Acta Photonica Sinica, Volume. 54, Issue 1, 0110001(2025)
Multi-image Encryption Based on QR Codes and Fresnel Phase-only Holograms
[1] WU Jun, WANG Gang, XU Gang. Color image encryption method based on computer generated hologram and chaos[J]. Acta Photonica Sinica, 41, 113-132(2021).
[2] SINGH M, SINGH A K. A comprehensive survey on encryption techniques for digital images[J]. Multimedia Tools and Applications, 82, 11155-11187(2023).
[3] HAFSA A, SGHAIER A, MALEK J et al. Image encryption method based on improved ECC and modified AES algorithm[J]. Multimedia Tools and Applications, 80, 19769-19801(2021).
[4] ELKANDOZ M T, ALEXAN W. Image encryption based on a combination of multiple chaotic maps[J]. Multimedia Tools and Applications, 81, 25497-25518(2022).
[5] LIAO X F, LAI S Y, ZHOU Q. A novel image encryption algorithm based on self-adaptive wave transmission[J]. Signal Processing, 90, 2714-2722(2010).
[6] WEI H Y, WANG X G. Optical multiple-image authentication and encryption based on phase retrieval and interference with sparsity constraints[J]. Optics & Laser Technology, 142, 107257(2021).
[7] CHEN Q, SHEN X J, CHENG Y et al. A security-enhanced joint transform correlator optical encryption system with cropping operation[J]. Optik, 245, 167654(2021).
[8] SU Y G, XU W J, LI T L et al. Optical color image encryption based on fingerprint key and phase-shifting digital holography[J]. Optics and Lasers in Engineering, 140, 106550(2021).
[9] ZHANG Cheng, XU Haitao, ZHU Yuanyuan et al. Multiple color images encryption via compressive holography and spatial multiplexing[J]. Acta Photonica Sinica, 49, 0910001(2020).
[10] MAKOWSKI M, SYPEK M, KOLODZIEJCZYK A et al. Iterative design of multiplane holograms: experiments and applications[J]. Optical Engineering, 46, 045802(2007).
[11] YING C F, PANG H, FAN C J et al. New method for the design of a phase-only computer hologram for multiplane reconstruction[J]. Optical Engineering, 50, 055802(2011).
[12] WANG Z, CHEN T, CHEN Q Y et al. Reducing crosstalk of a multi-plane holographic display by the time-multiplexing stochastic gradient descent[J]. Optics Express, 31, 7413-7424(2023).
[13] SITU G H, ZHANG J J. Multiple-image encryption by wavelength multiplexing[J]. Optics Letters, 30, 1306-1308(2005).
[14] ZHAO R, SAIN B, WEI Q et al. Multichannel vectorial holographic display and encryption[J]. Light: Science & Applications, 7, 95(2018).
[15] XI S X, YU N N, WANG X L et al. Optical encryption scheme for multiple-image based on spatially angular multiplexing and computer generated hologram[J]. Optics and Lasers in Engineering, 127, 105953(2020).
[16] ABUTURAB M R. A superposition based multiple-image encryption using Fresnel-Domain high dimension chaotic phase encoding[J]. Optics and Lasers in Engineering, 129, 106038(2020).
[17] ZHANG L H, WANG Y, ZHANG D W. Research on multiple-image encryption mechanism based on Radon transform and ghost imaging[J]. Optics Communications, 504, 127494(2022).
[18] GERHBERG R, SAXTON W. A practical algorithm for the determination of phase from image and diffraction plane picture[J]. Optik, 35, 237-246(1972).
[19] FIENUP J R. Phase retrieval algorithms: a comparison[J]. Applied Optics, 21, 2758-2769(1982).
[20] FIENUP J R. Phase-retrieval algorithms for a complicated optical system[J]. Applied Optics, 32, 1737-1746(1993).
[21] CHANG C L, XIA J, YANG L et al. Speckle-suppressed phase-only holographic three-dimensional display based on double-constraint Gerchberg-Saxton algorithm[J]. Applied Optics, 54, 6994-7001(2015).
[22] SHIMOBABA T, ITO T. Random phase-free computer-generated hologram[J]. Optics Express, 23, 9549-9554(2015).
[23] SHEN C, QI Y F, SUN J L et al. Optimized iterative method for generating phase-only Fourier hologram based on quadratic phase[J]. Optics Communications, 500, 127313(2021).
[24] ZEA A V, RAMIREZ J F, TORROBA R. Optimized random phase only holograms[J]. Optics Letters, 43, 731-734(2018).
[25] TSANG P W M, CHOW Y T, POON T C. Generation of patterned-phase-only holograms (PPOHs)[J]. Optics Express, 25, 9088-9093(2017).
[26] ZEA A V, TORROBA R. Optimized random phase tiles for non-iterative hologram generation[J]. Applied Optics, 58, 9013-9019(2019).
[27] BARRERA J F, MIRA A, TORROBA R. Optical encryption and QR codes: secure and noise-free information retrieval[J]. Optics Express, 21, 5373-5378(2013).
[28] WANG Z H, SU Y F, WANG X Y et al. Security-enhanced multiple-image encryption based on quick response codes and modified double random phase encoding in the fractional Fourier transform domain[J]. Applied Optics, 61, 7255-7264(2022).
[29] YAN A M, DONG J B. A simple method to realize multiple-image encryption with high quality retrieval in the majority of single image cryptosystems[J]. OSA Continuum, 1, 891-898(2018).
[30] WEI Y, YAN A M, DONG J B et al. Optical image encryption using QR code and multilevel fingerprints in gyrator transform domains[J]. Optics Communications, 403, 62-67(2017).
[31] KUMAR R, BHADURI B, HENNELLY B. QR code-based non-linear image encryption using Shearlet transform and spiral phase transform[J]. Journal of Modern Optics, 65, 321-330(2018).
[32] ZEA A V, BARRERA J F, TORROBA R. Customized data container for improved performance in optical cryptosystems[J]. Journal of Optics, 18, 125702(2016).
[33] JIAO S M, JIN Z, ZHOU C Y et al. Is QR code an optimal data container in optical encryption systems from an error-correction coding perspective?[J]. JOSA A, 35, A23-A29(2018).
[34] SU Y F, CAI Z J, WU K et al. Projection-type multiview holographic three-dimensional display using a single spatial light modulator and a directional diffractive device[J]. IEEE Photonics Journal, 10, 1-12(2018).
[35] LIU J M, ZHANG W, QIU S S. Method for improving randomness of tent chaotic sequences[J]. Computer Engineering, 38, 10-12(2012).
Get Citation
Copy Citation Text
Chuan SHEN, Junqiao PAN, Anlin WANG, Ze SHEN, Xiaodie WANG, Cheng ZHANG, Sui WEI. Multi-image Encryption Based on QR Codes and Fresnel Phase-only Holograms[J]. Acta Photonica Sinica, 2025, 54(1): 0110001
Category:
Received: Jul. 2, 2024
Accepted: Sep. 11, 2024
Published Online: Mar. 5, 2025
The Author Email: Chuan SHEN (shenchuan@ahu.edu.cn)