• Title/Summary/Keyword: Phase-only image

Search Result 174, Processing Time 0.028 seconds

Double Encryption of Image Based on Scramble Operation and Phase-Shifting Digital Holography (스크램블 연산 및 위상 천이 디지털 홀로그래피 기반 영상 이중 암호화)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.4
    • /
    • pp.13-22
    • /
    • 2018
  • In this paper, double encryption technology of image based on scramble operation and phase-shifting digital holography is proposed. For the purpose, we perform first encryption digitally using scramble operation for the to be encrypted image, and perform phase modulation to the first encrypted image. Finally, we get the secondary encryption information through the interference between the phase-shifted reference wave and phase modulated image. The decryption process proceeds in the reverse order of the encryption process. The original image is reconstructed by digitally decoding the two encrypted images through a phase shift digital holography technique that appropriately performs arithmetic processing, phase-demodulating and then using the encryption key information used in the scramble operation. The proposed cryptosystem can recover the original image only if both the key information used in the scramble operation, the distance information used in the phase shift digital holography technique, and the wavelength of the light source are known accurately.

Optical Image Split-encryption Based on Object Plane for Completely Removing the Silhouette Problem

  • Li, Weina;Phan, Anh-Hoang;Jeon, Seok-Hee;Kim, Nam
    • Journal of the Optical Society of Korea
    • /
    • v.17 no.5
    • /
    • pp.384-391
    • /
    • 2013
  • We propose a split-encryption scheme on converting original images to multiple ciphertexts. This conversion introduces one random phase-only function (POF) to influence phase distribution of the preliminary ciphertexts. In the encryption process, the original image is mathematically split into two POFs. Then, they are modulated on a spatial light modulator one after another. And subsequently two final ciphertexts are generated by utilizing two-step phase-shifting interferometry. In the decryption process, a high-quality reconstructed image with relative error $RE=7.6061{\times}10^{-31}$ can be achieved only when the summation of the two ciphertexts is Fresnel-transformed to the reconstructed plane. During the verification process, any silhouette information was invisible in the two reconstructed images from different single ciphertexts. Both of the two single REs are more than 0.6, which is better than in previous research. Moreover, this proposed scheme works well with gray images.

Optical encryption and decryption technique using virtual image in frequency domain (가상 영상을 이용한 주파수 영역에서의 광학적 암호화 및 복호화 방법)

  • 서동환;조규보;박세준;김수중;김정우;노덕수
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.3
    • /
    • pp.255-259
    • /
    • 2003
  • In this paper, we propose an improved image encryption and decryption method using a virtual image and a joint transform correlator (JTC). The encrypted image is obtained by the Fourier transform of the product of a virtual-phase image and a random-phase image, and a Fourier transform of the decrypting key generated by the proposed phase assignment rule is used as the Fourier decrypting key. Based on the solution, the original image is reconstructed using JTC in the frequency-domain. The proposed method using a virtual image, which does not contain any information from the original image, prevents the possibility of counterfeiting by unauthorized people. And also the auto-correlation terms, which are the drawback of a JTC system, contribute to reconstructing the original image rather than to disturbing its identification. But because phase-only encryptions are sensitive to noise and scratches, phase errors can be generated in fabricating the encrypted image or the Fourier decrypting key so the errors that are responsible for degradation of the quality of the reconstructed image are analyzed and the solution is demonstrated. Computer simulations show the solution, and the proposed method is very useful for JTC architecture.

An Accurate Design Method of Wideband BPF Considering Frequency Dependence of Inverters

  • Youna, Jang;Dal, Ahn
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.1
    • /
    • pp.1-8
    • /
    • 2023
  • This paper presents a design method for a wideband bandpass filter (BPF) which compensates for frequency dependency based on the image admittance and image phase. In the proposed method, new compensation methods for the admittance and phase are integrated with the conventional method. The proposed method improves the frequency shift and reduces the unwanted bandwidth when designing more than 20% of the Fractional Bandwidth (FBW), whereas the conventional method exhibits frequency degradation at only 10% FBW. The proposed design theory was verified by applying it to both lumped elements and distributed lines through circuit simulation and measurements without an optimization process. The measurement results demonstrate improvements in the frequency shift and target bandwidth. In the future, an accurate design method based on frequency dependence can be implemented for the next-generation broadband communication system applications.

Single Path Phase-only Security System using Phase-encoded XOR Operations in Fourier Plane (푸리에 영역에서의 위상 변조 Exclusive-OR 연산을 이용한 단일 경로 위상 암호화 시스템)

  • Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong;Noh, Duck-Soo
    • Korean Journal of Optics and Photonics
    • /
    • v.16 no.4
    • /
    • pp.326-333
    • /
    • 2005
  • Phase-only encryption scheme using exclusive-OR rules in Fourier plane and a single path decryption system are presented. A zero-padded original image, multiplied by a random phase image, is Fourier transformed and its real-valued data is encrypted with key data by using XOR rules. A decryption is simply performed based on 2-1 setup with spatial filter by Fourier transform for multiplying phase-only encrypted data by phase-only key data, which are obtained by phase-encoding process, and spatial filtering for zero-order elimination in inverse-Fourier plane. Since the encryption process is peformed in Fourier plane, proposed encryption scheme is more tolerant to loss of key information by scratching or cutting than previous XOR encryption method in space domain. Compare with previous phase-visualization systems, due to the simple architecture without a reference wave, our system is basically robust to mechanical vibrations and fluctuations. Numerical simulations have confirmed the proposed technique as high-level encryption and simple decryption architecture.

Study on Digital Holography with Conjugated Hologram (복소공액 홀로그램을 이용한 디지털 홀로그래피 연구)

  • Shin, Sang-Hoon;Kim, Doo-Cheol;Yu, Young-Hun
    • Korean Journal of Optics and Photonics
    • /
    • v.21 no.4
    • /
    • pp.146-150
    • /
    • 2010
  • In this paper we have applied phase conjugated holographyto DHM (digital holography microscopy) to remove phase aberration and noise. Generally,digital holographyincludes the phase information of the object, phase aberration terms introduced by the measurement system and noise terms (DC term and twin images). These aberrations and noise terms decrease the quality of the reconstructed phase image. We could obtain a conjugated hologram which includes only phase information of object. Experimentally we show that distortion of image and aberration of phase in a measurement system are removed using the conjugation hologram.

Resolution Limit Analysis of Isolated Patterns Using Optical Proximity Correction Method with Attenuated Phase Shift Mask (Attenuated Phase Shift Mask에 광 근접 효과 보정을 적용한 고립 패턴의 해상 한계 분석)

  • 김종선;오용호;임성우;고춘수;이재철
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.13 no.11
    • /
    • pp.901-907
    • /
    • 2000
  • As the minimum feature size for making ULSI approaches the wavelength of light source in optical lithography, the aerial image is so hardly distorted because of the optical proximity effect that the accurate mask image reconstruction on wafer surface is almost impossible. We applied the Optical Proximity Correction(OPC) on isolated patterns assuming Attenuated Phase Shift Mask(APSM) as well as binary mask, to correct the widening of isolated patterns. In this study, we found that applying OPC to APSM shows much better improvement not only in enhancing the resolution and fidelity of t도 images but also in enhancing the process margin than applying OPC to the binary mask. Also, we propose the OPC method of APSM for isolated patterns, the size of which is less than the wavelength of the ArF excimer laser. Finally, we predicted the resolution limit of optical lithography through the aerial image simulation.

  • PDF

Identification and Assessment of Paradoxical Ventricular Wall Motion Using ECG Gated Blood Pool Scan - Comparison of Cine Loop, Phase Analysis and Paradox Image - (ECG Gated Blood Pool Scan을 이용한 심실벽 역행성 운동의 평가 - Cine Loop, Phase Analysis, Paradox Image의 비교 -)

  • Lee, Jae-Tae;Kim, Gwang-Weon;Jeong, Byeong-Cheon;Lee, Kyu-Bo;Whang, Kee-Suk;Chae, Sung-Chul;Jeon, Jae-Eun;Park, Wee-Hyun;Lee, Hyong-Woo;Chung, Jin-Hong
    • The Korean Journal of Nuclear Medicine
    • /
    • v.24 no.2
    • /
    • pp.244-253
    • /
    • 1990
  • Sixty-four patients with paradoxical ventricular wall motion noticed both in angiocardiography or 2-dimensional echocardiography were assessed by ECG gated blood pool scan (GBPS). Endless cine loop image, phase and amplitude images and paradox image obtained by visual inspection of each cardiac beat or Fourier transformation of acquired raw data were investigated to determine the incremental value of GBPS with these processing methods for identification of paradoxical ventricular wall motion. The results were as follows: 1) Paradoxical wall motions were observed on interventricular septum in 34 cases, left ventricular free wall in 26 and right ventricular wall in 24. Underlying heart diseases were ischemic (23 cases) valvular(9), congenital heart disease (12), cardiomyopathy (5). pericardial effusion(5), post cardiac surgery(3), col pulmonale (2), endocarditis(1) and right ventricular tumor(1). 2) Left ventricular ejection fractions of patients with paradoxical left ventricular wall motion were significantly lower than those with paradoxical septal motion(p<0.005). 3) The sensitivity of each processing methods for detecting paradoxical wall motion was 76.9% by phase analysis, 74.6% by endless cine loop mapping and 68.4% by paradox image manipultion respectively. Paradoxial motions visualized only in phase, paradox or both images were appeared as hypokinesia or akinesia in cine loop image. 4) All events could be identified by at least one of above three processing methods, however only 34 cases (48.4%) showed the paradoxical molies in all of the three images. By these findings, we concluded that simultaneous inspection of all above three processing methods-endless cine loop, phase analysis and paradox image-is necessary for accurate identification and assessment of paradoxical ventricular wall motion when performing GBPS.

  • PDF

A Study on Reconstruction Performance of Phase-only Holograms with Varying Propagation Distance (전파 거리에 따른 위상 홀로그램 복원성능 분석 및 BL-ASM 개선 방안 연구)

  • Jun Yeong Cha;Hyun Min Ban;Seung Mi Choi;Jin Woong Kim;Hui Yong Kim
    • Journal of Broadcast Engineering
    • /
    • v.28 no.1
    • /
    • pp.3-20
    • /
    • 2023
  • A computer-generated hologram (CGH) is a digitally calculated and recorded hologram in which the amplitude and phase information of an image is transmitted in free space. The CGH is in the form of a complex hologram, but it is converted into a phase-only hologram to display through a phase-only spatial light modulator (SLM). In this paper, in the process of including the amplitude information of an object in the phase information, when a technique that includes subsampling such as DPAC is used, we showed experimentally that the bandwidth of the phase-only hologram increases, and as a result, aliasing that was not present in the complex hologram can occur. In addition, it was experimentally shown that it is possible to generate a high-quality phase-only hologram by restricting the spatial frequency range even at a distance where the numerical reconstruction performance is degraded by aliasing.

Hierarchical Image Encryption System Using Orthogonal Method (직교성을 이용한 계층적 영상 암호화)

  • Kim, Nam-Jin;Seo, Dong-Hoan;Lee, Sung-Geun;Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.3
    • /
    • pp.231-239
    • /
    • 2006
  • In recent years, a hierarchical security architecture has been widely studied because it can efficiently protect information by allowing an authorized user access to the level of information. However, the conventional hierarchical decryption methods require several decryption keys for the high level information. In this paper, we propose a hierarchical image encryption using random phase masks and Walsh code having orthogonal characteristics. To decrypt the hierarchical level images by only one decryption key, we combine Walsh code into the hierarchical level system. For encryption process, we first perform a Fourier transform for the multiplication results of the original image and the random phase mask, and then expand the transformed pattern to be the same size and shape of Walsh code. The expanded pattern is finally encrypted by multiplying with the Walsh code image and the binary phase mask. We generate several encryption images as the same encryption process. The reconstruction image is detected on a CCD plane by a despread process and Fourier transform for the multiplication result of encryption image and hierarchical decryption keys which are generated by Walsh code and binary random phase image. Computer simulations demonstrate that the proposed technique can decrypt hierarchical information by using only one level decryption key image and it has a good robustness to the data loss such as random cropping.