Figure 5
From: Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm

(a) Image to be encrypted, \({\varvec{g}}\); (b) final decrypted image \({{\varvec{H}}}_{{\varvec{d}}{\varvec{e}}}\); (c,d) are two parts of the mapped hologram of ‘goat’, i.e., \({{\varvec{H}}}_{{\varvec{B}}{\varvec{c}}}\) and \({{\varvec{H}}}_{{\varvec{B}}{\varvec{s}}}\) respectively; (e,f) are encrypted images, \({{\varvec{c}}}_{{\varvec{x}}}\) and \({{\varvec{c}}}_{{\varvec{y}}}\), respectively; (g) reconstruction cosine hologram \({{\varvec{H}}}_{{\varvec{B}}{\varvec{c}}}\); (h) reconstruction sine hologram \({{\varvec{H}}}_{{\varvec{B}}{\varvec{s}}}\); (i) and (j) are cosine and sine pinhole holograms \({{\varvec{H}}}_{{\varvec{B}}{\varvec{c}}}\) and \({{\varvec{H}}}_{{\varvec{B}}{\varvec{s}}}\), respectively.