciphered by a modified joint-transform correlator | |
CN101847186A (en) | Anti-counterfeit and counterfeit distinguishing method of trace |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20111221 |