Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Review on Cryptography of Image Using Computer Generated Holography


Affiliations
1 Information Technology Department, Datta Meghe Institute of Engineering, Technology & Research, Wardha, Maharashtra, India
2 Computer Engineering Department, Govt. Polytechnic College, Gadchiroli, Maharashtra, India
     

   Subscribe/Renew Journal


Holography is the process of capturing three dimensional images by recording patterns of light wave reflection. It is interference of two coherent light sources, one being scattered from an object and another reference light being sent directly into the holographic plate. This interference pattern is then used in a 3D holographic display to view the holographic representation of the object. This is done by passing the same reference light through the interference pattern fringe in the 3D display. Computer Generated Holography (CGH) is a simulation technique to generate the same interference pattern without the object being present. Usually this is done by taking an image or a 3D representation of the object and using numerical techniques to simulate the interference pattern of the light field. CGH has many applications and one of them is image encryption and decryption. In this paper compare traditional and advance hologram methods.

Keywords

CGH (Computer Generated Holography), Digital Holographic Microscopy, Holography, 3D Image.
Subscription Login to verify subscription
User
Notifications
Font Size


  • D. Gabor, “A new microscopic principle,” Nature, vol. 161, no. 4098, pp. 777-778, 1948.
  • M. H. Jericho, H. J. Kreuzer, M. Kanka, and R. Riesenberg, “Quantitative phase and refractive index measurements with point-source digital in-line holographic microscopy,” Applied Optics, vol. 51, no. 10, pp. 1503-1515, 2012.
  • J. W. Cooley, and J. W. Tukey, “An algorithm for the machine calculation of complex fourier series,” Mathematics of Computation, vol. 19, no. 90, pp. 297-301, 1965. DOI: 10.2307/2003354
  • B. R. Brown, and A. W. Lohmann, “Complex spatial filtering with binary masks,” Applied Optics, vol. 6, pp. 1739-1748, 1967.
  • D. Gabor, “Fundamentals and applications of holography,” Vacuum, vol. 16, no. 6, p. 313, 1966.
  • J. Sun, and W. Wang, “An optical interferometry system for measuring three-dimensional displacements,” Instruments and Experimental Techniques, vol. 47, no. 5, pp. 711-714, 2004.
  • P. S. Divya, and M. K. Sheeja, “A study and simulation of computer generated hologram,” International Journal of Advances in Engineering & Technology (IJAET), vol. 6, no. 3, pp. 1340-1347, July 2013.
  • E. Leith, and J. Upatnieks, “Holograms: Their properties and uses,” Optical Engineering, vol. 4, no. 1, 1965.
  • J. Garcia-Sucerquia, W. Xu, S. K. Jericho, P. Klages, M. H. Jericho, and H. J. Kreuzer, “Digital in-line holographic microscopy,” 2006.
  • http://light.ece.illinois.edu/ECE460/PDF/Holography.pdf
  • W. H. Lee, “Sampled fourier transform hologram generated by computer,” Applied Optics, vol. 9, no. 3, pp. 639-643, 1970.

Abstract Views: 147

PDF Views: 0




  • Review on Cryptography of Image Using Computer Generated Holography

Abstract Views: 147  |  PDF Views: 0

Authors

Warsha M. Choudhari
Information Technology Department, Datta Meghe Institute of Engineering, Technology & Research, Wardha, Maharashtra, India
Shalini Kharkate
Computer Engineering Department, Govt. Polytechnic College, Gadchiroli, Maharashtra, India

Abstract


Holography is the process of capturing three dimensional images by recording patterns of light wave reflection. It is interference of two coherent light sources, one being scattered from an object and another reference light being sent directly into the holographic plate. This interference pattern is then used in a 3D holographic display to view the holographic representation of the object. This is done by passing the same reference light through the interference pattern fringe in the 3D display. Computer Generated Holography (CGH) is a simulation technique to generate the same interference pattern without the object being present. Usually this is done by taking an image or a 3D representation of the object and using numerical techniques to simulate the interference pattern of the light field. CGH has many applications and one of them is image encryption and decryption. In this paper compare traditional and advance hologram methods.

Keywords


CGH (Computer Generated Holography), Digital Holographic Microscopy, Holography, 3D Image.

References