Skip to main content
Log in

A novel technique in encryption information based on Chaos–hologram

  • Research Article
  • Published:
Journal of Optics Aims and scope Submit manuscript

Abstract

In this study, the chaos–hologram technique was used to encrypt information as one of the applications of holograms using MATLAB software. The results showed that the information to be encrypted using the computer-generated hologram technique can be easily de-encrypted using the computer-generated hologram reconstruction process. Therefore, this technology is not able to guarantee the confidentiality of information transmission from the sending unit to the receiving unit. When the computer-generated hologram technology is coupled with the chaotic Lorenz system by performing many arithmetic operations such as addition, multiplication, and division of two matrices of Fourier transforms of the information to be encrypted and the chaotic Lorenz system attractor, it is observed that there is a variation in the disappearance of the properties of the information to be encrypted and this depends on the type of computational process used. The results showed complete encryption of the information and the disappearance of its features using the mathematical division process.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

References

  1. K.R. Jamal, Monochrome Image hologram (MIH). Um-Salama Sci. J. 5(2), 261–264 (2008)

    Google Scholar 

  2. K.R. Jamal, Improvement of the monochrome image hologram by using a random phase and increasing number of samples. Um-Salama Sci. J. 5(4), 598–604 (2008)

    Google Scholar 

  3. O.E. Rössler, An equation for continuous chaos. Phys. Lett. 57A(5), 397–398 (1976)

    Article  ADS  MATH  Google Scholar 

  4. O.E. Rössler, An equation for hyper chaos. Phys. Lett. 71, 155–157 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  5. J.H.G. Lopez, R.J. Reatgui, A.N. Pisarchik, A.M. Hernandez, C.M. Gutierrez, R.V. Hernandez, R.V. Rauda, Novel communication scheme based on chaotic Rossler circuits. J. Phys. Conf. Ser. 23, 276–284 (2005)

    Article  Google Scholar 

  6. R.K. Jamal, D.A. Kaf, Secure communications by chaotic carrier signal using Lorenz model. Iraqi J. Phys. 14(30), 51–63 (2016)

    Google Scholar 

  7. R.K. Jamal, A. Hassan Mohamed, Secure communication by using Chua’s model. Int. J. Chem. Tech. Res. 10(9), 739–749 (2017)

    Google Scholar 

  8. Jamal RK, Kaf DA, Secure communication coupled semiconductor laser based on Rössler Chaotic circuits. In IOP Conference Series: Materials Science and Engineering. 571, (2019)

  9. K.S. Mousa, K.R. Jamal, Realization of a novel chaotic system using coupling dual chaotic system. Opt. Quant. Electron. 53, 188 (2021)

    Article  Google Scholar 

  10. R.K. Jamal, F.H. Ali, F.A.-H. Mutlak, Studying the Chaotic dynamics using Rossler–Chua systems combined with a semiconductor laser. Iraqi J. Sci. 62(7), 2213–2221 (2021)

    Article  Google Scholar 

  11. R.S. Abdulaali, R.K. Jamal, S.K. Mousa, Generating a new chaotic system using two chaotic Rossler–Chua coupling systems. Opt. Quant. Electron. 53, 667 (2021)

    Article  Google Scholar 

  12. R.S. Abdulaali, R.K. Jamal, A comprehensive study and analysis of the Chaotic Chua circuit. Iraqi J. Sci. 63(2), 556–570 (2022)

    Google Scholar 

  13. M.K. Ibraheem, R.K. Jamal, Space phase inversions and initial conditions of the Chen. Opt. Quant. Electron. 54, 614 (2022)

    Article  Google Scholar 

  14. N.M. Ali, R.K. Jamal, A novel secure communication system using Chen’s chaotic Model. Opt. Quant. Electron. 54, 641 (2022)

    Article  Google Scholar 

  15. B. Yousif, F. Khalifa, A. Makram, A. Takieldeen, A novel image encryption/decryption scheme based on integrating multiple chaotic maps. AIP Adv. 10, 075220 (2020)

    Article  ADS  Google Scholar 

  16. I.A. Hamadi, R.K. Jamal, S.K. Mousa, Image encryption based on computer generated hologram and Rossler chaotic system. Opt. Quant. Electron. 54, 33 (2022)

    Article  Google Scholar 

  17. A.W. Lohmann, D.P. Paris, Binary Fraunhofer holograms, generated by computer. Appl. Opt. 6, 1739–1748 (1967)

    Article  ADS  Google Scholar 

Download references

Funding

The present research did not receive any grant from funding agencies in the public, commercial or not-for-profit sectors. So its personal work and the statement of declaration of interests are only mine and support has been subjected during the research work for the past year.

Author information

Authors and Affiliations

Authors

Contributions

Each co-author has made specific unique contributions to the work. The authors MWK and DAK prepared special program for solving the differential equations of the chaotic Chen system using the Berkeley Madonna program. EAA contributed to conceptualizations writing–original draft. The author RKJ prepared the special program for the computer-generated hologram and applied the chaotic system with holograms in encryption technique that used in secret communications and contributed to supervision and editing analysis.

Corresponding author

Correspondence to Raied K. Jamal.

Ethics declarations

Conflict of interest

Authors would like to declare that they do not have any conflict of interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kadhim, M.W., Kafi, D.A., Abed, E.A. et al. A novel technique in encryption information based on Chaos–hologram. J Opt 52, 1976–1982 (2023). https://doi.org/10.1007/s12596-022-01087-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12596-022-01087-5

Keywords

Navigation