Acta Optica Sinica, Volume. 35, Issue 2, 209002(2015)

Encrypted Holographic Watermarking Technology with Decrypted Image Superposed No Noise

Liu Zhen*, Bai Taotao, and Lu Peng
Author Affiliations
  • [in Chinese]
  • show less
    References(17)

    [1] [1] Bai Taotao, Liu Zhen, Lu Peng. Digital watermarking scheme in Contourlet domain based on QR code [J]. Journal of Optoelectronics·Laser, 2014, 25(4): 769-776.

    [2] [2] M Urvoy, D Goudia, F Autrusseau. Perceptual DFT watermarking with improved detection and robustness to geometrical distortions [J]. IEEE Transactions on Information Forensics and Security, 2014, 9(7): 1108-1119.

    [3] [3] E D Tsougenis, G A Papakostas, D E Koulouriotis, et al.. Adaptive color image watermarking by the use of quaternion image moments [J]. Expert Systems with Applications, 2014, 41(14): 6408-6418.

    [4] [4] A Keskinarkaus, A Pramila, T Seppanen. Image watermarking with feature point based synchronization robust to print–scan attack [J]. Journal of Visual Communication and Image Representation, 2012, 23(3): 507-515.

    [6] [6] N Takai, Y Mifune. Digital watermarking by a holographic technique [J]. Appl Opt, 2002, 41(5): 865-873.

    [7] [7] Shi Xiaoyan, Zhao Daomu. Image hiding in Fourier domain by use of joint transform correlator architecture and holographic technique [J]. Appl Opt, 2011, 50(5): 766-772.

    [8] [8] C Martinez, O Lemonnier, F Laulagnet, et al.. Complementary computer generated holography for aesthetic watermarking [J]. Opt Express, 2012, 20(5): 5547-5556.

    [9] [9] Li Jianzhong. An optimized watermarking scheme using an encrypted gyrator transform computer generated hologram based on particle swarm optimization [J]. Opt Express, 2014, 22(8): 10002-10016.

    [10] [10] Sun Liujie, Zhuang Songlin. Watermarking by encrypted Fourier holography [J]. Opt Eng, 2007, 46(8): 085801.

    [12] [12] Sun Yunfeng, Zhai Hongchen, Yang Xiaoping, et al.. Application of Fourier CGH digital watermarking technique in color image forgery-prevention printing [J]. Journal of Optoelectronics·Laser, 2008, 19(7): 952-955.

    [13] [13] Huang Sujuan, Wang Shuozhong, Yu Yingjie. Computer generated holography based on Fourier transform using conjugate symmetric extension [J]. Acta Physica Sinica, 2009, 58(2): 952-958.

    [14] [14] Huang Sujuan, Wang Duyao, Liu Xiaojing, et al.. Hardcopy hologram watermarking based on discrete wavelet transform [J]. Journal of Optoelectronics·Laser, 2011, 22(9): 1415-1420.

    [15] [15] Chen Daqing, Zhou Hao, Tao Zhi, et al.. Fourier computer-generated hologram digital watermarking with nonlinear amplitude limiting [J]. Acta Optica Sinica, 2011, 31(2): 0207002.

    [16] [16] Chen Jiazhen, Zheng Zihua, Lian Guiren, et al.. Computer-generated holographic watermark technology based on four detour phases encoding scheme [J]. Laser & Optoelectronics Progress, 2010, 47(6): 060901.

    CLP Journals

    [1] Wu Weimin, Chen Jiazhen. Multiple Watermarking Method Based on Double Random Phase Encryption System with Double Quick Response Code[J]. Laser & Optoelectronics Progress, 2017, 54(12): 120901

    [2] Lin Chao, Shen Xueju, Lei Ming, Dou Shuaifeng, Zou Xiao. Optical Security Validation Based on Orthogonal Polarization Multiplexing in Three-Dimensional Space[J]. Acta Optica Sinica, 2016, 36(3): 307001

    Tools

    Get Citation

    Copy Citation Text

    Liu Zhen, Bai Taotao, Lu Peng. Encrypted Holographic Watermarking Technology with Decrypted Image Superposed No Noise[J]. Acta Optica Sinica, 2015, 35(2): 209002

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Holography

    Received: Jul. 28, 2014

    Accepted: --

    Published Online: Jan. 9, 2015

    The Author Email: Zhen Liu (lunaprint@163.com)

    DOI:10.3788/aos201535.0209002

    Topics