CN102289609A - Digital encrypting and decrypting method based on optical holographic principle - Google Patents

Digital encrypting and decrypting method based on optical holographic principle Download PDF

Info

Publication number
CN102289609A
CN102289609A CN2011101254798A CN201110125479A CN102289609A CN 102289609 A CN102289609 A CN 102289609A CN 2011101254798 A CN2011101254798 A CN 2011101254798A CN 201110125479 A CN201110125479 A CN 201110125479A CN 102289609 A CN102289609 A CN 102289609A
Authority
CN
China
Prior art keywords
hologram sheet
encryption
method based
key
digital
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011101254798A
Other languages
Chinese (zh)
Inventor
陶少华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University
Original Assignee
Central South University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University filed Critical Central South University
Priority to CN2011101254798A priority Critical patent/CN102289609A/en
Publication of CN102289609A publication Critical patent/CN102289609A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Holo Graphy (AREA)

Abstract

The invention discloses a digital encrypting and decrypting method based on an optical holographic principle, which avoids the inconvenience caused by high manufacturing cost, difficulty in storage and copying, precise alignment of phase holographic plates and the like. In an encryption stage, at first, the amplitude or phase distribution of the holographic plates and key images used for decryption and having random amplitudes or phase distribution are generated by a beam shaping algorithm; then, the holographic plates and the key images are optically encrypted to obtain encrypted holographic plates; and finally, the encrypted holographic plates are printed for anti-fake labels or hiding confidential information. In the decryption stage, at first, the encrypted holographic plates are taken down by a scanner or a camera and other equipment to be preprocessed by a computer; and finally, the stored key images and preprocessed images are optically decrypted by the computer. The digital encrypting and decrypting method has high security level and low cost, and is simple to operate, easy to implement and able to be widely used.

Description

Digital encryption and decryption method based on the optical holography principle
Technical field
The invention belongs to information encryption/deciphering field, relate to a kind of digital encryption and decryption method based on the optical holography principle.
Background technology
Along with the arriving of information age, human storage and the quantity of information sharp increase of transmitting.Merchandise news, personal information, Financial Information, national defence or military secrecy etc. all need to encrypt when transmitting, prevent that content is stolen or distorts, and the product quality information in the daily life, ticket information, card card information etc. also needs to accomplish can ONLINE RECOGNITION and be difficult to be cracked or imitated.The optical encryption method is difficult to crack because have the level of encryption height, and advantage that can physical operations is considered to one of most effectual way that is applied in above-mentioned field.Optical encryption method commonly used at present has: the random phase method [1-3], the holographic watermark method [4-5], the virtual optics method [5], and other method [6,7]Deng.Though the level of encryption of optical holography method is very high, in practical operation, there is many difficulties and is difficult to carry out.For example, the phase-type hologram sheet needs expensive micro production equipment to make, and the position photo of making is very difficult attached to other object such as paper, and on the materials such as plastics, it duplicates also very difficult.Main is, because the hologram sheet of encryption and decryption is formed by small pixel (being generally micron level),, require to aim at one by one with between key hologram sheet and the pixel of encrypting hologram sheet and the pixel if will finish deciphering, otherwise, just can't realize normal deciphering.As seen, realize the physical alignment requirement of hologram sheet, have only the configuration micron even the mechanical mobile device of nano-precision and the optical microphotograph imaging system of high multiple just can finish, this causes the optical holography encrypting/decrypting method can't obtain real application in daily life.
Summary of the invention
Technical matters to be solved by this invention is to propose a kind of digital encryption and decryption method based on the optical holography principle, should based on the digital encryption of optical holography principle and decryption method have simple to operate, level of security is high, be easy to realize, with low cost, can widely used advantage.
Technical solution of the present invention is as follows:
A kind of digital encryption and decryption method based on the optical holography principle, ciphering process is:
Step 1: input needs encrypted content;
Step 2: employing beam shaping algorithm obtains amplitude type or the phase type hologram sheet based on the need encrypted content;
Step 3: producing at random binary amplitude or phase type key is the key hologram sheet, and binary amplitude or phase type key are encrypted amplitude type or phase type hologram sheet and obtained encrypting hologram sheet at random to utilize this; This encrypts hologram sheet by printing device or printing equipment output;
Decrypting process is:
Step a: the encryption hologram sheet after the picked-up output, thereby the encryption hologram sheet of electron gain form;
Step b: the encryption hologram sheet to this electronic format carries out pre-service;
Step c: utilize described type of binary amplitude at random or phase type key that pretreated encryption hologram sheet is decrypted, the content after finally obtaining deciphering.
The beam shaping algorithm be in Gerberg-Saxton algorithm, simulated annealing and the genetic algorithm any.
Being encrypted as in the step 3 adopts direct iteration method or joint transform correlation method to encrypt.
Adopt computer random to produce binary amplitude type or phase type key at random.
Pretreated process among the step b is: make that the size of pretreated encryption hologram sheet is identical with the key hologram sheet of storage with picture number size.
For the image after avoiding deciphering goes out a problem about centrosymmetric 2 images, with implicit information only be defined as one, two quadrant occurs, perhaps, hologram sheet and the key hologram sheet method by the phase coding that makes a circulation of encrypting is designed to 4 rank or high-order position facies pattern hologram sheet more.
Encrypt hologram sheet and be designed to form, when deciphering, utilize existing optical character recognition directly numeral or character to be read, and numeral or character are changed into encryption original amplitude of hologram sheet or phase information distribution by computing machine by numeral or character code.
The encryption hologram sheet of step 3 utilizes printer or printing equipment to be printed on paper, plastics, metal or the cement.
Utilize photographic attachment or scanner to obtain the digital pictures of encrypting hologram sheet, utilize computing machine logarithmic code picture to carry out pre-service.
Optical holography utilizes the relevant interference of light of two bundles that the amplitude of object all is recorded on the hologram sheet mutually with the position, utilizes a branch of coherent light irradiation hologram sheet to reproduce the three-dimensional information of object then.Along with development of computer, hologram sheet does not need actual light path to write down interference pattern, but can design its amplitude or position distribution mutually by the algorithm that moves on the computing machine, and the method by micro production realizes then.Hologram sheet is divided into amplitude type or phase-type by its wavefront modulation type to light.The amplitude type hologram sheet is made up of the different pixel of numerous reflectance/transmittance; The phase-type hologram sheet by reflectance/transmittance constant but the position mutually different pixels form.Compared to the phase-type hologram sheet, though the diffraction efficiency of amplitude type hologram sheet is lower,, the amplitude type hologram sheet can utilize existing printing or copier to make, and its content can be scanned equipment such as instrument or digital camera and directly obtains.
Main method of the present invention is as follows.In the encryption stage, at first input needs information encrypted (as literal or picture), and the amplitude or the position that utilize the beam shaping algorithm to produce hologram sheet on computers then distribute mutually, make this hologram sheet can reproduce the information encrypted of wanting.Adoptable beam shaping algorithm has multiple, as Gerberg-Saxton (G-S) algorithm [8], simulated annealing [9], genetic algorithm [10]Deng.Select a kind of optical encryption method then for use, as direct iteration method [1], joint transform correlation method (JTC) [11]Deng, and utilize computing machine to produce the key hologram sheet.The hologram sheet and the key hologram sheet that will comprise information are done the optical encryption computing, have just produced the hologram sheet of encrypting.At last, utilize printer or other printing equipment will encrypt hologram sheet and print, make the picture of coding forms such as two-dimentional black and white or gray scale.In the deciphering stage, utilize equipment such as scanner or camera that picture is absorbed, make digital photograph, then digital photograph is written into computing machine and carries out the picture adjustment, make the size of this picture, direction, encoded contents etc. are identical with the key hologram sheet of storage.At last, the encryption hologram sheet after utilizing the key hologram sheet preserved in the computing machine and handling carries out the optics decrypt operation, obtains encrypting the information that hologram sheet implies.
The present invention will encrypt hologram sheet and be designed to directly to print or to be printed on picture on the various material such as paper, cloth, plastics, metal, timber, cement, and encrypt picture and can be used for trade mark, bill, the pass, the encryption of classified papers etc. or false proof.
Beneficial effect:
The present invention proposes a kind of digital encryption/decryption technology based on the optical holography principle, has avoided the high cost of manufacture of phase-type hologram sheet, has stored and duplicate caused inconvenience such as fine registration between difficulty and the position photo.This method is specially: in the encryption stage, at first utilize the beam shaping algorithm, produce the amplitude of hologram sheet or position distribute mutually and be used to decipher have a key picture that random amplitude or position distribute mutually, then, hologram sheet and key picture are done the optical encryption computing, obtain to encrypt hologram sheet, last, utilize printing device such as laser printer etc. will encrypt hologram sheet and be printed on the materials such as commodity or financial document, be used for anti-false sign or hiding confidential information; In the deciphering stage, at first, utilizing equipment such as scanner or camera will encrypt hologram sheet absorbs, pre-service through computing machine, make the picture after the processing have identical size and pixel with the original encryption hologram sheet, at last, utilize computing machine that the key picture and the pretreated picture of storage are made the optics decrypt operation, obtain to encrypt the content that hologram sheet implied.That this invention has is simple to operate, level of security is high, be easy to realize, with low cost, can widely used advantage.
The present invention has taken into full account based on the high security advantage of optical encryption method and two aspects such as difficulty in the practical operation.At first, the present invention utilizes equipment such as printer that the hologram sheet such as the distribution of amplitudes of encrypting is printed as black white image, utilize scanner or digital photographing apparatus picked-up picture then, through the image pre-service, the last digital decrypted that on computers this image is realized optical holography.This kind method has been saved the making and the retain costs of hologram sheet costliness, and has avoided the high physical alignment requirement of precision, has the safe coefficient height, and easy and simple to handle, cost is low, but the advantage of widespread use.
The present invention utilizes computing machine to finish encryption, and freely selects for use the very high optical encryption/decryption method of a kind of level of security to realize, therefore, this method has very high security.
The present invention utilizes the accurate aligning of computer realization hologram sheet, and the precision optical machinery of having avoided in the actual light path encrypting pixel and pixel between hologram sheet and the key picture fully is to alignment request.
The present invention can adopt the coding of various ways, as codings such as gray scale, color, shape, size, numeral, characters.During deciphering, through the computing machine pre-service, the picture that causes distortion, tilts, amplifies or dwindle in taking is reduced into size and the pixel size identical with former encryption picture, then pretreated picture and the key picture that is stored in the computing machine is carried out the optics decrypt operation.Especially,, just can utilize existing optical character identification (OCR) software directly to read, and convert it into original amplitude of hologram sheet or position distribution mutually by computing machine if hologram sheet is designed to be made up of numeral or character code.
Among the present invention, the hologram sheet of encryption scanning or picked-up be for behind the digital photograph, and mode that can be by internet or radio communication to the deciphering center, realizes that the strange land deciphers or ONLINE RECOGNITION with its teletransmission.
Description of drawings
Fig. 1 is the process flow diagram (a is the ciphering process process flow diagram, and b is the decrypting process process flow diagram) of encryption and decryption optical holography picture;
Fig. 2 is an information to be encrypted;
Fig. 3 is the binary amplitude hologram sheet that utilizes the G-S algorithm to obtain.(image is that monochrome pixels distributes, and size is 64 * 64 pixels, and pixel size is 50 μ m * 50 μ m.)
Fig. 4 utilizes hologram sheet shown in Figure 3 to make the resulting reproduced image of Fourier transform;
Fig. 5 utilizes the black and white picture of the binary random value that computing machine produces (this picture will be used for encryption and decryption as key.Picture size is all consistent with Fig. 3 with the pixel size.)
Fig. 6 passes through the picture among Fig. 3 and Fig. 5 the encryption hologram sheet that produces after the logical OR computing.(picture size is still consistent with Fig. 3 with the pixel size.)
Fig. 7 is the encryption hologram sheet that is printed on the paper.
Fig. 8 is the pretreated result of encryption hologram sheet process computing machine of picked-up.(picture size still reverts to 64 * 64, and pixel size is 50 μ m * 50 μ m.)
Fig. 9 is that the key picture that is stored in the computing machine is decrypted the implicit information that the back is acquired to the picture among Fig. 8.
Figure 10 is for directly carrying out resulting content behind the Fourier transform to the picture among Fig. 8.
Embodiment
Below with reference to the drawings and specific embodiments the present invention is described in further details:
Embodiment 1:
Operating process among the present invention is divided into ciphering process and decrypting process by the flowchart text shown in Fig. 1.Illustrate concrete operating process below.At first input needs the content " 1234 " of encryption, as shown in Figure 2.Then, utilize the G-S algorithm to produce a hologram sheet, the content as Fig. 2 can be deposited in wherein.This hologram sheet be designed and sized to 64 * 64 pixels, each pixel size is 50 μ m * 50 μ m, and the transmittance/reflectance of pixel is 1 or 0, i.e. black and white picture, as shown in Figure 3.The size, pixel size, gray-scale value (i.e. coding) etc. that it is pointed out that hologram sheet can be chosen according to actual conditions optimization.If directly Fig. 3 is carried out Fourier transform, just the content that can obtain reproducing, as shown in Figure 4.Distribute because this hologram sheet is designed to binary amplitude, promptly the pixel point value is light transmission or does not see through, and centrosymmetric two reproduced images therefore unavoidably can occur.If we when design with implicit information only be defined as one, the two quadrant appearance, just can prevent that centrosymmetric two reproduced images from overlapping each other; Another method is to be 4 rank or high-order position facies pattern hologram sheet more with the method for hologram sheet by circuitous phase coding with hologram design, the problem of center symmetric graph picture in the time of also can avoiding hologram reconstruction to occur.Fourier transform can utilize software programming or thin lens imaging to realize.Because Fourier transform is the most the most frequently used method in Flame Image Process.
Adopt at random the binary amplitude picture to encrypt the hologram sheet shown in Fig. 3.At first, utilize computer random to produce the binary amplitude type hologram sheet that an amplitude is 1 or 0 stochastic distribution, its size is 64 * 64, and pixel size still is 50 μ m * 50 μ m.This random amplitude type hologram sheet is stored as key in computing machine, will be used for encryption and decryption.The key hologram sheet as shown in Figure 5.Then, random amplitude type hologram sheet (being the key hologram sheet) and unencryption hologram sheet shown in Figure 3 mode with logical OR are superposeed, the encryption hologram sheet that is produced will still be the black and white distribution, and size still is 64 * 64 pixels, as shown in Figure 6.Notice that though this hologram sheet gray-coded expression distribution of amplitudes can be used for also representing that the binary position distributes mutually, promptly on behalf of the position, gray scale 1 be worth ∏ mutually, on behalf of the position, gray scale 0 be worth 0 mutually.
Because the pixel of picture is bigger shown in Fig. 6, is 50 μ m * 50 μ m, therefore, can utilize existing printer or other printing device to be printed on the paper, as shown in Figure 7 easily.This holography picture can also be printed on the various material such as plastics, metal, fiber, cement, as commodity counterfeit prevention sign or bank signature etc.
In the deciphering stage, at first, utilize scanner or camera to absorb the encryption hologram sheet that is printed on the paper.Because the picture of picked-up is in size, gray scale, placement directions etc. might not be identical with former encryption picture, therefore, need carry out pre-service to the picked-up picture of distortion, be about to picture size, gray scale, direction etc. are adjusted to consistent with former encryption picture.Picture among Fig. 7 has 64 * 64 pixels after through the computing machine pre-service equally, and the pixel size is 50 μ m * 50 μ m, as shown in Figure 8.Pretreated encryption picture (shown in Figure 8) and the key picture (shown in Figure 5) that is stored in the calculating are carried out the logical OR computing, just obtained the holographic picture after the deciphering, will decipher picture and carry out promptly obtaining decryption content behind the Fourier transform, as shown in Figure 9.Comparison diagram 4 and Fig. 9, we can find both content unanimities.In addition, in order to improve the resolution of shown decryption content among Fig. 9, we can design the more hologram sheet of pixel, as 128 * 128,256 * 256 etc., or the efficient of raising computing machine Preprocessing Algorithm, the picture of picked-up can be returned to as far as possible and the consistent degree of former encryption hologram sheet.
As if without the key of key or use mistake the encryption picture being deciphered and being carried out Fourier transform, what then obtain is mess code, without any distinguishable content.For not using key, directly the encryption hologram sheet among Fig. 6 is carried out the resulting reproduced image of Fourier transform as shown in figure 10.This shows, encrypt hologram sheet and have very high level of security.
On the other hand, the encryption hologram sheet that is printed on the article such as commodity or bill might cause stainedly in transportation or use, causes partial content to differentiate.If picked-up suffers stained encryption hologram sheet, after through the computing machine pre-service, can only obtain to encrypt the distinguishable partial content in hologram sheet surface.But we find that this stained hologram sheet still can obtain clear and legible whole implicit informations after the hologram sheet that has only the distinguishable content of part surface is made decrypt operation.Therefore, this method also has stronger anti-damage capability, promptly encrypts hologram sheet and meets with stainedly, an or disappearance part still can decrypt whole implicit informations.
It is to be noted, this method can also be used for long-range deciphering or above the ONLINE RECOGNITION, be to deliver to the deciphering center by radio communication or internet after the user utilizes camera or other electron scanning equipment will encrypt the hologram sheet shooting, after the deciphering of deciphering center, again decryption content returned to the user.
List of references:
1.Javidi B, Zhang G, Li J., based on the experiment of the image encryption and the safety verification of random phase encryption technology, " optical engineering " 35 volumes, 9 phases, 2506-2512 page or leaf, 1996.[Javidi?B,Zhang?G,Li?J.,Experimental?demonstration?of?the?random?phase?encoding?technique?for?image?encryption?and?security?verification,Optical?Engineering?35(9),2506-2512(1996).]
2. the Liu Fu people, Zhai Hongchen, Yang Xiaoping encrypts " Acta Physica Sinica " 52 (10), 2462-2465 (2003) based on the random phase of kinoform iteration.
3. in refined, Peng Xiang, based on the optical image encryption of cascade phase place recovery algorithms, " optics journal " 25 (7), 881-884 (2005).
4. Chen Linsen, Zhou Xiaohong, Shao Jie, a kind of large information capacity digital hologram watermark of encrypting mutually, " photon journal " 34 (4), 616-620 (2005) based on the binary position.
5. Peng Xiang, Zhang Peng, ox is foolish stupid, based on the three dimensions digital watermarking system of virtual optics, " optics journal " 24 (11), 1507-1510 (2004).
6.X.-C.Yuan, S.H.Tao, W.C.Cheong, Y.W.Chen, M.S.Lim, K.J.Moh, A.T.S.Ho, the diffraction optical element of making based on the micro production method is used for the technology of mixed type encrypt and decrypt, " optical engineering " 43 volumes, 11 phases, 2493-2494 page or leaf .[X.-C.Yuan in 2004, S.H.Tao, W.C.Cheong, Y.W.Chen, M.S.Lim, K.J.Moh and A.T.S.Ho, Hybrid encryption and decryption technique using microfabricated diffractive optical elements, Optical Engineering 43 (11), 2493-2494 (2004) .]
7.Javidi B, Nomura T., the digital hologram method is used for information security, " optics letter " 25 volumes, 1 phase, 28-30 page or leaf, .[Javidi B in 2000, Nomura T.Securing information by use of digital holography, Optics Letters25 (1), 28-30 (2000) .]
8.R.W.Gerchberg, W.O.Saxton, determine the efficient algorithm that the position distributes mutually from image with diffraction plane, " optics " 35 phases, 237-246 page or leaf .[R.W.Gerchberg and W.O.Saxton in 1972, A practical algorithm for the determination of phase from image and diffraction plane pictures, Optik, 35,237-246 (1972) .]
9.S.Kirkpatrick, C.D.Gellatt, M.P.Vecchi, optimization method based on simulated annealing, " science " 220 phases, 671-680 page or leaf, nineteen eighty-three .[S.Kirkpatrick, C.D.Gellatt, and M.P.Vecchi, Optimization by simulated annealing, Science, 220,671-680 (1983) .]
10.Jianyu Ye, XiaoCong Yuan, Guangya Zhou, genetic algorithm are used for the optimal design of beam shaping diffraction optical element, " SPIE proceedings " 4594 volumes, 118 pages, calendar year 2001 .[Jianyu Ye, XiaoCong Yuan and Guangya Zhou, Genetic algorithm for optimization design of diffractive optical elements in laser beam shaping, Proc.SPIE 4594,118 (2001) .]
11.Nomura T, Javidi B, the joint transform correlator method is used for optical encryption, " optical engineering " 39 volumes, 8 phases, the 2031-2035 page or leaf, .[Nomura T in 2000, Javidi B, Optical encryption using a joint transform correlator architecture, Optical Engineering 39 (8), 2031-2035 (2000) .]

Claims (9)

1. digital encryption and decryption method based on an optical holography principle is characterized in that ciphering process is:
Step 1: input needs encrypted content;
Step 2: employing beam shaping algorithm obtains amplitude type or the phase type hologram sheet based on the need encrypted content;
Step 3: producing at random binary amplitude or phase type key is the key hologram sheet, and binary amplitude or phase type key are encrypted amplitude type or phase type hologram sheet and obtained encrypting hologram sheet at random to utilize this; This encrypts hologram sheet by printing device or printing equipment output;
Decrypting process is:
Step a: the encryption hologram sheet after the picked-up output, thereby the encryption hologram sheet of electron gain form;
Step b: the encryption hologram sheet to this electronic format carries out pre-service;
Step c: utilize described type of binary amplitude at random or phase type key that pretreated encryption hologram sheet is decrypted, the content after finally obtaining deciphering.
2. digital encryption and decryption method based on the optical holography principle according to claim 1 is characterized in that, the beam shaping algorithm be in Gerberg-Saxton algorithm, simulated annealing and the genetic algorithm any.
3. digital encryption and decryption method based on the optical holography principle according to claim 1 is characterized in that, being encrypted as in the step 3 adopts direct iteration method or joint transform correlation method to encrypt.
4. digital encryption and decryption method based on the optical holography principle according to claim 1 is characterized in that, adopt computer random to produce binary amplitude type or phase type key at random.
5. digital encryption and decryption method based on the optical holography principle according to claim 1 is characterized in that, the pretreated process among the step b is: make that the size of pretreated encryption hologram sheet is identical with the key hologram sheet of storage with picture number size.
6. according to claim 1-5 each described digital encryption and decryption method based on the optical holography principle, it is characterized in that, for the image after avoiding deciphering goes out a problem about centrosymmetric 2 images, with implicit information only be defined as one, two quadrant occurs, perhaps, hologram sheet and the key hologram sheet method by the phase coding that makes a circulation of encrypting is designed to 4 rank or high-order position facies pattern hologram sheet more.
7. digital encryption and decryption method based on the optical holography principle according to claim 1, it is characterized in that, encrypting hologram sheet is designed to be made up of numeral or character code, when deciphering, utilize existing optical character recognition directly numeral or character to be read, and numeral or character are changed into encryption original amplitude of hologram sheet or phase information distribution by computing machine.
8. according to claim 1-5 each described digital encryption and decryption method, it is characterized in that the encryption hologram sheet of step 3 utilizes printer or printing equipment to be printed on paper, plastics, metal or the cement based on the optical holography principle.
9. digital encryption and decryption method based on the optical holography principle according to claim 8 is characterized in that, utilize photographic attachment or scanner to obtain the digital pictures of encrypting hologram sheet, utilize computing machine logarithmic code picture to carry out pre-service.
CN2011101254798A 2011-05-16 2011-05-16 Digital encrypting and decrypting method based on optical holographic principle Pending CN102289609A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011101254798A CN102289609A (en) 2011-05-16 2011-05-16 Digital encrypting and decrypting method based on optical holographic principle

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011101254798A CN102289609A (en) 2011-05-16 2011-05-16 Digital encrypting and decrypting method based on optical holographic principle

Publications (1)

Publication Number Publication Date
CN102289609A true CN102289609A (en) 2011-12-21

Family

ID=45336029

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011101254798A Pending CN102289609A (en) 2011-05-16 2011-05-16 Digital encrypting and decrypting method based on optical holographic principle

Country Status (1)

Country Link
CN (1) CN102289609A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103645562A (en) * 2013-12-20 2014-03-19 中南大学 Beam shaping method for simultaneously modulating amplitude and phase
CN104735409A (en) * 2015-02-10 2015-06-24 浙江科技学院 Single-optical-path surveillance video watermark physical hiding device and digital detection method thereof
CN106993198A (en) * 2017-04-20 2017-07-28 努比亚技术有限公司 Image ciphering method, terminal and computer-readable recording medium
CN107106905A (en) * 2015-01-04 2017-08-29 佩美克西斯有限公司 Three-dimensional lottery ticket
CN107481179A (en) * 2017-05-17 2017-12-15 上海冠众光学科技有限公司 Antifalsification label recognition methods with watermarked information and device
CN108171642A (en) * 2016-12-07 2018-06-15 中国科学院大学 The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography
CN109901370A (en) * 2019-01-22 2019-06-18 四川大学 The optical imagery encipher-decipher method of phase-only hologram and single random phase encoding
CN110008532A (en) * 2019-03-18 2019-07-12 华中科技大学 A kind of Phase Change Opportunity of three-phase imbalance commutation determines method and commutation system
CN111559572A (en) * 2020-06-12 2020-08-21 山东泰宝信息科技集团有限公司 Point light source recognition laser encryption holographic anti-counterfeiting gasket and preparation method thereof
CN111572236A (en) * 2020-04-29 2020-08-25 中山大学 Pattern combining optical encryption and digital encryption and manufacturing method thereof
US20210232093A1 (en) * 2020-01-27 2021-07-29 Texas Instruments Incorporated Projector with phase hologram modulator
CN114552344A (en) * 2022-02-27 2022-05-27 北京工业大学 High-energy high-beam-quality optical fiber solid-mixed picosecond laser amplifier

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101542559A (en) * 2006-11-24 2009-09-23 拜尔创新有限责任公司 Coding method, decoding method, codec and data storage medium for holographic storage

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101542559A (en) * 2006-11-24 2009-09-23 拜尔创新有限责任公司 Coding method, decoding method, codec and data storage medium for holographic storage

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王怀彬 等: "一种新的信息加-解密技术的研究", 《光电子.激光》 *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103645562A (en) * 2013-12-20 2014-03-19 中南大学 Beam shaping method for simultaneously modulating amplitude and phase
CN103645562B (en) * 2013-12-20 2015-10-21 中南大学 The beam shaping method of modulated amplitude and phase place while of a kind of
CN107106905A (en) * 2015-01-04 2017-08-29 佩美克西斯有限公司 Three-dimensional lottery ticket
CN104735409A (en) * 2015-02-10 2015-06-24 浙江科技学院 Single-optical-path surveillance video watermark physical hiding device and digital detection method thereof
CN104735409B (en) * 2015-02-10 2018-08-21 浙江科技学院 A kind of monochromatic light road monitor video watermark physics concealing device and Digital Detecting Method
CN108171642A (en) * 2016-12-07 2018-06-15 中国科学院大学 The asymmetrical optical Information Hiding Techniques of view-based access control model cryptography
CN106993198A (en) * 2017-04-20 2017-07-28 努比亚技术有限公司 Image ciphering method, terminal and computer-readable recording medium
CN107481179A (en) * 2017-05-17 2017-12-15 上海冠众光学科技有限公司 Antifalsification label recognition methods with watermarked information and device
CN109901370A (en) * 2019-01-22 2019-06-18 四川大学 The optical imagery encipher-decipher method of phase-only hologram and single random phase encoding
CN110008532A (en) * 2019-03-18 2019-07-12 华中科技大学 A kind of Phase Change Opportunity of three-phase imbalance commutation determines method and commutation system
US20210232093A1 (en) * 2020-01-27 2021-07-29 Texas Instruments Incorporated Projector with phase hologram modulator
CN111572236A (en) * 2020-04-29 2020-08-25 中山大学 Pattern combining optical encryption and digital encryption and manufacturing method thereof
CN111572236B (en) * 2020-04-29 2021-09-10 中山大学 Anti-counterfeiting element combining optical encryption and digital encryption and manufacturing method thereof
CN111559572A (en) * 2020-06-12 2020-08-21 山东泰宝信息科技集团有限公司 Point light source recognition laser encryption holographic anti-counterfeiting gasket and preparation method thereof
CN111559572B (en) * 2020-06-12 2023-06-02 山东泰宝信息科技集团有限公司 Point light source reading laser encryption holographic anti-counterfeiting gasket and preparation method thereof
CN114552344A (en) * 2022-02-27 2022-05-27 北京工业大学 High-energy high-beam-quality optical fiber solid-mixed picosecond laser amplifier

Similar Documents

Publication Publication Date Title
CN102289609A (en) Digital encrypting and decrypting method based on optical holographic principle
Javidi Securing information with optical technologies
US8781153B2 (en) Method, system, and computer-accessible medium for authentication of paper using a speckle pattern
WO2003046806A1 (en) A digital anti-forging method
Huang et al. Optical watermarking for printed document authentication
Cheremkhin et al. QR code optical encryption using spatially incoherent illumination
US20120327450A1 (en) Methods and devices for securing and authenticating documents
MX2013007923A (en) High value document authentication system & method.
CN101537751A (en) Novel method for processing anti-counterfeit printing
US7212323B2 (en) Methods and apparatus for mass manufacturing two-dimensional binary information on transparent substrates using phase contrast modulated templates
Chen et al. Optical information authentication using optical encryption and sparsity constraint
CN106339979A (en) Calculating holographic encryption method based on Hash function
Aggarwal et al. Concealed moiré pattern encoded security holograms readable by a key hologram
Kumar et al. Speckle coding for optical and digital data security applications
CN105954991A (en) Optical encryption method based on holographic calculation
Pérez-Cabré et al. Near infrared multifactor identification tags
Javidi Optical information processing for encryption and security systems
KR20000051918A (en) The puzzling security principle of image data and supporting device
CN102658741A (en) Visual-cryptography-based visible anti-copying technique
Babu et al. Anti-counterfeiting using reflective micro structures-Based on random positioning of microstructures
Vanitha et al. Augmenting data security: Physical Unclonable Functions for digital holography based quadratic phase cryptography
Wang et al. 3D Copyright Protection Based on Binarized Computational Ghost Imaging Encryption and Cellular Automata Transform
CN106447589A (en) Double random phase optical image encryption method based on Fourier transform
Abookasis et al. Watermarks encrypted in a concealogram and deciphered by a modified joint-transform correlator
CN101847186A (en) Anti-counterfeit and counterfeit distinguishing method of trace

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20111221