You are on page 1of 4

COMPUTER GENERATED CORRELATION HOLOGRAMS

David Abookasis and Joseph Rosen

Ben-Gunon University of the Negev


Department of Electrical and Computer Engineering
P. 0. Box 653, Beer-Sheva 84105, Israel

ABSTRACT simulated by digital computers. Here, for the first time,


we report on a real optical experiment implementing this
A new method of synthesizing computer gnerated idea. The second new element in the present work is the
holograms has been developed and experimentally tested. use of computer generated holograms displayed on real
The method has been implemented by an iterative positive masks instead of pure phase. masks suggested in
optimization algorithm on a joint transform correlator. Refs. [4-61.
The proposed hologram is a combination of two There are at least two main methods to perform spatial
separated sub-holograms, and its reconstructed image is correlation between any two arbitrary masks. One is
obtained as a result of a spatial correlation between the known as VanderLugt correlator (VLC) [7] and the other
hologram's two parts. The double-holograms are is the joint transform correlator (JTC) [SI. In principle,
displayed on the correlator input plane illuminated by a both configurations can be used as a platform to carry out
plane wave. Consequently, a desired image is constructed the DCH. However, because of the less restrictive
on part of the correlator output plane. The above method alignment requirements between the two sub-holograms
has been extended for deciphering watermarks, and other in the JTC in comparison with the VLC, we choose the
hidden information, from printed images. A spatial JTC (or actually some modified version which will be
correlation between two conealograms; one containing described in the following) as the correlator for our first
the watermark and the other containing the deciphering demonstration of the DCH. Contrary to VLC, in the JTC a
key, w e a l s the concealed watermark from the printed lateral distance between the two sub-holograms can be
picture, only when the two specific holograms are changed within a reasonable tolerance, without changing
matched. Both simulation and experimental results are the shape of the output image. Only the image location on
presented. the output plane is changed according to the relative
distance between the two holographic masks. Two
complex functions are coded into the DCH. One of these
functions is chosen once as a random phase function
1. INTRODUCTION while the other is computed by an iterative algorithm
called JTC-based projection onto-constraint sets (POCS)
Techniques of information security have received [9]. A complete description of the computation process
increasing attention recently since they protect data from of these phase functions is given in Ref. [5].
unauthorized distribution. Various methods of hiding Finally, instead of using phase-only functions as the
inforyation [I-31 have been developed by different system input we use the CONCEALOGRAM method
research groups. In this study we propose a new approach [IO]. This means that both functions are now figurative
for data encryption using cross-coyelation between two meaningful pictures instead of arbitrary dots. Using these
computer-generated hologram's (CGH's). Therefore we figurative functions is an optional feature that opens new
coin this new technique as digital correlation hologram possible applications for the system.
(DCH). To the best of our knowledge, this is the first
report to present an experimental spatial correlation
between two computer-generated holograms which yields 2. CODING AND CONSTRUCTION DESCRIPTION
a meaningful output image. The idea of correlation
between two holograms yielding a meaningful image has The POCS algorithm is implemented here by a digital
already appears in different versions [4-61. However, in procedure based on simulating a JTC, in which two phase
all these references, the optical correlators have been functions are transformed back and forth between the

0-7803-8427-~20.0W'2004 IEEE 258


input and output planes. Appropriate constraints are value, say, 0. The area of the (kl)th dot is determined by
employed on both planes until the algorithm converges, the value of Is/or 111.The position of the ( k l ) t h dot inside
in the sense that the error between the desired and the the submatrix is determined by the value of ?, or ',.
obtained image is minimal. The constraints on the JTC Note that our JTC is not the conventional one used for ' '

input plane are expressed by the need to get two many schemes of pattern recognition [SI. In the present
separated, size-limited, phase functions, one is randomly JTC we mask the joint spectral plane, and process only
determined once before the first iteration and the other is the first diffraction order in this plane. This procedure
updated every iteration. The constraint on the JTC output enables us to obtain the cross-correlation between,
plane reflects the goal to get on part of the plane an effectively, two complex functions, although there are
intensity pattern close as much as possible to some actually two real positive functions in the input plane.
predefined image. After completing the iterative
procedure, the computer has in its memory two complex 3. SIMULATION AND EXPERIMENTAL RESULTS
functions designed for the specific task of constructing a
desired image from the cross-correlation between these To demonstrate the proposed technique, we
two functions. The present experimental demonstration is numerically and experimentally performed the three
divided into three stages: I . Computation of two complex stages of synthesizing and testing the proposed DCH. In
functions by the JTC-based POCS [SI briefly summarized the first stage the desired image (containing the letters
above. 2. Coding the complex functions as a DCH or as a DCH) was encrypted into two phase functions by the
two visually meaningful concealograms placed side by iterative JTC-based POCS algorithm [9]. Since the SLM
side on the JTC input plane. 3. Construction of the used in this study (CRL, XGA3) can modulate the
desired image from the DCH in a modified JTC transferred light with positive gray-tones only, the
configuration. complex functions were coded into a positive real
We now continue the description from the point that transparency. The obtained double-sections hologram was
the POCS algorithm has yielded two phase functions s. r . displayed on the input plane of the JTC. Each of the two
These two functions are coded into positive. real sub-holograms covered only 110x225 pixels out of
transparencies as CGHs and displayed on the input plane 600x600 pixels, as shown in Fig. 1. As we can see from
ofthe JTC. The two holograms are illuminated by a plane this picture the coded function was located in a diagonal
wave and jointly Fourier transformed. In our modified position in order to avoid the large zero-order diffraction
JTC only part of the joint spatial spectrum is observed by occurring at the origin of the joint transform correlation
a CCD. The intensity pattern of this area is displayed on a output plane.
spatial light modulator (SLM). This SLM is illuminated
by a plane wave such that the Fourier transform of the
SLM transparency is obtained on the JTC output plane.
From mathematical calculations three spatially separated
diffraction orders can be observed. The first term is the
diffraction zero-order at the vicinity of the origin of the
output plane. This term represents the autocorrelation of
the two original complex functions. The second and the
third terms correspond to the cross-correlations between
the two complex functionss and r . According to the
output results of the POCS algorithm, these cross-
correlations approximately produce the desired image.
Therefore we can retrieve the coded image by reading it Figure I : Two sub-holograms on the JTC input plane
from the vicinity of specific points. for both the simulation and experiment.
Following CGH techniques [I I ] we propose to encode A collimated beam from He-Ne laser with h=632.8nm
the complex functions s and r in a different way resemble illuminated SLM and created a diffraction pattern of the
conealogram technique [IO]. In this method the joint transform power spectrum on the back focal plane
magnitude is coded within the area o f a binary dots and of the first Fourierlens in the JTC set up. The entire
the phase within the dots' positions. Every pixel of these intensity of the joint power spectrum recorded by the
complex functions is replaced by a binary submatrix CCD isshown in Fig.2.
Inside each submatrix there is a dot represented by some
binary value, say, I , on a background of the other binary

259
In the case of conealogram coding the POCS algorithm
was tested with an image of the sign p as the hidden
watermark pattern. Each of the two gray-tone pictures,
one for hosting the watermark and the other for hosting
the deciphering key, have the size of 68x68 pixels. After
completing enough iterations of the POCS algorithm, the .
computer memory contains two continuous-tone
complex-valued matrices which should be binarized
according the rule of the concealogram technique [ I I].
The size of each halftone cell was 11x1 I pixels. and the
Figure 2 : Experimental result of three diffraction
gray-tone image is quantized with 7 levels of magnitude
orders on the joint power spectrum plane.
and 11 levels of phase

Two first diffraction orders on either diagonal side of


the zero order can be observed. The center of the zero
order is blocked in Fig. 2 for a clearer visualization.
Since only one of these orders is needed, we recorded
only the intensity distribution inside the frame denoted
by the dashed line. The size of this frame was 795x596
pixels, and the pattern inside this frame was displayed on
a second SLM. Finally, after another Fourier transform
by the second lens, the correlation plane was obtained as
shown in Fig. 3.

Figure 5: Two rotated CONCEALOGRAMs displayed on


SLM in the optical experiment
Figure 3: Experimental. result of the desired image
constructed on the JTC correlation plane. The same setup as in the previous experiment was used
again. The two conealograms were adjusted to be
displayed on the SLM. Both halftone pictures were
Thecenter of the zero order is also blocked in Fig. 3
for a clearer visualization. The three orders of the rotated by 45 degrees on the input plane, as shown in Fig.
correlation plane and the'two images of the letters DCH 5, in order to avoid from the bright tails of the zero
in the first diffraction orders can be clearly seen, diffraction order occurring at the origin of the joint
demonstrating that the proposed method has reached its spectrum plane. A collimated beam from a He-Ne laser
goal. For comparison, Fig. 4 shows the same constructed illuminate the SLM and created a three diffraction orders
image obtained from the-digital simulation of the of the joint spectrum on the back focal plane of the first
process. ....'. Fourierlens. Since only one of these orders is needed,
we record only one intensity distribution inside the CCD
frame. ?he captured pattern was then displayed on a
second SLM. Finally, after another Fourier transform by
the second Fourierlens. the correlation plane was
obtained as shown in Fig. 6. Fig. 6 is the resulting
watermark reconstructed from optical cross-correlation
between two input concealograms. Three orders of the .
correlation plane and the two images of the sign p in the
first diffraction orders can be seen in the figure,

Figure 4: Simulation result of the desired image


constructed on the JTC correlation plane.

260
demonstrating that the proposed method has reached its in the latter, the binary mask is a figurative meaningful
W"8l picture instead o f a meaningless collection of dots as the
DCH. Thus, the JTC described above can be used to
reveal a watermark or steganography data embedded in
the concealogram. In this case, the concealogram is
displayed on the input plane instead of one of the sub-
holograms. Additionally, the main innovation in this study
is that an electro-optical correlator in a modified JTC
configuration deciphers the hidden information. The
hidden information is revealed as a result of a spatial
correlation between two CGH's or concealograms. As
Figure 6: Experimental results of the reconstructed consequence of the above technique, illegal deciphering
watermark observed by the CCD on the output the hidden watermark should be practically impossible
plane of the modified JTC. because it is hidden in the form of complicated phase
function. The quality of the reconstructed watermark may
For comparison, Fig. 7 shows the same constructed be improved using alternative algorithm better than the
image obtained from the numerical simulation of the POCS, or using SLM with more pixels.
process Computer simulation and optical experiment confirm
our proposed technique. Since this teihnique can be
particularly useful for preventing illegal distribution and
since our proposed method provides the advantages o f
simple design and alignment with high degree o f security
the above technique can be used for versatile applications
in security areas.

5. REFERENCES

Figure 7: Simulation results of the JTC output plane in [I] W. Bender, D. Gruhl N. Morimoto, and L. Lu, 'Techniques
which the hidden watermark was revealed. for data hiding," IBM Sysr. J . 35, pp. 313-336, 19%.
[2] D . Grover, "Steganography and watermarking of digital data."
Co,rrpa~erLaw & Securiry R e p o ~ 17 r (2). pp. IOI-I04,2001.
[3] S. Kishk, and B. Javidi, "3D object watermarking by'a 3 D
4. DISCUSSION AND CONCLUSION
hidden object," Opr. €.rp 11, pp. 874888,2M)3.
[4] H. T. Chang. W. C. Lu, and C. J. Kuo,"Multiple-Phase
We have proposed and demonstrated a new type of remeval for optical security systems by use ofrandom- phase
computer-generated hologram termed DCH. h e main encoding" Appl. Opr. 41, pp. 48254834,2002.
purpose of the method is to construct on the output plane [ 5 ] D. Abkasis, 0. A m i , J. Rosen and B. Javidi, "Security
a complex function in a conditional way. This means that optical systems based on a joint transform correlator with
two, and only two, holograms are needed to create the significantoutput," Opr. E H ~40,. pp. 1584-1589, 2001.
complex function constructed a s a cross-correlation [6] Yeh C. H.. Chang H. T., Chien H. C., and Kuo C. J., "Design
between the two holograms. The DCH can be used for of Cascaded Phase Keys for a Hierarchical Security System"
several applications such as an encryption system where Appl. Opt. 41,pp. 6128-6134,2002.
the image in the correlarion plane is considered as the [7] A. VanderLugt, "Signal detection by complex spatial filtering."
information that we wish to encrypt. The sub-hologram. IEEE Trans. It$ Theoiy IT-l0,pp. 139.146, 1964.
I [8] C. S . Weaver and J. W. Goodman. "A technique for
modified during the POCS algorithm, is the encryptcd
optically convolving two functions," Appl. Opr. S. pp. 1248-
data, whereas the other unchanged sub-hologram is 1249, I%h.
employed as the decoder for this encrypted data. When [Y] J. Rosen and J. Shamir. "Application of the projection-
this same decoder is used in several encryption onto-constraint-sets algolithm for optical panern recognition,"
procedures, it can become a general decoder for many Opr. /,err. 16, pp. 752-754, 1991.
encrypted holograms. Placing the two sub-holograms [IO] J. Rosen and B. Javidi, "Hidden images in halflone
together in the input plane o f the JTC is the only way to pictures," Appl. Opr. 40, pp. 3346-3353,ZWl.
reconstruct the original image. [ I I ] A. W. Lohmann and D. P. Pans, "Binary Fraunhofer
This concept wds combined with the recently invented holograms generated by computer," Appl. Opt. 6, pp. 1739-
hiding information method called concealogram [I 01. The 1748, 1967.
difference between the DCH and the concealogram is that

26 1

You might also like