3D object hiding using three-dimensional ptychography

We present a novel technique for 3D object hiding by applying three-dimensional ptychography. Compared with 3D information hiding based on holography, the proposed ptychography-based hiding technique is easier to implement, because the reference beam and high-precision interferometric optical setup are not required. The acquisition of the 3D object and the ptychographic encoding process are performed optically. Owing to the introduction of probe keys, the security of the ptychography-based hiding system is significantly enhanced. A series of experiments and simulations demonstrate the feasibility and imperceptibility of the proposed method.

[1]  Joseph Rosen,et al.  Review of three-dimensional holographic imaging by multiple-viewpoint-projection based methods. , 2009, Applied optics.

[2]  A. G. Cullis,et al.  Transmission microscopy without lenses for objects of unlimited size. , 2007, Ultramicroscopy.

[3]  Roberto Torroba,et al.  Three-dimensional joint transform correlator cryptosystem. , 2016, Optics letters.

[4]  Jun Zhang,et al.  Analytic known-plaintext attack on a phase-shifting interferometry-based cryptosystem. , 2015, Applied optics.

[5]  J. Rodenburg,et al.  A phase retrieval algorithm for shifting illumination , 2004 .

[6]  Qiong Gong,et al.  Diffractive-imaging-based optical image encryption with simplified decryption from single diffraction pattern. , 2014, Applied optics.

[7]  J. Rodenburg,et al.  An improved ptychographical phase retrieval algorithm for diffractive imaging. , 2009, Ultramicroscopy.

[8]  B. Javidi,et al.  Encrypting three-dimensional information with digital holography. , 2000, Applied optics.

[9]  Bahram Javidi,et al.  3D object watermarking by a 3D hidden object. , 2003, Optics express.

[10]  J R Fienup,et al.  Phase retrieval algorithms: a comparison. , 1982, Applied optics.

[11]  O. Bunk,et al.  High-Resolution Scanning X-ray Diffraction Microscopy , 2008, Science.

[12]  Tuo Li,et al.  Security risk of diffractive-imaging-based optical cryptosystem. , 2015, Optics express.

[13]  Christophe Martinez,et al.  Complementary computer generated holography for aesthetic watermarking. , 2012, Optics express.

[14]  Hyun Kim,et al.  Optimal watermarking of digital hologram of 3-D object. , 2005, Optics express.

[15]  J. Rodenburg,et al.  Ptychographic microscope for three-dimensional imaging. , 2014, Optics express.

[16]  Tuo Li,et al.  Vulnerability of impulse attack-free four random phase mask cryptosystems to chosen-plaintext attack , 2016 .

[17]  Tuo Li,et al.  Attack on Optical Double Random Phase Encryption Based on the Principle of Ptychographical Imaging , 2016 .

[18]  Jingjuan Zhang,et al.  Multiple-image hiding by information prechoosing. , 2008, Optics letters.

[19]  Yi Qin,et al.  Simplified optical image encryption approach using single diffraction pattern in diffractive-imaging-based scheme. , 2014, Optics express.

[20]  Jingjuan Zhang,et al.  Multiple-image hiding in the Fresnel domain. , 2007, Optics letters.

[21]  Bahram Javidi,et al.  Watermarking of three-dimensional objects by digital holography. , 2003, Optics letters.

[22]  A. G. Cullis,et al.  Hard-x-ray lensless imaging of extended objects. , 2007, Physical review letters.

[23]  J. Rodenburg,et al.  Ptychographic transmission microscopy in three dimensions using a multi-slice approach. , 2012, Journal of the Optical Society of America. A, Optics, image science, and vision.

[24]  Byoungho Kim,et al.  Encryption and volumetric 3D object reconstruction using multispectral computational integral imaging. , 2014, Applied optics.

[25]  Tuo Li,et al.  Optical encryption of unlimited-size images based on ptychographic scanning digital holography. , 2014, Applied optics.

[26]  J. Rodenburg Ptychography and Related Diffractive Imaging Methods , 2008 .

[27]  Rong Li,et al.  Optical image encryption and hiding based on a modified Mach-Zehnder interferometer. , 2014, Optics express.

[28]  H M L Faulkner,et al.  Error tolerance of an iterative phase retrieval algorithm for moveable illumination microscopy. , 2005, Ultramicroscopy.

[29]  Hsuan T Chang,et al.  Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain. , 2005, Applied optics.

[30]  Liren Liu,et al.  Hiding an image in cascaded Fresnel digital holograms , 2006 .

[31]  Chi-Ching Chang,et al.  Three-dimensional information encryption and anticounterfeiting using digital holography. , 2015, Applied optics.

[32]  Bahram Javidi,et al.  Information hiding technique with double phase encoding. , 2002, Applied optics.

[33]  Myrian Tebaldi,et al.  Known-plaintext attack on a joint transform correlator encrypting system. , 2010, Optics letters.

[34]  Sanguo Zhang,et al.  Optical image encryption via ptychography. , 2013, Optics letters.