Digital Holography for Recognition and Security of 3D Objects

  • Dhirendra Kumar
  • Naveen K. NishchalEmail author
Conference paper
Part of the Springer Proceedings in Physics book series (SPPHY, volume 194)


Three-dimensional (3D) object recognition has been achieved by comparing either holograms or the reconstructed images from respective holograms using conventional and nonlinear joint fractional transform correlators. For 3D information security, an encrypted image has been used as digital watermark. The encryption scheme is based on polarized light encoding and the photon counting technique. Multiple images may also be used as watermark. A multiple image encryption system has been proposed which is based on phase mask multiplexing and photon counting imaging.



The financial assistance from the DRDO under Grant No. ERIP/ER/1200428/M/01/1473 is acknowledged. D. Kumar acknowledges the funding from the UGC under letter No. F.2-10/2011(SA-I).


  1. 1.
    Schnars, U. and Jueptner, W. P. O., “Digital recording and numerical reconstruction of holograms,” Meas. Sci. Technol. 13, R85–R101 (2002).Google Scholar
  2. 2.
    Cuche, E., Marquet, P. and Depeursinge, C., “Spatial filtering for zero order and twin image elimination in digital off-axis holography,” Appl. Opt. 39, 4070–4075 (2000).Google Scholar
  3. 3.
    Nelleri, A., Gopinathan, U., Joseph, J. and Singh, K., “Wavelet based three-dimensional object recognition using single off-axis digital Fresnel hologram,” Proc. SPIE 5827, 30–37 (2005).Google Scholar
  4. 4.
    Javidi, B. and Tajahuerce, E., “Three-dimensional object recognition by use of digital holography,” Opt. Lett. 25, 610–612 (2000).Google Scholar
  5. 5.
    Frauel, Y. and Javidi, B., “Neural network for three-dimensional object recognition based on digital holography,” Opt. Lett. 26, 1478–1480 (2001).Google Scholar
  6. 6.
    Tajahuerce, E., Matoba, O. and Javidi, B., “Shift-invariant three-dimensional object recognition by means of digital holography,” Appl. Opt. 40, 3877–3886 (2002).Google Scholar
  7. 7.
    Javidi, B. and Kim, D., “Three-dimensional-object recognition by use of single exposure on-axis digital holography,” Opt. Lett. 30, 236–238 (2005).Google Scholar
  8. 8.
    Rosen, J., “Three-dimensional joint transform correlator,” Appl. Opt. 37, 7538–7544 (1998).Google Scholar
  9. 9.
    Mendlovic, D., Ozaktas, H. M. and Lohmann, A. W., “Fractional correlation,” Appl. Opt. 34, 303–309 (1995).Google Scholar
  10. 10.
    Rajput, S. K. and Nishchal, N. K., “Image encryption and authentication verification using fractional nonconventional joint transform correlator,” Opt. Lasers Eng. 50, 1474–1483 (2012).Google Scholar
  11. 11.
    Tripathi, R., Pati, G. S. and Singh, K., “Nonlinear processing and fractional-order filtering in a joint fractional Fourier-transform correlator: performance evaluation in multiobject recognition,” Appl. Opt. 40, 2844–2859 (2001).Google Scholar
  12. 12.
    Kumar, D. and Nishchal, N. K., “Three-dimensional object recognition using joint fractional Fourier transform correlators with the help of digital Fresnel holography,” Optik 126, 2690–2695 (2015).Google Scholar
  13. 13.
    Kumar, D. and Nishchal, N. K., “Recognition of three-dimensional objects using joint fractional correlator and nonlinear joint fractional correlator with the help of digital Fresnel holography: a comparative study,” Opt. Rev. 22, 256–263 (2015).Google Scholar
  14. 14.
    Nishchal, N. K. and Naughton, T. J., “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011).Google Scholar
  15. 15.
    Chen, W., Javidi, B. and Chen, X., “Advances in optical security systems,” Adv. Opt. Photon. 6, 120–155 (2014).Google Scholar
  16. 16.
    Situ, G. and Zhang, J., “Double random phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).Google Scholar
  17. 17.
    Hwang, H.-E., Chang, H. T. and Lie, W. N., “Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009).Google Scholar
  18. 18.
    Chen, W. and Chen, X., “Optical multiple-image encryption based on multiplane phase retrieval and interference,” J. Opt. 13, 115401 (2011).Google Scholar
  19. 19.
    Deng, X. and Zhao, D., “Multiple-image encryption using phase retrieval algorithm and intermodulation in Fourier domain,” Opt. Laser Technol. 44, 374–377 (2012).Google Scholar
  20. 20.
    Zalevsky, Z., Mendlovic, D. and Dorsch, R. G., “Gerchberg-Saxton algorithm applied in the fractional Fourier or the Fresnel domain,” Opt. Lett. 21, 842–844 (1996).Google Scholar
  21. 21.
    Pérez-Cabré, E., Cho, M. and Javidi, B., “Information authentication using photon-counting double-random-phase encrypted images,” Opt. Lett. 36, 22–24 (2011).Google Scholar
  22. 22.
    Perez-Cabre, E., Abril, H. C., Millan, M. S. and Javidi, B., “Photon-counting double-random-phase encoding for secure image verification and retrieval,” J. Opt. 14, 94001 (2012).Google Scholar
  23. 23.
    Cho, M. and Javidi, B., “Three-dimensional photon counting double-random-phase encryption,” Opt. Lett. 38, 3198–3201 (2013).Google Scholar
  24. 24.
    Rajput, S. K., Kumar, D. and Nishchal, N. K., “Photon counting imaging and phase mask multiplexing for multiple images authentication and digital hologram security”, Appl. Opt. 54, 1657–1666 (2015).Google Scholar
  25. 25.
    Unikrishnan, G., Pohit, M. and Singh, K., “A polarization encoded optical system using ferroelectric spatial light modulator,” Opt. Commun. 185, 25–31 (2000).Google Scholar
  26. 26.
    Tu, H.-Y., Cheng, C.-J. and Chen, M.-L., “Optical image encryption based on polarization encoding by liquid crystal spatial light modulator,” J. Opt. A: Pure Appl. Opt. 6, 524–528 (2004).Google Scholar
  27. 27.
    Lin, C., Shen, X. and Xu, Q., “Optical image encoding based on digital holographic recording on polarization state of vector wave,” Appl. Opt. 52, 6931–6939 (2013).Google Scholar
  28. 28.
    Alfalou, A. and Brosseau, C., “Dual encryption scheme of images using polarized light,” Opt. Lett. 35, 2185–2187 (2010).Google Scholar
  29. 29.
    Dubreuil, M., Aflalou, A. and Brosseau, C., “Robustness against attacks of dual polarization encryption using Stokes-Mueller formalism,” J. Opt. 14, 094004 (2012).Google Scholar
  30. 30.
    Rajput, S. K., Kumar, D., and Nishchal, N. K., “Photon counting imaging and polarized light encoding for secure image verification and hologram watermarking,” J. Opt. 16, 125406 (2014).Google Scholar
  31. 31.
    Kishk, S. and Javidi, B., “Watermarking of three-dimensional objects by digital holography,” Opt. Lett. 28, 167–169 (2003). Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Department of PhysicsIndian Institute of Technology PatnaBihta, PatnaIndia

Personalised recommendations