Sherif Kishk and Bahram Javidi
and Bahram Javidi
University of Connecticut, Electrical and Computer Eng. Dept, Storrs, CT, 06269-2157
In this paper we present a method to watermark a 3D object with another hidden 3D object using digital holography. The watermark or the hidden information is a 3D object that is embedded in the digital hologram of a 3D host object. The digital holograms are obtained optically by phase shift interferometery. The hologram of the hidden 3D object is double phase encoded before embedding it to the host 3D object hologram. Then, the watermarked hologram is double phase encoded again using different set of codes. The resultant watermarked hologram is very secure because of the multi-key nature of the watermarking process. We discuss the effect of distortion caused by hologram quantization and occlusion of some of the hologram pixels. We present tests to illustrate the effect of using a window of the hologram to reconstruct the hidden 3D object and the host 3D object. Both mathematical analysis and simulations are presented to illustrate the system performance. To the best of our knowledge, this is the first report of embedding a 3D objects within another 3D object.
©2003 Optical Society of America
Hyun Kim and Yeon H. Lee
Opt. Express 13(8) 2881-2886 (2005)
Sherif Kishk and Bahram Javidi
Opt. Lett. 28(3) 167-169 (2003)
Xiaoyan Shi and Daomu Zhao
Appl. Opt. 50(5) 766-772 (2011)
O. Erman Okman and Gozde Bozdagi Akar
J. Opt. Soc. Am. A 24(1) 243-252 (2007)
Wen-Jyi Hwang, Hao-Tang Chan, and Chau-Jern Cheng
Appl. Opt. 53(27) G64-G73 (2014)
S. Kishk and B. Javidi “Watermarking of a 3D Object Using Digital Holography,” Opt. Let. 28, 167–169 (2003).
R. Ohbuchi, A. ukaiyama, and S. Takahashi “A frequency-domain approach to watermarking 3D shapes,” Computer Graphics Forum 21, 373–382 Sp. Iss. SI(2002).
S. Kishk and B. Javidi, “Information Hiding Technique using Double Phase Encoding,” Appl. Opt. 41, 5470–5482 (2002).
T. Naughton, Y. Frauel, B. Javidi, and E. Tajahuerce, “Compression of digital holograms for threedimensional object reconstruction and recognition,” Appl. Opt. 11, 4124–4132 (2002).
Joseph Rosen and Bahram Javidi, “Hiding images in Halftone Pictures,” Appl. Opt. 40, 3346 (2001).
Chuan-Fu Wu and Wen-Shyong Hsieh, “Digital watermarking using zerotree of DCT,” Consumer Electronics, IEEE Transactions on, 46, 87–94 (2000).
G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, “Watermarking Digital Image and Video Data. A state of the Art overview,” IEEE Signal Processing Magazine 17, 20–46 (2000).
Po-Chyi Su, C.-C. Jay Kuo, and Houng-jyh Wang, “Wavelet-Based Digital Image Watermarking,” Opt. Express, 3, 491–496 (1998), http://www.opticsexpress.org/abstract.cfm?URI=OPEX-3-12-491
F. Goudail, F. Bollaro, B. Javidi, and P. Refregier, “Influence of perturbation in a double phase-encoding system,” J. Opt. Soc. Am. A 15, 2629–2638 (1998).
I Yamaguchi and T Zhang, “Phase-Shifting Digital Holography,” Opt. Lett. 22, 1268–1270 (1997).
R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical secutity,” Opt. Eng. 35, 2464–2460 (1996).
W. Bender, D. Gruhl, N. Morimoto, and L. Lu, “Techniques for data hiding,” IBM Systems Journal 35, 313–336 (1996).
P. Refregier and B. Javidi, “Optical image encryption using input plane and Fourier plane random encoding,” Opt. Let. 20, 767–769 (1995).
U. Schnars and W. P. O. Jüptner, “Direct recording of holograms by a CCD target and numerical reconstruction,” Appl. Opt. 33, 179–181 (1994).
J. H. Bruninig, D. R. Herriott, J. E. Gallagher, D. P. Rosenfeld, A. D. White, and D. J. Brangaccio, “Digital Wavefront measuring interferometer for Testing Optical Surfaces and Lenses,” Appl. Opt. 13, 2693 (1974).
H. J. Caulfield, Handbook of Optical Holography, (Academic press, London, 1979).
N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding : Steganography and Watermarking - Attacks and Countermeasures (Advances in Information Security, Volume 1,Kluwer Academic2001).
J. W. Goodman, Introduction to Fourier Optics, (McGraw-Hill, New York, NY, 1996).
C. Hosinger and M. Rabbani, “Data Embedding using Phase Dispersion,” The International Conference on Information Technology: Coding and Computing (ITCC 2000), Las Vegas, Nev. 27–29 March (2000).
J. Schwider, “Advanced Evaluation Techniques in Interferometry,” in Progress in Optics, E. Wolf, ed (North Holland, Amesterdam) XXVIII, 271–359 (1990)
Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.
Alert me when this article is cited.
Click here to see a list of articles that cite this paper
Download Full Size | PPT Slide | PDF
Table 1. error when using a uniform quantizer
Table 2. Error when using only 25% of the hologram and a uniform quantizer
Equations on this page are rendered with MathJax. Learn more.
James Leger, Editor-in-Chief
error when using a uniform quantizer
Error when using only 25% of the hologram and a uniform quantizer