Font Size: a A A

Application Of All-digital Holography In Information Security

Posted on:2006-04-03Degree:MasterType:Thesis
Country:ChinaCandidate:Y J ZhaoFull Text:PDF
GTID:2132360155470826Subject:Optoelectronics and computer information processing
Abstract/Summary:PDF Full Text Request
The all-digital holography is definitely proposed in this paper. The all-digital holography we call here is that the hologram is generated and reconstructed totally by numerical method. The all-digital holography is based on the optical theory, combined with the strong manipulated ability of the computer, which is applied to the information security fields.The main research work in this paper is to apply the all-digital holography to the information security of the computer images and audios.In this paper, the all-digital holography is discussed in detail. The coding way of the CGH is also discussed. We choose the modified off-axis reference beam CGH as the way of the holographic transform. By comparing the frequency domain image of the Fourier transform CGH with that of the Fresnel transform CGH, the application fields of them are discussed.The Fresnel CGH is applied to the computer images encryption/decryption, the results are also given. The Fourier CGH is applied to the holographic compress encryption storage of the computer images ? Combined with the Arnold transform, the Fourier CGH is applied to the image hiding technology of the DCT transform, which make the hiding technology have more keys and make the security degree and the anti-cut ability improve greatly.The all-digital holography is applied to the digital audio information encryption/decryption. The one-dimensional audio information is transformed into two-dimensional image. The result two-dimensional image is encrypted and decrypted which realize the encryption/decryption of the audio information. We gained the good results and the results are also given.
Keywords/Search Tags:All-digital Holography, Holographic Transform, Virtual Optics, Information Security, Information Hiding
PDF Full Text Request
Related items