-
Figure 1. The schematic configuration of optical image watermarking based on OAM holography. (a) The watermark preprocessing process. (b) The watermark embedding system. (c) OAM-watermark hologram recovery system. (d) The optical reconstruction method.
-
Figure 2. The experimental decryption process: (a) the optical setup, (b) the experimental results with different key beam (Key1 = 0 and −2) and the scrambling time (Key2 = m and m – 1).
-
Figure 3. (a) The processes of adding the interference image. (b) The comparison of the captured results without and with the interfering image.
-
Figure 4. (a) The PSNR with different embedding levels (p), and the sub-watermark number (K). (b) Histograms of the original host image and different watermarked host images. (c) The correlation coefficient (CC) with different embedding levels.
-
Figure 5. The experimental results of different attack tests, including Gaussian noise, Poisson noise, salt-pepper noise, JPEG compression attacks, Gaussian low-pass filtering, cropping, and rotation.
-
Figure 6. Histogram and CC experimental results for embedding the cryptographic OAM hologram into different components.
Figure
6 ,Table
2 个