Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Text information security protection method based on computer-generated holograms

Not Accessible

Your library or personal account may give you access

Abstract

Currently, computer-generated holograms (CGHs) based on ray tracing technology are generated faster and faster, and the reconstructed scenes are getting bigger and bigger and contain more and more information. Based on this situation, there are also more applications of using CGHs to hide information, but there is a lack of research on the ability to hide information. To address this issue, this paper proposes a point-sampling CGH method based on ray tracing. Our method utilizes ray tracing techniques to rapidly sample text information at different depths in the scene and hides the depth-encoded text information in the carrier image using discrete cosine transform. The reconstructed image after embedding shows good results, with a peak signal-to-noise ratio (PSNR) of 29.56 dB between the hidden images before and after embedding. The PSNR value between the embedded carrier image and the original carrier image is 51.66 dB, making it difficult for the human eye to distinguish, thereby effectively protecting the generated CGH. We also analyzed the maximum information density and observed that computational holograms obtain the maximum information density at ${200} \times {200}$ resolution.

© 2024 Optica Publishing Group

Full Article  |  PDF Article
More Like This
Multi-image optical information hiding algorithm based on Fourier transform without hidden key transmission

Yuan Guo, Ping Zhai, Xuewen Wang, and WenPeng Li
Appl. Opt. 63(5) 1292-1305 (2024)

Hologram authentication based on a secure watermarking algorithm using cellular automata

Wen-Jyi Hwang, Hao-Tang Chan, and Chau-Jern Cheng
Appl. Opt. 53(27) G64-G73 (2014)

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (12)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (3)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (19)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.