• Title/Summary/Keyword: 이진위상변조

Search Result 31, Processing Time 0.025 seconds

Characteristics of holographic storage of random-phase-modulation-added binary amplitude data (랜덤 위상변조가 가미된 이진 진폭 데이터 영상의 홀로그래픽 저장 특성)

  • 오용석;신동학;장주석
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.2
    • /
    • pp.289-296
    • /
    • 2001
  • We propose a method to add phase-modulation to binary amplitude data pages using a twisted-nematic liquid crystal display as a dynamic phase mask. For this, the phase modulation characteristics of the display were examined both theoretically and experimentally, and an unexpected abnormal phenomenon was found experimentally in which the modulation property changed as the incident beam intensity increased. To investigate the characteristics of holographically storing the binary data images, eight pages of holograms were stored at one spot of in un-thick Dupont's photopolymer with angle multiplexing. When phase-modulation-added pages were stored at the Fourier plane, the uniformity of the signal beam at the plane was improved, and thus more holograms can be recorded with our method, compared with the conventional case of using only binary amplitude modulation under the same condition.

  • PDF

Optical security scheme using phase-encoded XOR operations (위상 변조 Exclusive-OR 연산을 이용한 광학적 암호화 방법)

  • 신창목;서동환;김수중
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.6
    • /
    • pp.623-629
    • /
    • 2003
  • In this paper, we have proposed a full phase encryption scheme based on phase-encoded XOR operation. The proposed scheme encrypts a gray-level image by slicing an original image and combining with XORed images which resulted from phase-encoded XOR operations between sliced images and phase-encoded binary random images. Then we produce an encrypted image by combining only XORed images and a key image by only phase-encoded binary random images. The encrypted image and key image are converted into encrypted data and key data by a phase-encoding method. The merits are that the proposed encryption scheme can basically fulfill a high-level encryption using a full phase encryption scheme which has nonlinear and invisible characteristics. The scheme also improves security by encrypting the phase information before full phase encryption. The decryption system based on the principle of interference between a reference wave and a direct pixel-to-pixel mapping image of encrypted data with key data can be simply implemented using a phase-visualization system. Simulation results indicate that our proposed encryption scheme is effective and simple for a gray-scale image and optical decryption system.

Binary Phase-based Optical Encryption System Using the Principle of Interference (간섭의 원리를 이용한 이진 위상의 광학적 암호화 시스템)

  • 서동환;신창목;김수중
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.1
    • /
    • pp.29-35
    • /
    • 2003
  • In this paper, we propose an improved image decryption system using a phase-encoded image and the principle of interference. An original image and a random image consist of only binary values. The phase-encoded original image is encrypted into a binary phase-only image by multiplying with a phase-encoded random key. Therefore the phase-encoded images have two phase values 0 or $\pi$. The proposed decryption technique is simply performed by interfering between a reference wave and a direct pixel-to-pixel mapping of the encrypted image with a decrypting key. Optical experiments confirmed that the proposed technique is a simple and robust architecture for optical encryption.

Holographic s forage of random-phase-modulation-added binary amplitude data (랜덤 위상변조가 가미된 이진 진폭 데이터 영상의 홀로그래픽 저장)

  • 오용석;신동학;장주석
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.489-492
    • /
    • 2001
  • We studied a method to use a variable discrete random phase mask in 2-D binary data representation for efficient holographic data storage. The variable phase mask is realized by use of a twisted nematic liquid crystal display.

  • PDF

Digital watermarking using binary phase hologram and optical interferometer (이진 위상 홀로그램과 광학적 간섭계를 이용한 디지털 워터마킹)

  • 김병열;서동환;조규보;신창목;김수중;김철수
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.4
    • /
    • pp.377-382
    • /
    • 2003
  • We propose a new optical watermarking method, which can protect the copyright of digital data, using a binary phase hologram and a Mach-Zehnder interferometer. Using a simulated annealing algorithm, the binary phase hologram of the mark image to be hidden is designed. We obtained a watermarked image by linearly superposing the hologram, which is the watermark, in the original image. The extraction processing of the mark image from the watermarked image is achieved by placing the phase-modulated watermarked image on a LCD in one path and the phase-modulated original image on another LCD in the other path in the Mach-Zehnder interferometer. The mark image was obtained by inverse Fourier transforming the phase modulated interference intensity. We confirmed that the proposed method is robust for the cropped images through computer simulation, and we implemented it optically using LCDs which are phase modulation devices.

A Design of Binary Phase Holograms using Genetic Algorithms (유전자 알고리즘을 사용한 이진 위상 홀로그램 설계)

  • Lee, Chang-Yong;Song, Yun-Seon;Seo, Ho-Hyeong
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.2
    • /
    • pp.297-305
    • /
    • 1999
  • 본 논문에서는 컴퓨터를 사용한 이진 위상 홀로그램의 설계시 요구되는 조합 최적화 문제(combinatorial optimization problem)를 유전자 알고리즘을 사용하여 해결하고자한다. 이진 위상 홀로그램의 설게는 출력 면에서 원하는 이미지를 생성하기 위하여 홀로그램의 각 셀에 이진 위상을 결정하는 것으로 최적화 문제로 귀착된다. 유전자 알고리즘을 이진 위상 홀로그램 설계에 효율적으로 적용하기 위하여 이차원 염색체 부호화 및 주기성을 고려한 교차 연산자등을 사용하면, 그 결과 홀로그램 설계시 요구되는 이차원 퓨리에 변환(Fourier transform)을 자연스럽고 효율적인 방법으로 수행할수 있다. 유전자 알고리즘을 사용하여 구한 최적의 이진 위상 배열로 공간 빛 변조기(spatial light modulator, SLM)를 이용하여 광학적으로 이미지를 재생하고, 재생된 광학 이미지는 원하는 이미지와 거의 일치함을 보인다.

A New Design of Signal Constellation of the Spiral Quadrature Amplitude Modulation (나선 직교진폭변조 신호성상도의 새로운 설계)

  • Li, Shuang;Kang, Seog Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.398-404
    • /
    • 2020
  • In this paper, we propose a new design method of signal constellation of the spiral quadrature amplitude modulation (QAM) exploiting a modified gradient descent search algorithm and its binary mapping rule. Unlike the conventional method, the new method, which uses and the constellation optimization algorithm and the maximum number of iterations as a parameter for the iterative design, is more robust to phase noise. And the proposed binary mapping rule significantly reduces the average Hamming distance of the spiral constellation. As a result, the proposed spiral QAM constellation has much improved error performance compared to the conventional ones even in a very severe phase noise environment. It is, therefore, considered that the proposed QAM may be a useful modulation format for coherent optical communication systems and orthogonal frequency division multiplexing (OFDM) systems.

An Implementation of Optical Security System using Interferometer and Cascaded Phase Keys (간섭계와 직렬 위상 키를 이용한 광 보안 시스템의 구현)

  • Kim Cheol-Su
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2006.05a
    • /
    • pp.205-210
    • /
    • 2006
  • 본 논문에서는 간섭계와 직렬 위상 카드를 이용한 광 보안 시스템을 제안하였다. 먼저 원영상을 암호화하기 위해 원영상을 암호화하는 것이 아니라 원영상에 대한 이진 위상 컴퓨터형성홀로그램을 반복 알고리즘을 이용하여 구하고, 이진 위상 컴퓨터형성홀로그램과 무작위 생성된 위상 키 영상과의 XOR 연산을 통해 암호화된 영상을 구한다. 홀로그램의 복호화 과정은 암호화된 영상과 암호화시에 사용된 무작위 위상 영상 키를 직렬 정합시킨 후, 기준파와의 간섭에 의해 수행된다. 이때, 간섭패턴은 주위 환경에 상당히 민감하다. 그래서 광굴절매질의 자기위상공액성질을 이용하여 안정된 간섭패턴을 얻는다. 그리고 원영상은 복원된 홀로그램을 위상 변조한 후, 역푸리에 변환하여 최종적으로 구한다. 제안된 시스템에서는 암호화시에 사용된 무작위 키 영상 정보가 없으면 전혀 복원이 되지 않고, 키 영상을 달리함에 따라 복원되는 홀로그램의 패턴을 달리할 수 있으므로 차별화된 인증 시스템에 활용할 수 있다. 그리고 홀로그램의 성질에 의해 암호화된 영상이 일부 절단되더라도 원래의 영상을 복원할 수 있다.

  • PDF

Analysis of Reconstructed Images of Computer Generated Hologram Formed according to Grating Modulation Methods (회절격자의 변조방식에 따라 형성된 CGH의 재생 영상 분석)

  • Jeong, Man-Ho
    • Korean Journal of Optics and Photonics
    • /
    • v.19 no.5
    • /
    • pp.360-364
    • /
    • 2008
  • The diffraction efficiencies of gratings are affected by the inner structure which is determined by modulation type. CGH (Computer generated Hologram) basically uses the principles of a diffraction grating. As like as the diffraction gratings the patterns recorded in the CGH are different according to modulation methods which result in the performances of the reconstructed images. In this paper, on this fact CGHs are recorded according to sinusoidal and rectangular modulation methods and the characteristics of reconstructed images are analyzed. Also the reconstruction performances of the amplitude and phase, phase-only and binary phase CGH are analyzed.

Optical Image Encryption Based on Characteristics of Square Law Detector (세기검출기를 이용한 광 영상 암호화)

  • Lee, Eung-Dae;Park, Se-Jun;Lee, Ha-Un;Kim, Su-Jung
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.3
    • /
    • pp.34-40
    • /
    • 2002
  • In this paper, a new encryption method for a binary image using Phase modulation and Fourier transform is proposed. For decryption we use the characteristics of square law detector. In encryption process, a key image is obtained by phase modulation of 256 level random pattern and its Fourier transformation, and input image is encrypted by Fourier transforming the multiplication of the phase modulated random pattern and phase modulated input image. The encrypted image and key image have only phase information, so they can not be copied or counterfeited and the original image can not be decrypted without the key image. To reconstruct the original image, each phase mask of the key image and the encrypted image must be placed on each path of the Mach-Zehnder interferometry with Fourier transform lens and the output image is obtained in the form of intensity in the CCD(Charge Coupled Device) camera. The real-time decryption is possible in the proposed system by use of a LCD as a phase modulator and a CCD camera as an intensity detector. The proposed method shows a good performance in the computer simulation and optical experiment as an encryption scheme.