-
Combining the techniques of double random phase encoding and phase-shifting interferometry, an information hiding system is proposed, in which the information to be hidden can be encrypted into multiple interferograms. By choosing the appropriate weighting factor, the interferograms can be embedded in the host image. The secrete information can be successfully extracted and decrypted by special phase-shifting reconstruction formula and inverse Fresnel diffraction transform. A software of information hiding system is designed by mixed programming between Visual C++ and Matlab based in the Matcom software environments. By testing the software interface, the designed software can successfully realize the main functions, such as image reading and displaying, input of basis geometrical parameters, information encrypting and embedding, information extracting, decrypting, robustness testing, etc..
-
Keywords:
- image encryption and digital watermarking /
- phase-shifting interferometry /
- digital image processing
[1] Refrégier P, Javidi B 1995 Opt. Lett. 20 767
[2] Javidi B 2005 Optical and digital techniques for information security (New York: Springer)
[3] Chang H T, Lu W C, Kuo C J 2002 Appl. Opt. 41 4825
[4] Nomura T, Uota K, Morimoto Y 2004 Opt. Eng. 43 2228
[5] Liu Z J, Liu S T 2007 Opt. Commun. 275 324
[6] Yuan S, Zhou X, Li D H, Zhou D F 2007 Appl. Opt. 46 3747
[7] Zhou N R, Wang Y X, Gong L H, He H, Wu J H 2011 Opt. Commun. 284 2789
[8] Peng X, Tang H Q, Tian J D 2007 Acta. Phys. Sin. 56 2629 (in Chinese) [彭翔, 汤红乔, 田劲东 2007 物理学报 56 2629]
[9] Liu F M, Zhai H C, Yang X P 2003 Acta. Phys. Sin. 52 2462 (in Chinese) [刘福民, 翟宏琛, 杨晓苹 2003 物理学报 52 2462]
[10] Javidi B, Nomura T 2000 Opt. Lett. 25 28
[11] Yamaguchi I, Zhang T 1997 Opt. Lett. 22 1268
[12] Cai L Z, He M Z, Liu Q, Yang X L 2004 Appl. Opt. 43 3078
[13] Meng X F, Cai L Z, He M Z, Dong G Y, Shen X X 2005 J. Opt. A: Pure Appl. Opt. 7 624
[14] Meng X F, Cai L Z, Xu X F, Yang X L, Shen X X, Dong G Y, Wang Y R 2006 Opt. Lett. 31 1414
[15] Meng X F, Cai L Z, Yang X L, Xu X F, Dong G Y, Shen X X, Zhang H, Wang Y R 2007 Appl. Opt. 46 4694
[16] Meng X F, Peng X, Cai L Z, He W Q, Qin W, Guo J P, Li A M 2010 Acta. Phys. Sin. 59 6118 (in Chinese) [孟祥锋, 彭翔, 蔡履中, 何文奇, 秦琬, 郭继平, 李阿蒙 2010 物理学报 59 6118]
[17] Consularo L A, Costa L 1998 Comput. Phys. 12 460
[18] Qin W X, Liu J Y, Zhao W, Wang S H 2007 J. Syst. Eng. Electron 29 795 (in Chinese) [钱伟行, 刘建业, 赵伟, 汪叔华 2007 系统工程与电子技术 29 795]
-
[1] Refrégier P, Javidi B 1995 Opt. Lett. 20 767
[2] Javidi B 2005 Optical and digital techniques for information security (New York: Springer)
[3] Chang H T, Lu W C, Kuo C J 2002 Appl. Opt. 41 4825
[4] Nomura T, Uota K, Morimoto Y 2004 Opt. Eng. 43 2228
[5] Liu Z J, Liu S T 2007 Opt. Commun. 275 324
[6] Yuan S, Zhou X, Li D H, Zhou D F 2007 Appl. Opt. 46 3747
[7] Zhou N R, Wang Y X, Gong L H, He H, Wu J H 2011 Opt. Commun. 284 2789
[8] Peng X, Tang H Q, Tian J D 2007 Acta. Phys. Sin. 56 2629 (in Chinese) [彭翔, 汤红乔, 田劲东 2007 物理学报 56 2629]
[9] Liu F M, Zhai H C, Yang X P 2003 Acta. Phys. Sin. 52 2462 (in Chinese) [刘福民, 翟宏琛, 杨晓苹 2003 物理学报 52 2462]
[10] Javidi B, Nomura T 2000 Opt. Lett. 25 28
[11] Yamaguchi I, Zhang T 1997 Opt. Lett. 22 1268
[12] Cai L Z, He M Z, Liu Q, Yang X L 2004 Appl. Opt. 43 3078
[13] Meng X F, Cai L Z, He M Z, Dong G Y, Shen X X 2005 J. Opt. A: Pure Appl. Opt. 7 624
[14] Meng X F, Cai L Z, Xu X F, Yang X L, Shen X X, Dong G Y, Wang Y R 2006 Opt. Lett. 31 1414
[15] Meng X F, Cai L Z, Yang X L, Xu X F, Dong G Y, Shen X X, Zhang H, Wang Y R 2007 Appl. Opt. 46 4694
[16] Meng X F, Peng X, Cai L Z, He W Q, Qin W, Guo J P, Li A M 2010 Acta. Phys. Sin. 59 6118 (in Chinese) [孟祥锋, 彭翔, 蔡履中, 何文奇, 秦琬, 郭继平, 李阿蒙 2010 物理学报 59 6118]
[17] Consularo L A, Costa L 1998 Comput. Phys. 12 460
[18] Qin W X, Liu J Y, Zhao W, Wang S H 2007 J. Syst. Eng. Electron 29 795 (in Chinese) [钱伟行, 刘建业, 赵伟, 汪叔华 2007 系统工程与电子技术 29 795]
Catalog
Metrics
- Abstract views: 8867
- PDF Downloads: 1064
- Cited By: 0