Saturday, 22 Feb, 2020




Review on Cryptography of Image Using Computer Generated Holography

Journal of Network and Information Security

Volume 7 Issue 1

Published: 2019
Author(s) Name: Warsha M. Choudhari and Shalini Kharkate | Author(s) Affiliation: Prof., Information Tech. Dept., Datta Meghe Inst. of Engg., Tech. & Research, Maharashtra, India.
Locked Subscribed Available for All


Holography is the process of capturing three dimensional images by recording patterns of light wave reflection. It is interference of two coherent light sources, one being scattered from an object and another reference light being sent directly into the holographic plate. This interference pattern is then used in a 3D holographic display to view the holographic representation of the object. This is done by passing the same reference light through the interference pattern fringe in the 3D display. Computer Generated Holography (CGH) is a simulation technique to generate the same interference pattern without the object being present. Usually this is done by taking an image or a 3D representation of the object and using numerical techniques to simulate the interference pattern of the light field. CGH has many applications and one of them is image encryption and decryption. In this paper compare traditional and advance hologram methods.

Keywords: CGH (Computer Generated Holography), Digital holographic microscopy, Holography, 3D Image.

View PDF

Refund policy | Privacy policy | Copyright Information | Contact Us | Feedback ©, All rights reserved