scispace - formally typeset
Search or ask a question
Author

Xueju Shen

Bio: Xueju Shen is an academic researcher. The author has contributed to research in topics: Encryption & Holography. The author has an hindex of 3, co-authored 4 publications receiving 47 citations.

Papers
More filters
Journal ArticleDOI
Dezhao Kong, Liangcai Cao1, Xueju Shen, Hao Zhang1, Guofan Jin1 
TL;DR: An encryption method based on interleaved computer-generated holograms (CGHs) displayed by a spatial light modulator (SLM) is demonstrated and may avoid the inherent silhouette problem and alleviate the precise alignment requirements of interference encryption.
Abstract: An encryption method based on interleaved computer-generated holograms (CGHs) displayed by a spatial light modulator (SLM) is demonstrated. Arbitrary decrypted complex optical wave fields are reconstructed in the rear focal plane of two phase-only holograms, generated from original image using a vector decomposition algorithm. Two CGHs are encoded into one hologram by interleaving the column of pixels, which optically combines the optical wave fields of two neighboring phase-only modulated pixels. The designed image encryption system may avoid the inherent silhouette problem and alleviate the precise alignment requirements of interference encryption. Video encryption and real-time dynamic decryption is demonstrated using one SLM.

30 citations

Journal ArticleDOI
Dezhao Kong1, Xueju Shen, Liangcai Cao1, Hao Zhang1, Song Zong1, Guofan Jin1 
TL;DR: In this article, a novel approach for encrypting three-dimensional (3-D) scene information hierarchically based on computer-generated holograms (CGHs) is proposed.

12 citations

Journal ArticleDOI
TL;DR: An advanced iterative phase retrieval algorithm is applied to perform a ciphertext-only attack on the fractional Fourier transform-based double random phase encryption system and can obtain encrypted fractional order and retrieve two random phase keys.
Abstract: An advanced iterative phase retrieval algorithm is applied to perform a ciphertext-only attack on the fractional Fourier transform-based double random phase encryption system. With the given complex amplitude of ciphertext and definite support of the object image, the original object image can be recovered by estimating the energy of support area in the recovered image. The encryption system can be attacked by analyzing the sensibility of fractional Fourier transform order keys and evaluating the energy of the object image support area. The proposed algorithm can obtain encrypted fractional order and retrieve two random phase keys. Numerical results demonstrate the efficacy of the proposed attacking method.

11 citations

Proceedings ArticleDOI
Dezhao Kong1, Liangcai Cao1, Xueju Shen, Hao Zhang1, Song Zong1, Guofan Jin 
24 Aug 2017
TL;DR: In this article, a holographic display method based on complex wavefront modulation using single spatial light modulator is proposed, which is achieved from complex wave front encoded by double phase hologram.
Abstract: A holographic display method based on complex wavefront modulation using single spatial light modulator is proposed. The holographic display is achieved from complex wavefront encoded by double phase hologram. The modulated beam by single phase-only spatial light modulator passes through a 4f optical system to synthesize the expected complex modulated wavefront on the output plane, with a low-pass filter in the Fourier plane. The performance of holographic display is also improved by complex wavefront modulation, compared with the holographic display based on phase-only wavefront modulation. The proposed encoding and display technique is theoretically demonstrated, as well as validated in numerical simulations.

2 citations


Cited by
More filters
Journal ArticleDOI
01 Oct 2019
TL;DR: In this paper, the authors reviewed the encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 from the viewpoint of an image cryptanalyst.
Abstract: This paper aims to review the encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 from the viewpoint of an image cryptanalyst. The most representative works among them are selected and classified according to their essential structures. Almost all image cryptanalysis works published in 2018 are surveyed due to their small number. The challenging problems on design and analysis of image encryption schemes are summarized to receive the attentions of both designers and attackers (cryptanalysts) of image encryption schemes, which may promote solving scenario-oriented image security problems with new technologies.

165 citations

Journal ArticleDOI
Chao Wu1, Ying Wang1, Ye Chen1, Jun Wang1, Qiong-Hua Wang2 
TL;DR: This method not only can achieve multiple-image encryption with a small amount of data, but also can prevent information disclosure and has high security because it can resist the phase-retrieval attack.

41 citations

Posted Content
TL;DR: The encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 are reviewed from the viewpoint of an image cryptanalyst.
Abstract: This paper aims to review the encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 from the viewpoint of an image cryptanalyst. The most representative works among them are selected and classified according to their essential structures. Almost all image cryptanalysis works published in 2018 are surveyed due to their small number. The challenging problems on design and analysis of image encryption schemes are summarized to receive the attentions of both designers and attackers (cryptanalysts) of image encryption schemes, which may promote solving scenario-oriented image security problems with new technologies.

37 citations

Journal ArticleDOI
TL;DR: The optimal quantization for both available and future SLM devices is suggested, and several critical CGH parameters, including resolution, zero-padding size, reconstruction distance, wavelength, random phase, pixel pitch, bit depth, phase modulation deviation, and filling factor are considered.
Abstract: Owing to the characteristics of existing spatial light modulators (SLMs), the computer-generated hologram (CGH) with continuous complex-amplitude is conventionally converted to a quantized amplitude-only or phase-only CGH in practical applications. The quantization of CGH significantly affects the holographic reconstruction quality. In this work, we evaluated the influence of the quantization for both amplitude and phase on the quality of holographic reconstructions by traversing method. Furthermore, we considered several critical CGH parameters, including resolution, zero-padding size, reconstruction distance, wavelength, random phase, pixel pitch, bit depth, phase modulation deviation, and filling factor. Based on evaluations, the optimal quantization for both available and future SLM devices is suggested.

29 citations

Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors proposed a visual-cryptographic image hiding method based on visual cryptography and volume grating optics, where the secret image is converted to the encrypted visual keys (VKs) according to the normal VC algorithm.
Abstract: In this paper, we propose a visual-cryptographic image hiding method based on visual cryptography (VC) and volume grating optics. The secret image is converted to the encrypted visual keys (VKs) according to the normal VC algorithm. Then the VKs are further embellished to the QR-code-like appearance and hidden as the holographic optical elements (HOEs), which are fabricated by the holographic exposure of photopolymer. In the decryption process, the fabricated HOE-VKs are illuminated with the laser beam. The reconstructed VKs are overlaid to extract the hidden information directly in the optical facility, without additional computation. Optical experiments verify that the VKs in HOE mode improves the system with high security and good robustness on the random noise attack. Besides, the volume grating nature also enlarges the system bandwidth by using the multiplexing technique. The proposed method may provide a promising potential for the practical image hiding systems.

27 citations