Acta Optica Sinica, Volume. 27, Issue 6, 1011(2007)

Digital Watermarking with Half-Tone Encoded Computer-Generated Hologram

[in Chinese]*, [in Chinese], and [in Chinese]
Author Affiliations
  • [in Chinese]
  • show less
    References(14)

    [1] [1] R. K. Wang, I. A. Watson, C. Chatwin. Random phase encoding for optical security[J]. Opt. Engng., 1996, 35(9): 2464~2469

    [2] [2] X. F. Meng, L. Z. Cai, M. Z. He et al.. Cross-talk-free double-image encryption and watermarking with amplitude-phase separate modulations[J]. J. Opt. A: Pure Appl. Opt., 2005, 7(11): 624~631

    [3] [3] S. Kishk, B. Javidi. Information hiding technique with double phase encoding[J]. Appl. Opt., 2002, 41(26): 546~547

    [4] [4] B. Javidi, T. Nomura. Securing information by use of digital holography[J]. Opt. Lett., 2000, 25(1): 28~30

    [5] [5] S. Kishk, B. Javidi. Watermarking of three-dimensional objects by digital holography[J]. Opt. Lett., 2003, 28(3): 167~169

    [6] [6] Nobukatsu Takai, Yuto Mifune. Digital watermarking by a holographic technique[J]. Appl. Opt., 2002, 41(5): 865~873

    [7] [7] Sherif Kishk, B. Javidi. 3D object watermarking by a 3D hidden object[J]. Opt. Express, 2003, 11(8): 874~888

    [10] [10] Xiang Peng, Lingfeng Yu, Lilong Cai. Digital watermarking in three dimensional space with a virtual-optics modality[J]. Opt. Commun., 2003, 226(16): 155~165

    [12] [12] Joseph Rosen, B. Javidi. Hidden images in halftone pictures[J]. Appl. Opt., 2001, 40(20): 3346~3353

    [13] [13] J. R. Fienup. Phase retrieval algorithms: a comparison[J]. Appl. Opt., 1982, 21(15): 2758~2769

    [14] [14] E. Wolf. Progress in Optics[M]. New York: Elsevier, 1978. 119~223

    [15] [15] J. C. Stoffel, J. F. Moreland. A survey of electronic techniques for pictorial reproduction[J]. IEEE Trans. on Communications, 1981, 29(12): 1898~1925

    [16] [16] D. Kermisch, P. G. Roetling. Fourier spectrum of halftone images[J]. J. Opt. Soc. Am. A, 1975, 65(6): 716~723

    CLP Journals

    [1] Hu Yufeng, Zhu Shan'an. Color Image Blind Watermark Algorithm Based on Double Chaotic Scrambling and Spread Spectrum Modulation[J]. Acta Optica Sinica, 2008, 28(9): 1691

    [2] Chen Daqing, Zhou Hao, Tao Zhi, Gu Jihua. Fourier Computer-Generated Hologram Digital Watermarking with Nonlinear Amplitude Limiting[J]. Acta Optica Sinica, 2011, 31(2): 207002

    [3] Xueyi Ye, Zhiwei He, Zhijing Zhao. A data hiding approach for the self-security of iris recognition[J]. Chinese Optics Letters, 2008, 6(7): 487

    [4] Chen Daqing, Gu Jihua, Zhou Hao, Jiang Jinhu. An Image Digital Watermarking with Phase Retrieval Algorithm and Fourier Transformation Hologram[J]. Acta Optica Sinica, 2009, 29(12): 3310

    [5] He Mingzhao, Cao Liangcai, Tan Qiaofeng, He qingsheng, Jin Guofan. Digital Watermarking Technique Based on Cascaded Fractional Fourier Transform System[J]. Acta Optica Sinica, 2009, 29(10): 2709

    Tools

    Get Citation

    Copy Citation Text

    [in Chinese], [in Chinese], [in Chinese]. Digital Watermarking with Half-Tone Encoded Computer-Generated Hologram[J]. Acta Optica Sinica, 2007, 27(6): 1011

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Image Processing

    Received: Sep. 1, 2006

    Accepted: --

    Published Online: Jun. 8, 2007

    The Author Email: (xpeng@szu.edu.cn)

    DOI:

    Topics