Next Article in Journal
Research on Leak Detection and Localization Algorithm for Oil and Gas Pipelines Using Wavelet Denoising Integrated with Long Short-Term Memory (LSTM)–Transformer Models
Previous Article in Journal
A Survey of the State of the Art in Monocular 3D Human Pose Estimation: Methods, Benchmarks, and Challenges
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Complementary Approach for Securing and Anti-Counterfeiting of Valuable Documents Based on Encryption of Computer-Generated Hologram

1
Laser Applications in Metrology, Photochemistry, and Agriculture Department, National Institute of Laser Enhanced Science, Cairo University, Giza 12613, Egypt
2
Central Administration for Counterfeiting and Forgery Research, Forensic Medicine Authority, Ministry of Justice, Cairo 11797, Egypt
3
Engineering Applications of Lasers Department, National Institute of Laser Enhanced Science, Cairo University, Giza 12613, Egypt
4
Dyeing, Printing and Auxiliaries Department, National Research Centre, Cairo 12622, Egypt
5
BIAS—Bremer Institut für Angewandte Strahltechnik, 28359 Bremen, Germany
6
MAPEX Center for Materials and Processes, and Faculty 01: Physics and Electrical Engineering, University of Bremen, 28359 Bremen, Germany
7
Physics Department, Faculty of Science, Aswan University, Aswan 81528, Egypt
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(8), 2410; https://doi.org/10.3390/s25082410
Submission received: 13 December 2024 / Revised: 25 March 2025 / Accepted: 8 April 2025 / Published: 10 April 2025
(This article belongs to the Section Sensing and Imaging)

Abstract

:
We present a novel approach for securing valuable documents using a complementary approach based on the encryption of computer-generated holograms (CGHs). The proposed approach utilizes the well-known iterative Fourier transform algorithm (IFTA) to generate a phase-only CGH for valuable digital and/or physical documents. The generated CGH is then secured by binary phase randomization, which is implemented using the symmetric encryption technique, exclusive OR (XOR). The reconstruction process for the calculated secured CGHs varied slightly depending on whether the documents were digital or physical. For digital documents, reconstruction was performed using a symmetric decryption key followed by an inverse Fourier transform (IFFT). On the other hand, the reconstruction of the physical document involved two additional processes: printing and scanning. To evaluate the quality of the digital reconstruction, the speckle signal-to-noise ratio (SSNR) was estimated for both printed grayscale and binary CGHs. The security analysis of the XOR-encrypted CGH was quantitatively evaluated to ensure the level of protection against various cryptographic attacks such as plaintext and brute-force attacks. The results revealed that the combination of phase CGHs and the XOR encryption/decryption provides robust cryptographic protection for valuable documents, benefiting document security and anti-counterfeiting.

1. Introduction

Valuable documents have security features that make them more difficult to copy, counterfeit, or alter. These documents are issued by government agencies, law enforcement, regulatory authorities, corporations, or financial institutions. The most common secured documents with security features are identity and travel documents such as driving licenses, national identity cards, passports, debit or credit cards, travel visas, and banknotes. Such documents are required in different applications to verify a person’s identity and credentials. However, the progress in image processing and printing technologies has made it easier to counterfeit and falsify documents. As a result, the identity documents would become illegitimate because anyone could forge their identity. These fake IDs are widely used and openly available on the global underground market, both online and physically. Criminals, including fraudsters and terrorists, can use them to enter an area covertly and carry out illegal activities without raising any red flags [1,2]. Therefore, the use of security techniques such as security threads, watermarks, cryptography, steganography, and electronic signatures is highly recommended for these valuable documents [3,4,5,6]. As part of the development of security procedures for valuable documents, digital security features including barcodes [7] have been introduced to combat counterfeiting. Barcodes can be represented in different forms, such as PDF417, DataMatrix, MaxiCode, Aztec, quick response (QR) code, etc. [8]. QR code [9] is a data representation technique that can be decoded by an optical scanner and a mobile application. However, the storage environment for printed paper with the QR code is not the same as the factory setting. Consequently, the code can become dirty, corrupt, or damaged, making the scanning process unreliable. These drawbacks show that the technology is not robust. Alternatively, holography is a widely used technology in document security based on the recording of the amplitude and phase of an object [10] in the form of a hologram. The creation of these holograms has been reported by Yaroslavskii and Merzlyakov [11], Dallas [12], and Lee [13]. The most widely used hologram for document security is an optically variable device (OVD). OVD is an iridescent or non-iridescent security feature that provides different information, such as color change or movement, that is affected by illumination and/or observation angle [14]. Concerning the state of the art, iridescent OVDs can be classified into two main categories: diffractive optically variable image devices (DOVIDs) and interference security image structures (ISISs) [15]. DOVIDs contain micro- or nano-structures in the form of diffractive gratings that produce optically variable effects such as dynamic chromatic, holographic, kinematic, and 2D or 3D images that are easy to recognize [16]. DOVIDs can also contain elements that are invisible to the naked human eye, such as micro printing, kinetic effects, micro text, or a variable laser-readable micro-image that is invisible under white light when magnified. The micro-image is known as the hidden image and is generated by incorporating a computer-generated hologram (CGH) into the DOVIDs [15]. Read-out of the additional CGH is done optically using coherent illumination. On the other hand, ISISs are based on thin-film structures, which leads to a color change upon tilting the document [17,18]. Thus, DOVID consists of adjacent fringes, whereas ISIS consists of one or more thin films. CGH, or digitally generated holographic interference patterns, is a technique that uses numerical approaches to mimic the actual processes behind the optical recording and reconstruction of a real hologram. Therefore, it represents a major improvement over classical holography [19]. According to the review in Ref. [20], this technique has been used to secure valuable documents in applications such as security printing and document authentication. Using a sophisticated amplitude that is undetectable to the human eye but readable under coherent light illumination, CGHs can encode images and digital data. Two types of holograms have been proposed for document security: photopolymer security holograms with integrated micro-CGHs [21] and printed holograms applied using thermal printing, laser ablation, and office printers [20]. For authentication, the micro-CGHs can include individualized encoded data. It is often possible to decode the printed CGH data using smartphone cameras based on numerical reconstruction techniques. The key advantages of CGHs for document security are their high level of security and their adaptability in encoding different types of data.
Previous studies [19,20,22,23] have used printed binary amplitude computer-generated holograms (CGHs). In holography, however, the phase distribution carries most of the information. Encoding the phase using binary amplitude is challenging because it introduces ambiguity, requiring a higher space–bandwidth product (SBP) to accurately represent the phase. This is particularly problematic in applications such as secure document authentication, where the SBP is inherently limited, restricting the performance of binary amplitude CGHs in faithfully encoding the information to be encrypted.
Image-encryption techniques have been proposed in the literature based on various methods. The utilization of chaotic systems in cryptography attracted the attention of a large number of researchers due to their sensitivity to initial conditions (butterfly effect), non-linearity, the fact that the initial parameters act as the encryption key, and unpredictability [24,25,26]. However, they are too complex to use because of their computational complexity, intensive memory requirements, and high sensitivity to key values, which can lead to decryption failure. Alternatively, the exclusive OR (XOR) encryption/decryption technique might be employed due to its simplicity and speed.
Therefore, in the current study, we aim to explore a novel approach for securing valuable digital and/or physical documents such as a driver’s license and the bio-data page of a passport. The proposed approach uses a binary phase-only CGH to overcome the drawbacks of using an amplitude hologram. In addition, the generated CGH is modified by modulating it with a random phase mask using the well-known XOR encryption/decryption technique to add a layer of protection. Thus, the proposed approach is achieved via hologram generation, XOR encryption/decryption processes, and reconstruction. The integration of hologram generation with XOR encryption/decryption provides robust cryptographic protection for valuable documents, a method that, to our knowledge, has not been used before. Unlike the purely cryptographic layer of chaotic methods, the integration of XOR with the CGH provides a hybrid security approach that combines cryptographic encryption with holographic phase encoding. This complementary approach ensures compatibility with standard printers/scanners without the need for specialized hardware. The proposed method and its evaluation are presented and discussed in the following sections.

2. Phase-Only Hologram Generation

CGHs encode arbitrary wavefields, amplitude, and phase information, using a computer to mathematically model the interference patterns obtained by superimposing the wavefield diffracted by an object and a known reference wave at the hologram plane. Based on numerical propagation between the object and hologram planes, the phase information computed at the hologram plane can be converted to a wavefield with an intensity that approximates the desired object when reconstructed. This allows encrypted document images, the intensity of the wavefield at the object plane, to be securely transmitted and retrieved using holographic techniques. Accurate numerical reconstruction algorithms are essential to authentically represent the details of the original input image. The flowchart in Figure 1 demonstrates the procedure used for calculating a phase-only CGH using the well-known IFTA (which refers to the Gerchberg–Saxton (G-S) algorithm) [27,28].
It should be noted that we chose the well-known G-S algorithm for CGH generation because it is a reliable and widely recognized method for encoding valuable information in holographic data. Despite being an established approach, the G-S algorithm remains highly effective due to its iterative nature and ease of implementation. Furthermore, its widespread use in similar contexts ensures that our results are reproducible and consistent with existing research in diffractive optics and holographic projection applications.
The IFTA approach uses the fast Fourier transform (FFT) and its inversion (IFFT) for forward and backward propagation between two planes, using the predefined intensities across these planes as constraints [11,29,30]. This inverse problem is then solved iteratively as follows, starting with a complex-valued object ( U 0 ( 0 ) ) , with an initial phase estimate ϕ 0 ( 0 ) = 0 and an amplitude A 0 = I , where I is its intensity constraint applied at the object plane, i.e., the information to encode as an image, which can be expressed as follows:
U 0 ( 0 ) = A 0 · exp i ϕ 0 ( 0 ) .
The diffracted field at the hologram plane ( U h ( n ) ) is estimated by propagating the object field, ( U 0 ( 0 ) ) given by Equation (1), using the F F T expressed by the operator ( F ) in the following:
U h ( n ) = F U 0 ( n ) .
At this plane, the second amplitude constraint is applied (i.e., assuming a plane wave illumination A h = 1 ) while maintaining the same phase ( ϕ h ( n ) ), which is estimated by dividing the complex function U h ( n ) by its amplitude | U h ( n ) | . The wavefield at the hologram plane can be written by modifying Equation (2) as follows:
U h ( n ) = A h · exp i ϕ h ( n ) .
Then, the back propagation to the object plane is performed by applying the IFFT expressed by the operator ( F 1 ) to Equation (3), resulting in the following:
U 0 ( n + 1 ) = F 1 U h ( n ) .
Thus, Equation (4) gives the wavefield at the object plane for the next iteration, i.e., n + 1 . Here, iteration n + 1 is started by reapplying the amplitude constraint (i.e., replacing the original object amplitude A 0 ) while keeping the same phase ( ϕ 0 ( n + 1 ) ) . The generated wavefield can be expressed in Equation (5) as follows:
U 0 ( n + 1 ) = A 0 · exp i ϕ 0 ( n + 1 ) .
The iteration procedure is repeated until no change in phase is observed or a predefined condition ( ϕ h ( n + 1 ) ϕ h ( n ) ϵ ) is satisfied.
In the current study, the CGHs were generated from grayscale images. This can be attributed to three reasons: (i) practical compatibility, (ii) computational efficiency, and (iii) standardization. (i) Practical compatibility: most laser printers and scanners are commonly optimized for monochrome/grayscale output, ensuring reliable binarization and reconstruction. (ii) Computational efficiency: grayscale CGHs reduce computational complexity by 3 × compared to RGB-based holograms, which require separate phase calculations for each color channel. (iii) Standardization: security features like MRZ text and signatures are typically monochrome in official documents, aligning with grayscale encoding. It should be noted that several propagation operators based on Fresnel and plane wave compensation can also be used [31,32]. In addition, the hologram itself could be modulated within the hologram generation step, employing spatial multiplexing, analogous to [33], to encode multiple pages of information in a single CGH. In the current study, the CGH generation and reconstruction processes were implemented using MATLAB R2021a for numerical simulations and PyCharm Professional 2023.2 for developing a user-friendly graphical interface. The generation process involves calculating the CGHs using IFTA, in addition to the XOR encryption for securing the calculated CGH. On the other hand, the reconstruction process includes the reconstruction of the calculated CGHs using inverse IFTA along with XOR decryption. It is worth mentioning that the elapsed time of generating and reconstructing the CGH is highly influenced by the specifications of the used central processing unit (CPU). In the current study, the calculation time required to generate the CGH after 100 iterations using CoreTM i5-3210M CPU @ 2.50 GHz with 4 GB RAM, operating system Windows 10 pro-64-bit, was 3.98 s, and the elapsed time for the XOR encryption was 0.20 s. On the other hand, the reconstruction time for CGH, including the XOR decryption step, was 1.55 s.

3. Results and Discussion

The proposed method for securing valuable documents covers both digital and physical formats. For both types, document security is achieved by generating a CGH and adding an extra layer of protection through randomization with a binary phase mask.
This randomization can be implemented using basic symmetric encryption techniques such as XOR. Although XOR is a basic encryption technique and may be vulnerable to attack, the use of a long randomized encryption key makes it able to deter this type of attack. To the best of our knowledge, the combination of CGH and XOR encryption/decryption offers a strong cryptographic protection method that has not been applied to valuable documents. To decrypt the secured CGH, one must first apply XOR decryption, followed by an IFFT.
The proposed approach for adding a layer of protection to binary CGH is based on integrating it with encryption and decryption using the XOR operation that is part of symmetric key encryption. This ensures that the same key used for encryption is also used for decryption, which is a simple and effective way of protecting image data. If we assume that the binary image, represented as I [ m , n ] , is then XORed with a generated binary key K [ m , n ] of the same dimensions, m and n, then the encryption is mathematically described as follows:
I e n c [ m , n ] = I [ m , n ] K [ m , n ] .
In Equation (6), I e n c [ n , m ] is the encrypted binary CGH and ⊕ refers to the XOR operation applied to each pixel according to the basics of the XOR operation. Decryption is then performed by applying the XOR decryption algorithm, this time between the encrypted CGH image I e n c [ m , n ] and the original key K [ m , n ] as the decrypted key. This process is described as follows:
I d e c [ m , n ] = I e n c [ m , n ] K [ m , n ] .
The operation given in Equation (7) restores the optimal distribution to the original encrypted binary CGH, I ( x , y ) . The decrypted CGH image is then stored and can be visually compared to the original image to confirm the accuracy of the process. This method is particularly valuable for binary images such as CGH due to its simplicity and ability to effectively secure data with minimal computational overhead.

3.1. Secured CGH of a Digital Document

For validating the proposed method, a template of a designed digital driving license was tested. A digital driving license is one of the commonly used documents to authenticate the identity of a license holder [34].

3.1.1. CGH Generation of Digital Documents

The simulation of replacing the commonly used QR code with a CGH in a designed digital driver’s license is shown in Figure 2. As shown in Figure 2a, the QR code is used as a security feature. However, reading the dynamic QR code requires an internet connection for authentication. Therefore, instead of the QR code, CGH can be used to secure the extracted region of interest in Figure 2b, as depicted in Figure 2c. The CGH is computed for the full data image shown in Figure 2b.
The QR code is used to store specific information from the digital document, i.e., text and/or numbers, but it cannot store an image due to its limited data storage. In contrast, CGH can store text, numbers, and the full image of a document. The authentication process of the driving license containing a dynamic QR code requires an internet connection. The advantage of using CGH instead of the QR code is its ability to store a vast bundle of data (i.e., full image storage) and the verification of identity without the need for a database connection to retrieve and compare the data as with the QR code. Additionally, the CGH-encoded data can be retrieved offline.

3.1.2. XOR Encryption

In addition, an extra layer of protection was added to the binary computed CGH using one of the basic symmetric cryptographic XOR techniques [35]. It is worth noting that although the XOR method is a basic symmetric cryptographic technique, it was chosen for its practicality and efficiency in implementing an additional layer of protection for the computed CGH. This method has several advantages that make it superior for securing the CGH. It can be used for real-time document verification with minimal computational cost. In addition, the use of a long, randomly generated encryption key enhances security by making the encryption difficult to break. Combined with the CGH, XOR provides an effective layer of protection for valuable documents against unauthorized access.
Because XOR encryption works with binary data, it is particularly useful for processing digital images commonly encoded in binary format. In this method, each binary bit of the matrix of the binary CGH matrix is XORed with a corresponding bit of a binary key. By comparing each pair of bits, the XOR process creates a ciphertext that hides the original image data (encryption process). The XOR operation on the ciphertext is performed with the same unique key during the decryption process (reserving the encryption process), as demonstrated in Table 1, revealing the original CGH image. Thus, the XOR encryption/decryption process is easy to use, computationally efficient, and provides an additional protection layer to the computed CGH.
There are several advantages of using XOR encryption to secure CGH images. The confidentiality of CGH images is enhanced by XOR encryption, which provides a quick/fast and easy way to obfuscate image data. Furthermore, because XOR operations are computationally efficient, they can effectively encrypt large amounts of image data without acquiring significant processing overhead. Similarly, XOR encryption is easy to integrate and deploy in current systems or software used for CGH generation processing. Despite its simplicity, XOR encryption can offer a basic level of security for CGH images, particularly if a suitably long, strong, and randomly generated encryption key is used. It should be noted that integrating the encryption key into CGH does not change the amount of storage required, as the result of this process is also a 1-bit image with the same resolution.

3.1.3. Security Analysis of XOR-Encrypted CGH

To assess the security strength against cryptographic attacks, we used entropy analysis, measurements of horizontal correlation, the number of pixels change rate (NPCR), and unified average changing intensity (UACI) [36], as shown in Table 2.

Entropy Analysis

The measurement of cryptographic image security against attacks relies on entropy. The entropy is defined as how randomly distributed the pixel values are in an encrypted CGH image, where higher entropy indicates better randomization of the encoded data, making it is difficult for attackers to identify or predict the statistical pattern required to retrieve the original information. This analysis was applied to two different encrypted images (image 1 and image 2), as shown in Table 2. Both images reveal high entropy values of (1). The results obtained ensure robust protection against statistical attacks.

Correlation Coefficient Analysis

The relationships between pixels were assessed using the correlation coefficient. When the images lack encryption, the structural elements of pixel arrays create strong links between adjacent pixels. In contrast, during the encryption process, the relationship between the pixels is greatly reduced. As illustrated in Table 2, a low correlation of 0.0012 and 0.0010 was obtained between the original image and the encrypted two images (i.e., image 1 and image 2), which ensures difficulty for attackers trying to retrieve the original information.

NPCR and UACI Analysis

Evaluation of the sensitivity of the encryption process to small changes in the plaintext image depends on the NPCR and UACI metrics depicted in Table 2. The NPCR determines the proportion of pixel change in the corresponding encrypted images from nearly identical original images. UACI analyses average intensity differences. A perfect encryption system of a grayscale image achieves an NPCR threshold of 99 % , meaning that each input pixel responds differently to small adjustments in the original image. For binary CGH images, an XOR encryption process produces an expected NPCR rate of 50 % because pixels exist in a two-state system between 0 and 1. The NPCR for the two encrypted images (i.e., image 1 and image 2) is 50.0338 % , demonstrating the correct functioning of the diffusion process. A UACI value of 50.0338 % shows that minimal changes in plaintext will produce substantially different ciphertext values.

Security Implications Against Brute-Force Attacks

Brute-force attack is a hacking technique that involves repeatedly trying different combinations of encryption keys until the correct one can be obtained. Although our proposed algorithm was based on XOR encryption, which is easy to implement and has poor cryptographic protection, we used two mechanisms to make it more resistant to such attacks. Such mechanisms involve the addition of salt to the master key and spatial shuffling. The master security key was generated from Password-Based Key Derivation Function 2 (PBKDF2) using Secure Hash Algorithm 256-bit that performs 1000 iterations for generating 128-bit cryptographic salt. For the CGH with a size of M × N pixels, the spatial shuffling generates M × N possible shuffles that combine with the 256-bit key space and contribute 2 256 potential combinations. Let us assume that the attacker has a supercomputer that can check 10 18 keys per second, which is optimistic. Therefore, the attacker will need 3.7 × 10 51 years to complete the decryption process. These two procedures strengthen the security against brute-force attacks, making it extremely challenging for attackers to simultaneously break both the generated salt and the spatial shuffling of the XOR-encrypted CGH.

3.1.4. CGH Decryption and Reconstruction of Digital Documents

Before starting the reconstruction process of the encrypted CGH image, the XOR decryption key should be applied to decrypt the encrypted CGH image. This process is called decryption. Based on Equation (7), the XOR decryption step performs XOR decryption between the secured binary CGH and the original encryption key. Hence, the original binary CGH will be retrieved. Consequently, another process was applied, which is called reconstruction. This process involves applying IFFT to the binary decrypted CGH to obtain the original image of the valuable document. Both processes, i.e., decryption and reconstruction, are demonstrated in Figure 3. The results of the reconstruction show that the encoded license information can only be fully retrieved with good quality if the correct encryption key is used to decrypt the secured CGH.

3.2. Secured CGH of a Physical Document

On the other hand, the process of securing a physical document involves more steps, as shown in Figure 4.

3.2.1. CGH Generation of Physical Documents

The calculated phase-only CGH using IFTA for securing a valuable document is obtained as a grayscale image with values ranging from 0 to 255. To overcome the resolution limitations of the used printers and the limited pixel size, the CGH is binarized using Otsu’s method [37], resulting in a matrix of 0 and 1 values. To increase the security of the binarized CGH, a protection step is introduced by randomizing it using the XOR encryption key. The encrypted CGH is then printed on secured or standard office paper. Once printed, the secured CGH can be captured with a smartphone camera or scanned with a scanner, then binarized. The final step in securing the valuable physical document is to numerically reconstruct the image. This process requires the application of the XOR decryption key with the original encryption key, followed by an IFFT to obtain the best approximation of the original input image. Please note that when configuring the printing process, it is essential to ensure that there is no scaling or difference in resolution between the printed and scanned images of the secured CGH.
We examined safeguarding the bio-data page information of a passport, as delineated by the standards of the International Civil Aviation Organization (ICAO). This is done by extracting specific data fields from the passport image, such as the passport number, expiration date, passport holder image, signature, or name of the passport holder. Additionally, the bio-data page of the passport and/or the entire image of the machine-readable zone (MRZ) can be captured and encrypted as CGH.
The process of generating CGHs for selected parts of the bio-data page of a designed passport template is shown in Figure 5. The chosen parts used for calculating CGHs are the personal photograph, the signature of the passport holder, and the MRZ. The CGH of each selected part of the passport (shown in Figure 5a) was calculated using the IFTA. The CGH can be generated for the entire bio-data page, as depicted in Figure 5b.

3.2.2. Printing of the CGH

Grayscale CGH

A monochrome laser printer was used to print different sizes of generated grayscale CGHs. Grayscale CGH is an image represented in 8 bits, which means that it uses 256 ( 2 8 ) grayscale values ranging from 0 (corresponding to black color) to 255 (corresponding to white color). The potential problem with printed grayscale CGH images is the low contrast ratio. This arises from the printer’s difficulty in achieving sharp distinctions between different grayscale levels, resulting in a washed-out or unclear appearance. This also makes it sensitive to noise during scanning, such as dust and uneven lighting. The noise during the scanning process arises from dust particles that may settle on the document or scanner; they obscure small portions of the printed CGH. This results in the introduction of unintended “black spots” or “voids” in the scanned image, which distort the reconstruction process. Additionally, uneven lighting while using a scanner or a smart phone camera causes the tested document to reflect too much light; this introduces variations in pixel intensities that are unrelated to the actual hologram pattern, effectively adding random noise to the CGH. This in turn leads to poor numerical reconstruction of these CGHs. This problem is demonstrated in Section 3.3 showing the degradation of the reconstructed image.
Therefore, to overcome these drawbacks, the CGH should be converted into a binary one during the computation process.

Binarized CGH

Binarization is performed during the CGH calculation. This was achieved using the Otsu threshold technique [38,39]. This method is an automatic image thresholding technique in which the histogram of the grayscale CGH is calculated. This is then iterated for all threshold values from 0 to 255. For each threshold, the histogram was divided into two classes of pixels: pixels with intensities below the selected threshold value and pixels above the selected threshold. Hence, the variance between the two classes should be estimated for each threshold. The maximum variance between the two classes is chosen as the appropriate value to obtain the best separation between the two classes. Finally, based on the selected threshold value, the pixels below the threshold are set to 0 (black), and the pixels above the threshold value are set to 1 (white). A binarized phase-only CGH offers an advantage over a grayscale one due to its higher contrast ratio. This is because laser printers use a laser to selectively charge the drum, enabling toner to adhere only to the exposed areas through charge neutralization [40]. The difference between the presence and absence of toner on the surface of the drum is more pronounced than the thin variations in grayscale intensity. The higher the contrast, the sharper the image, and this affects the scanning processing of printed images when illuminated during the scanning process. The scanning process, based on light, triggers the document, then the reflected light indicates the presence or absence of toner on the surface of the paper, which is easier to detect in binary images than in grayscale images.
The binarization process reduces the storage space of the 8-bit CGH to one-eighth, which could be an advantage. However, it also reduces the bandwidth product of the gray CGH to one-eighth [41], introducing quantization errors. These errors appear as noise in the background and reduce the contrast of the reconstructed encoded information. In addition, the quality of the holographic reconstruction is affected by the reduction of the bandwidth product by one-eighth due to binarization [42]. However, we mitigated this degradation by applying a low-pass filter to suppress these artifacts and to improve the visual quality in terms of contrast and SNR of the reconstruction, similar to [43,44]. Despite these trade-offs, binarization simplifies the encryption process, making it more efficient and secure. Moreover, it enhances compatibility with the printing and imaging stages, allowing for seamless integration into document security.
On the other hand, conversion of the grayscale image to a binary image reduces the speckle noise, which is a common error that can occur during the reconstruction of the CGH, resulting in a cleaner and more consistent reconstructed image. Despite the advantages of binarization, there is a serious drawback, which is the formation of double-overlapped images during reconstruction. To overcome this problem, the CGH generation code has been modified. The modification can be made in one of two ways to overcome this obstacle. First, the modification of CGH during the generation process is a linear phase, i.e., a ramp. Second, a zero-padding image is created to become the base of the input image.

3.2.3. Scanning of the Printed CGH

The printed CGHs were scanned using two different methods, i.e., a mobile phone camera and a scanner. The camera of a Xiaomi Poco X3 NFC (Xiaomi, Beijing, China) smartphone with specifications of Android 12, MIUI 14.0.2, 64 MP, f/1.9, (wide), 1 / 1 . 73 , 0.8 μ m, PDAF, 13 MP, f/2.2, 119 ° (ultrawide), 1.0 μ m, 2 MP, f/2.4, (macro), 2 MP, f/2.4, (depth), dual-LED flash, HDR, and panorama was used to capture the printed CGHs. Each CGH was captured with different modes: photo AI, original document, black and white document, and enhanced document. It should be noted that the images captured by the mobile phone in these different modes had a bit depth of 24 bits and were represented as colored images (RGB). On the other hand, an optical scanner model HP ScanJet Pro 2500 f1 (HP, Beijing, China) accurately captures text from documents for easy editing with HP Scan and I.R.I.S. Readiris™ Pro OCR software (HP, China) producing sharp, true-to-life scans of documents, graphics, and photos at up to 1200 dpi resolution. It has been used to scan printed CGHs on paper. The scanning process can be in either color or monochrome modes. The scanned image produces a bit depth of 8 and 24 bits in the color mode. In the monochrome mode, the bit depth is 1 bit. Therefore, in our case, it was preferable to use the monochrome mode rather than the color mode. This is because the image captured with the monochrome mode is a 1-bit binary image, so it does not need to be re-binarized after capture but is directly subjected to reconstruction. However, images scanned using the color mode and those captured by a smartphone camera must be binarized before the numerical reconstruction to remove noise for better reconstruction.

3.2.4. CGH Reconstruction of Physical Documents

An essential step after capturing the CGH image of a physical document, either with a mobile camera or a scanner operating in color mode, is the binarization process. Binarization is the process of converting the captured or scanned images into black and white pixels, removing background variations and irregularities in lighting. This, in turn, makes it easier to distinguish between text or features of interest and background. As a result, the quality of the numerical reconstruction of the physical documents is improved. The flowchart of the CGH reconstruction of the physical documents is shown in Figure 6. It is worth mentioning that the captured 1-bit image did not need to be binarized because its pixels already had values of (0,1). In addition, the MRZ intensity reconstruction is modulated with an intensity envelope function, i.e., the center is brighter than the image sides, derived from the Fourier transform of a window function. Finally, the reconstruction is modulated with a sinc function, which is used as described in [45] because of the limited pixel size.
One of the most common document security features used worldwide is the smart chip. The smart chip is typically embedded within the cover or one of the inner pages of biometric passports. It contains the holder’s biometric data, such as fingerprints, facial recognition, and iris patterns, along with other identifying information, and it plays a crucial role in authentication during border control. Smart chips are often difficult to access, but in cases of forgery, fraudsters may attempt to tamper with or physically destroy the chip to prevent electronic verification. However, smart chips are relatively expensive to produce and integrate into documents.
Alternatively, CGH offers the storage of photos, text, and numbers like a smart chip but at a lower cost, and they can be accessed offline. Furthermore, it can be reconstructed even if part of it is cut off. Therefore, CGH can be used as an effective tool in place of a smart chip.

3.3. Factors Affecting the Quality of the Reconstruction

The quality of the digital reconstruction of a physical document was evaluated based on the printing resolution and the size of the printed CGH. First, we tested the quality of the reconstruction of printed grayscale CGH with a printing resolution of 600 dpi. As mentioned in “Section Grayscale CGH”, the reconstruction quality of the printed grayscale CGH is quite low, as shown in Figure 7. Then, we tested the quality of the printed binary CGHs.
To achieve this, the computed CGHs were printed on white paper at two resolutions (300 dpi and 600 dpi), and each resolution was scaled to different sizes (1 inch, 2 inches, and 3 inches). The effect of changing the printing resolution and the size of the CGH is shown in Figure 7. The quality of the numerical reconstruction for each case was assessed quantitatively by estimating the speckle signal-to-noise ratio (SSNR). The SSNR is defined as the ratio of the standard deviation to the mean pixel intensity within a region of interest. It is often used as a measure of the speckle noise level relative to the signal strength within that region. A higher SSNR indicates a stronger signal relative to the noise. Figure 8 shows the estimated SSNR for the two printing resolutions (300 dpi and 600 dpi) with different sizes (1 inch, 2 inches, and 3 inches). The results show that the reconstruction of the grayscale CGH that had a size of 3 inches (600 dpi) gave the worst SSNR (0.3469), while the reconstruction of the binary CGH with a resolution of 600 dpi and a size of 3 inches yielded the best SSNR (0.7021).
This indicates that the recommended criteria for obtaining adequate reconstruction quality is that the binary form of CGH should be used for printing and scanning, with a size starting from 2 inches and a resolution of 600 dpi. This proves that a direct relationship exists between the printing size, resolution, and form of the CGH image and the quality of the numerical reconstruction of the CGH.

4. Conclusions

A new CGH-based approach for securing valuable physical and digital documents has been proposed. The method uses IFTA integrated with the XOR encryption process to generate a phase-only CGH for a document of interest. The obtained grayscale CGH was converted to a binary one to evaluate the quality of digital reconstruction of both grayscale and binary forms in terms of SSNR. The reconstruction process of the calculated CGH was performed via IFFT followed by XOR decryption. The results show that the binary CGH has a better reconstruction quality than the grayscale one. In addition, the effect of changing the printing size and the resolution of the printed CGH was investigated, showing a significant improvement in reconstruction results with increasing printed hologram size. Moreover, the security strength against cryptographic attacks was evaluated using entropy, horizontal correlation, NPCR, and UACI, revealing robust protection against brute-force attacks. In conclusion, our proposed method provides a practical and reliable solution for the security of valuable documents. This overcomes the limitations of other storage methods like QR codes. The integration of XOR encryption and decryption processes with the calculated CGH enhances data confidentiality and integrity. Furthermore, our approach is cost-effective and can be implemented using commonly available devices such as office laser printers, smartphones, and scanners, eliminating the need for specialized holographic equipment. This accessibility makes CGH-based security features more widely accepted, enabling various entities such as corporations, individuals, governments, and organizations to enhance the security of their important documents. Reducing the risks associated with counterfeiting, forgery, and unauthorized access ultimately contributes to the achievement of the SDGs.

Author Contributions

Conceptualization, Z.E.A., R.M.A. and M.A.; data curation, Z.E.A. and R.M.A.; investigation, Y.A.A., M.A. and C.F.; methodology, M.A. and C.F.; validation, Z.E.A., M.A. and C.F.; visualization, Z.E.A., R.M.A. and M.A.; formal analysis, M.A., C.F. and R.B.B.; writing—original draft, Z.E.A., R.M.A. and M.A.; writing—review and editing, M.A., C.F. and R.B.B.; project administration, M.A.; funding acquisition, T.A.K., M.A. and R.B.B.; supervision, R.M.A., Y.A.A., T.A.K. and M.A. All authors have read and agreed to the submitted version of the manuscript.

Funding

This work was funded by the Deutsche Forschungsgemeinschaft (DFG) within the project “Securing valuable documents using computer generated holograms printed with photochromic inks” (Secret-CGH, project no. 536608072).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors upon request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. UK Finance, Fraud the Facts 2019. The Definitive Overview of Payment Industry Fraud. Available online: https://www.ukfinance.org.uk/system/files/Fraud%20The%20Facts%202019%20-%20FINAL%20ONLINE.pdf (accessed on 7 April 2025).
  2. Rudner, M. Misuse of passports: Identity fraud, the propensity to travel, and international terrorism. Stud. Confl. Terror. 2008, 31, 95–110. [Google Scholar] [CrossRef]
  3. Shin, F.Y. Digital Watermarking and Steganography: Fundamentals and Techniques, 2nd ed.; CRC Press: Boca Raton, FL, USA, 2017. [Google Scholar] [CrossRef]
  4. Frattolillo, F. Watermarking protocols: Problems, challenges and a possible solution. Comput. J. 2015, 58, 944–960. [Google Scholar] [CrossRef]
  5. Petitcolas, F.A.; Katzenbeisser, S. Information Hiding Techniques for Steganography and Digital Watermarking (Artech House Computer Security Series); Artech House: Norwood, MA, USA, 2000. [Google Scholar]
  6. Desai, H.V. Steganography, cryptography, watermarking: A comparitive study. J. Glob. Res. Comput. Sci. 2012, 3, 33–35. [Google Scholar]
  7. Garg, P.; Chhabra, S.; Gupta, G.; Srivastava, V.; Gupta, G. Analysis of Document Security Features. In Proceedings of the IFIP International Conference on Digital Forensics, Arlington, VR, USA, 30–31 January 2023; Springer: Berlin/Heidelberg, Germany, 2023; pp. 143–159. [Google Scholar]
  8. Wu, W.; Liu, H.; Yuan, J.; Zhang, Z.; Wang, L.; Dong, S.; Hao, J. Nanoemulsion fluorescent inks for anti-counterfeiting encryption with dual-mode, full-color, and long-term stability. Chem. Commun. 2021, 57, 4894–4897. [Google Scholar] [CrossRef]
  9. Lewis, O.; Thorpe, S. Authenticating motor insurance documents using QR codes. In Proceedings of the 2019 SoutheastCon, Huntsville, AL, USA, 11–14 April 2019; pp. 1–7. [Google Scholar]
  10. Lim, K.T.; Liu, H.; Liu, Y.; Yang, J.K. Holographic colour prints for enhanced optical security by combined phase and amplitude control. Nat. Commun. 2019, 10, 25. [Google Scholar] [CrossRef]
  11. Yaroslavsky, L.; Astola, J. Introduction to Digital Holography. In Digital Signal Processing in Experimental Research; Bentham E-Book Series; Bentham Sciences Publishers: Sharjah, United Arab Emirates, 2009. [Google Scholar]
  12. Dallas, W.J. Computer-generated holograms. In Digital Holography and Three-Dimensional Display: Principles and Applications; Springer: Boston, MA, USA, 2006; pp. 1–49. [Google Scholar]
  13. Lee, W.H. Holographic optical head for compact disk applications. Opt. Eng. 1989, 28, 650–653. [Google Scholar] [CrossRef]
  14. van Renesse, R.L. Ordering the order: A survey of optical document security features. In Proceedings of the Practical Holography IX, SPIE, San Jose, CA, USA, 5–10 February 1995; Volume 2406, pp. 268–275. [Google Scholar]
  15. Van Renesse, R.L.; Fournier, J. A review of holograms and other microstructures as security features. In The First 50 Years Springer Series in Optical Sciences; Springer Series in Optical Sciences; Springer: Berlin/Heidelberg, Germany, 2003; Volume 78. [Google Scholar]
  16. Stole, S.; Soukup, D.; Huber-Mörk, R. Invariant characterization of dovid security features using a photometric descriptor. In Proceedings of the 2015 IEEE International Conference on Image Processing (ICIP), Quebec City, QC, Canada, 27–30 September 2015; pp. 3422–3426. [Google Scholar]
  17. Van Renesse, R.L. Optical Document Security; Artech House Publishers: Norwood, MA, USA, 2005. [Google Scholar]
  18. Bullema, J.E.; van Krieken, A.H.; van den Hurk, M.; Meuwissen, M.; Schuurman, A. Direct-write method to create DOVIDs in metal surfaces. In Proceedings of the Optical Security and Counterfeit Deterrence Techniques IV, SPIE, San Jose, CA, USA, 19–25 January 2002; Volume 4677, pp. 175–181. [Google Scholar]
  19. Miyamoto, O.; Yamaguchi, T.; Yoshikawa, H. The volume hologram printer to record the wavefront of a 3D object. In Proceedings of the Practical Holography XXVI: Materials and Applications, SPIE, San Francisco, CA, USA, 21–26 January 2012; Volume 8281, pp. 153–162. [Google Scholar]
  20. Zlokazov, E.Y.; Kolyuchkin, V.V.; Lushnikov, D.S.; Smirnov, A.V. Computer-Generated Holograms Application in Security Printing. Appl. Sci. 2022, 12, 3289. [Google Scholar] [CrossRef]
  21. Trentler, T.; Ihas, B.; Cole, M.; Askham, F.; Schnoes, M.; Quirin, S.; Michaels, D.; Carter, J.; Wilson, W.; Hill, A.; et al. Blue-sensitive rewriteable holographic media. In Proceedings of the Optical Data Storage 2004, SPIE, Monterey, CA, USA, 18–21 April 2004; Volume 5380, pp. 439–447. [Google Scholar]
  22. Nishii, W.; Matsushima, K. A wavefront printer using phase-only spatial light modulator for producing computer-generated volume holograms. In Proceedings of the Practical Holography XXVIII: Materials and Applications, SPIE, San Francisco, MA, USA, 1–6 February 2014; Volume 9006, pp. 323–330. [Google Scholar]
  23. Zamkotsian, F.; Pariani, G.; Lanzoni, P.; Oggioni, L.; Bertarelli, C.; Bianco, A. New Fourier CGH coding using DMD generated masks. In Proceedings of the Emerging Digital Micromirror Device Based Systems and Applications XII, SPIE, San Francisco, CA, USA, 1–6 February 2020; Volume 11294, pp. 59–71. [Google Scholar]
  24. Lian, S.; Sun, J.; Wang, Z. Security analysis of a chaos-based image encryption algorithm. Phys. A Stat. Mech. Its Appl. 2005, 351, 645–661. [Google Scholar] [CrossRef]
  25. Essaid, M.; Akharraz, I.; Saaidi, A.; Mouhib, A. Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps. J. Inf. Secur. Appl. 2019, 47, 173–187. [Google Scholar] [CrossRef]
  26. Song, W.; Fu, C.; Zheng, Y.; Zhang, Y.; Chen, J.; Wang, P. Batch image encryption using cross image permutation and diffusion. J. Inf. Secur. Appl. 2024, 80, 103686. [Google Scholar] [CrossRef]
  27. Gerchberg, R.; Saxton, W. A practical algorithm for the determination of phase from image and diffraction plane pictures. SPIE Milest. Ser. MS 1994, 94, 646. [Google Scholar]
  28. Abdelazeem, R.M.; Agour, M. Color holographic visualization of an abnormal retina: A training guide. In Proceedings of the 2022 4th Novel Intelligent and Leading Emerging Sciences Conference (NILES), Giza, Egypt, 22–24 October 2022; pp. 186–189. [Google Scholar]
  29. Poon, T.C.; Liu, J.P. Introduction to Modern Digital Holography: With MATLAB; Cambridge University Press: Cambridge, UK, 2014. [Google Scholar]
  30. Abdelazeem, R.M.; Ghareab Abdelsalam Ibrahim, D. Discrimination between normal and cancer white blood cells using holographic projection technique. PLoS ONE 2022, 17, e0276239. [Google Scholar] [CrossRef] [PubMed]
  31. Yaras, F.; Kovachev, M.; Ilieva, R.; Agour, M.; Onural, L. Holographic reconstructions using phase-only spatial light modulators. In Proceedings of the 2008 3DTV Conference: The True Vision-Capture, Transmission and Display of 3D Video, Istanbul, Turkey, 28–30 May 2008; pp. PD-1–PD-4. [Google Scholar]
  32. Migukin, A.; Agour, M.; Katkovnik, V. Phase retrieval in 4f optical system: Background compensation and sparse regularization of object with binary amplitude. Appl. Opt. 2013, 52, A269–A280. [Google Scholar] [CrossRef] [PubMed]
  33. Agour, M.; Falldorf, C.; Bergmann, R.B. Spatial multiplexing and autofocus in holographic contouring for inspection of micro-parts. Opt. Express 2018, 26, 28576–28588. [Google Scholar] [CrossRef]
  34. Thales Group. Digital Documents. Available online: https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/driving-licence/digital-driver-license (accessed on 20 August 2024).
  35. XOR Encryption. XOR Cipher. Available online: https://www.geeksforgeeks.org/xor-cipher/ (accessed on 20 August 2024).
  36. Alghamdi, Y.; Munir, A.; Ahmad, J. A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution. Entropy 2022, 24, 1344. [Google Scholar] [CrossRef]
  37. Ostu, N. A threshold selection method from gray-level histograms. IEEE Trans. SMC 1979, 9, 62. [Google Scholar]
  38. Liu, D.; Yu, J. Otsu method and K-means. In Proceedings of the 2009 Ninth International Conference on Hybrid Intelligent Systems, Shenyang, China, 12–14 August 2009; Volume 1, pp. 344–349. [Google Scholar]
  39. Goh, T.Y.; Basah, S.N.; Yazid, H.; Safar, M.J.A.; Saad, F.S.A. Performance analysis of image thresholding: Otsu technique. Measurement 2018, 114, 298–307. [Google Scholar] [CrossRef]
  40. Ahmed, Z.E.; Abdelhamid, M.; Abdel-Salam, Z.A.; Palleschi, V.; Abdel-Harith, M. Laser-induced breakdown spectroscopy and chemometric analysis of black toners for forensic applications. J. Chemom. 2021, 35, e3334. [Google Scholar] [CrossRef]
  41. Lee, B.; Kim, D.; Lee, S.; Chen, C.; Lee, B. High-contrast, speckle-free, true 3D holography via binary CGH optimization. Sci. Rep. 2022, 12, 2811. [Google Scholar] [CrossRef]
  42. Masuda, K.; Saita, Y.; Toritani, R.; Xia, P.; Nitta, K.; Matoba, O. Improvement of image quality of 3D display by using optimized binary phase modulation and intensity accumulation. J. Disp. Technol. 2016, 12, 472–477. [Google Scholar] [CrossRef]
  43. Chen, W. Computer-generated hologram using binary phase with an aperture. Appl. Opt. 2017, 56, 9126–9131. [Google Scholar] [CrossRef] [PubMed]
  44. Yoneda, N.; Saita, Y.; Nomura, T. Binary computer-generated-hologram-based holographic data storage. Appl. Opt. 2019, 58, 3083–3090. [Google Scholar] [CrossRef] [PubMed]
  45. Falldorf, C.; Agour, M.; von Kopylow, C.; Bergmann, R.B. Design of an optical system for phase retrieval based on a spatial light modulator. AIP Conf. Proc. 2010, 1236, 259–264. [Google Scholar]
Figure 1. Schematic flowchart for generating a phase-only CGH using IFTA. Note that the red boxes correspond to operations performed at the object plane, while the blue boxes correspond to operations performed at the hologram plane.
Figure 1. Schematic flowchart for generating a phase-only CGH using IFTA. Note that the red boxes correspond to operations performed at the object plane, while the blue boxes correspond to operations performed at the hologram plane.
Sensors 25 02410 g001
Figure 2. (a) A designed template of a digital driver’s license with a QR code and size of 1730 × 1060 pixels. (b) The driver’s license after removing the QR code and (c) replacing the QR code with the CGH of the image in (b). Note that the actual size of the CGH image in (c) is 1730 × 1060 pixels.
Figure 2. (a) A designed template of a digital driver’s license with a QR code and size of 1730 × 1060 pixels. (b) The driver’s license after removing the QR code and (c) replacing the QR code with the CGH of the image in (b). Note that the actual size of the CGH image in (c) is 1730 × 1060 pixels.
Sensors 25 02410 g002
Figure 3. (a) The reconstruction process of digital driver’s license CGH without applying the decryption process and (b) the decryption process followed by the reconstruction process. Note that in (a), the reconstruction does not provide any information about the encoded license, while in (b), one can retrieve all encoded license information. It is noted that the size of the driver’s license and CGH images is 1730 × 1060 pixels.
Figure 3. (a) The reconstruction process of digital driver’s license CGH without applying the decryption process and (b) the decryption process followed by the reconstruction process. Note that in (a), the reconstruction does not provide any information about the encoded license, while in (b), one can retrieve all encoded license information. It is noted that the size of the driver’s license and CGH images is 1730 × 1060 pixels.
Sensors 25 02410 g003
Figure 4. Flowchart of the procedure of securing valuable physical documents using the combination of CGH and XOR encryption/decryption.
Figure 4. Flowchart of the procedure of securing valuable physical documents using the combination of CGH and XOR encryption/decryption.
Sensors 25 02410 g004
Figure 5. (a) A designed passport bio-data page with a size of 1270 × 1870 pixels and selected regions of interest to calculate their CGHs. (b) The CGH of the full bio-data page with a size of 1270 × 1870 pixels.
Figure 5. (a) A designed passport bio-data page with a size of 1270 × 1870 pixels and selected regions of interest to calculate their CGHs. (b) The CGH of the full bio-data page with a size of 1270 × 1870 pixels.
Sensors 25 02410 g005
Figure 6. The procedure of generating and reconstructing the MRZ image of a designed passport bio-data page of a physical document. Note that the MRZ image is resized to 200 × 600 pixels before CGH generation, the actual size of the printed CGH is 1 × 4 inches (25 mm × 100 mm) (600 dpi), and the printed CGH is scanned by a 600 dpi scanner.
Figure 6. The procedure of generating and reconstructing the MRZ image of a designed passport bio-data page of a physical document. Note that the MRZ image is resized to 200 × 600 pixels before CGH generation, the actual size of the printed CGH is 1 × 4 inches (25 mm × 100 mm) (600 dpi), and the printed CGH is scanned by a 600 dpi scanner.
Sensors 25 02410 g006
Figure 7. The procedure for generating and reconstructing a CGH of a designed passport number of a physical document. Note that the passport image is resized to 600 × 600 pixels before CGH generation, the actual size of the printed CGH is 2 inches (50 mm × 50 mm) (600 dpi), and the printed CGH is scanned using a 600 dpi scanner.
Figure 7. The procedure for generating and reconstructing a CGH of a designed passport number of a physical document. Note that the passport image is resized to 600 × 600 pixels before CGH generation, the actual size of the printed CGH is 2 inches (50 mm × 50 mm) (600 dpi), and the printed CGH is scanned using a 600 dpi scanner.
Sensors 25 02410 g007
Figure 8. The estimated values of the speckle signal-to-noise ratio (SSNR) for (a) the grayscale versus binary CGHs at 3 inches (600 dpi) and (b) the binary CGH with different sizes (1 inch, 2 inches, and 3 inches) at 300 dpi and 600 dpi.
Figure 8. The estimated values of the speckle signal-to-noise ratio (SSNR) for (a) the grayscale versus binary CGHs at 3 inches (600 dpi) and (b) the binary CGH with different sizes (1 inch, 2 inches, and 3 inches) at 300 dpi and 600 dpi.
Sensors 25 02410 g008
Table 1. Example of encryption and decryption of binary CGH matrix row using XOR technique with symmetric encryption and decryption key. The table shows all the steps required to encrypt the row, the encryption/decryption key used, the resulting encryption, referred to as the Cipher matrix, and the result of the decryption, referred to as the Plain text matrix. Note that these operations are performed based on the model described by Equations (6) and (7).
Table 1. Example of encryption and decryption of binary CGH matrix row using XOR technique with symmetric encryption and decryption key. The table shows all the steps required to encrypt the row, the encryption/decryption key used, the resulting encryption, referred to as the Cipher matrix, and the result of the decryption, referred to as the Plain text matrix. Note that these operations are performed based on the model described by Equations (6) and (7).
Matrix of binary CGH image1010110011001110011
Encryption key1101001101001101001
Cipher matrix0111111110000011010
Decryption key1101001101001101001
Plain matrix1010110011001110011
Table 2. Statistical security tests for the original and XOR-encrypted CGHs using different metrics: entropy, horizontal correlation, number of pixels change rate (NPCR), and unified average changing intensity (UACI).
Table 2. Statistical security tests for the original and XOR-encrypted CGHs using different metrics: entropy, horizontal correlation, number of pixels change rate (NPCR), and unified average changing intensity (UACI).
MetricOriginal ImageEncrypted Image 1Encrypted Image 2
Entropy1.00001.00001.0000
Horizontal correlation0.3579−0.00120.0010
NPCR (number of pixels change rate) %-50.033850.0338
UACI (unified average changing intensity) %-50.033850.0338
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ahmed, Z.E.; Abdelazeem, R.M.; Attia, Y.A.; Khattab, T.A.; Falldorf, C.; Bergmann, R.B.; Agour, M. A Complementary Approach for Securing and Anti-Counterfeiting of Valuable Documents Based on Encryption of Computer-Generated Hologram. Sensors 2025, 25, 2410. https://doi.org/10.3390/s25082410

AMA Style

Ahmed ZE, Abdelazeem RM, Attia YA, Khattab TA, Falldorf C, Bergmann RB, Agour M. A Complementary Approach for Securing and Anti-Counterfeiting of Valuable Documents Based on Encryption of Computer-Generated Hologram. Sensors. 2025; 25(8):2410. https://doi.org/10.3390/s25082410

Chicago/Turabian Style

Ahmed, Zakaria E., Rania M. Abdelazeem, Yasser A. Attia, Tawfik A. Khattab, Claas Falldorf, Ralf B. Bergmann, and Mostafa Agour. 2025. "A Complementary Approach for Securing and Anti-Counterfeiting of Valuable Documents Based on Encryption of Computer-Generated Hologram" Sensors 25, no. 8: 2410. https://doi.org/10.3390/s25082410

APA Style

Ahmed, Z. E., Abdelazeem, R. M., Attia, Y. A., Khattab, T. A., Falldorf, C., Bergmann, R. B., & Agour, M. (2025). A Complementary Approach for Securing and Anti-Counterfeiting of Valuable Documents Based on Encryption of Computer-Generated Hologram. Sensors, 25(8), 2410. https://doi.org/10.3390/s25082410

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop