• Title/Summary/Keyword: binary-phase hologram

Search Result 41, Processing Time 0.024 seconds

Combined binary phase holograms for free-space optical interconnection (자유공간 광 연결을 위한 결합형 이진 위상 홀로그램)

  • 서호형;이일항
    • Korean Journal of Optics and Photonics
    • /
    • v.7 no.4
    • /
    • pp.328-332
    • /
    • 1996
  • We have developed a combined binary-phase hologram (CBPH) consisting of two binary phase holograms. The CBPH can be effectively used for optical interconnection and image processing by suppressing unwanted images of a conventional binary-phase hologram. The theory and properties of the CBPH and experimental results are presented.

  • PDF

A Novel Volume Hologram Encryption Using Complementary Data and Binary Amplitude Mask (상보 데이터와 이진 진폭 마스크를 이용한 새로운 체적 홀로그램 암호화)

  • Kim, Hyun;Kim, Do-Hyung;Lee, Yeon-H.
    • Transactions of the Society of Information Storage Systems
    • /
    • v.1 no.2
    • /
    • pp.143-149
    • /
    • 2005
  • In this paper we propose a novel volume hologram encryption system with binary amplitude masks rather than phase masks, in which volume holograms can be securely recorded against the attacks by a third party. In our system, the encryption is done by multiplexing two volume holograms in such a way that an original binary data page is first stored as a volume hologram by interference with a binary amplitude mask and then the complementary data page is stored as another volume hologram by interference with the complementary binary amplitude mask over the first hologram. The operation principle of our system is explained with the well-known theory of recording and reading a volume hologram in a photorefractive material and the experimental results are presented. Experimental data show that our encryption system is protected from blind decryptions by randomly-generated incorrect amplitude masks.

  • PDF

An Improvement of Image Encryption using Binary Phase Computer Generated Hologram and Multi XOR Operations (이진위상 컴퓨터형성홀로그램과 다중 XOR 연산을 이용한 영상 암호화의 개선)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.110-116
    • /
    • 2008
  • In this paper, we proposed an improvement technique of image encryption using binary phase computer generated hologram(BPCGH) and multi exclusive-OR(XOR) operations. For the encryption process, a BPCGH that reconstructs the original image is designed, using an iterative algorithm, and the resulting hologram is regarded as the image to be encrypted. The BPCGH is encrypted through the exclusive-OR operation with the random generated phase key image. Then the encrypted image is divided into several slide images using XOR operations. So, the performance of encryption for the image is improved. For the decryption process, we cascade the encrypted slide images and phase key image and interfere with reference wave. Then decrypted hologram image is transformed into phase information. Finally, the original image is recovered by an inverse Fourier transformation of the phase information. If the slide images are changed, we can get various decrypted BPCGH images. In the proposed security system, without a random generated key image, the original image can not be recovered. And we recover another hologram pattern according to the slide images, so it can be used in the differentiated authorization system.

  • PDF

Digital watermarking using binary phase hologram and optical interferometer (이진 위상 홀로그램과 광학적 간섭계를 이용한 디지털 워터마킹)

  • 김병열;서동환;조규보;신창목;김수중;김철수
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.4
    • /
    • pp.377-382
    • /
    • 2003
  • We propose a new optical watermarking method, which can protect the copyright of digital data, using a binary phase hologram and a Mach-Zehnder interferometer. Using a simulated annealing algorithm, the binary phase hologram of the mark image to be hidden is designed. We obtained a watermarked image by linearly superposing the hologram, which is the watermark, in the original image. The extraction processing of the mark image from the watermarked image is achieved by placing the phase-modulated watermarked image on a LCD in one path and the phase-modulated original image on another LCD in the other path in the Mach-Zehnder interferometer. The mark image was obtained by inverse Fourier transforming the phase modulated interference intensity. We confirmed that the proposed method is robust for the cropped images through computer simulation, and we implemented it optically using LCDs which are phase modulation devices.

Implementation of Stable Optical Information Security System using Interference Hologram and Photorefractive Material (간섭 홀로그램과 광굴절매질을 이용한 안정한 광 정보보호 시스템의 구현)

  • 김철수
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2001.05a
    • /
    • pp.64-76
    • /
    • 2001
  • In this paper, A simple image hologram encryption and decryption technique based on the principle of interference are proposed. The technique using the photorefractive material for getting a stable interference pattern is also proposed. And combine these two techniques, I would like to implement a stable optical information security system. In the encrypting process, I would generate binary phase hologram which can reconstruct original image perfectly, and regard this hologram as original image to be encrypted image. And then the hologram is encrypted as randomly generated binary phase image. Reference image is also generated from the encrypted image by applying interference rule. In the decrypting process, I can get a interference intensity by interfering the reference image and the encrypted image in the interferometer. and transform inferference intensity information into phase information. I recover original image by inverse Fourier transforming the phase information. In this process, the intensity information generated by interference of two images is very sensitive to external vibrations. So, I would like to get a stable interference using the characteristic of SPPCM(self pumped phase conjugate mirror) in photorefractive materials, especially BaTiO₃.

  • PDF

Optical Encryption of Binary Information using 2-step Phase-shifting Digital Holography (2-단계 위상 천이 디지털 홀로그래피를 이용한 이진 정보 광 암호화 기법)

  • Byun, Hyun-Joong;Gil, Sang-Keun
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.5
    • /
    • pp.401-411
    • /
    • 2006
  • We propose an optical encryption/decryption technique for a security system based on 2-step phase-shifting digital holography. Phase-shilling digital holography is used for recording phase and amplitude information on a CCD device. 2-step phase-shifting is implemented by moving the PZT mirror with phase step of 0 or ${\pi}/2$. The binary data and the key are expressed with random code and random phase patterns. The digital hologram is a Fourier transform hologram and is recorded on CCD with 256 gray level quantization. We remove the DC term of the digital hologram fur data reconstruction, which is essential to reconstruct the original binary input data/image. The error evaluation fer the decrypted binary data is analyzed. One of errors is a quantization error in detecting the hologram intensity on CCD, and the other is generated from decrypting the data with the incorrect key. The technique using 2-step phase-shifting holography is more efficient than a 4-step method because 2-step phase-shifting holography system uses less data than the 4-step method for data storage or transmission. The simulation shows that the proposed technique gives good results fur the optical encryption of binary information.

Effects of the Phase Error on the MTF Characteristics of Binary-phase Hologram Optical Low-pass Filter (컴퓨터로 설계한 2 위상 흘로그램 광 저대역 필터에서 위상차가 필터의 MTF 특성에 미치는 영향)

  • Go, Chun-Soo;Oh, Yong-Ho
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.18 no.8
    • /
    • pp.739-746
    • /
    • 2005
  • When we design a binary phase holographic optical low-pass filter (HOLF), the phase difference is generally set to be $\pi$ to optimize the diffraction efficiency. However, the phase difference of real HOLF mostly deviate from $\pi$ by the error in the fabrication process. The deviation causes the (0,0)-th order diffracted beam to increase, which results In raising the diffraction efficiency. To study the effects of the phase error on the performance of HOLF, we calculated the MTF of HOLF for various phase differences. The results show that the phase error of 10 $\%$ makes little change in the filtering characteristics of HOLF. Considering the filtering by lens and CCD, the effects of the phase error becomes much smaller. To confirm it experimentally, we fabricated HOLFs for various phase differences. After installing it in a digital camera, we take picture of test targets and observe the Moire fringes and the resolution. The results agree with our prediction.

A Proposal of Combined Iterative Algorithm for Optimal Design of Binary Phase Computer Generated Hologram (최적의 BPCGH 설계를 위한 합성 반복 알고리듬 제안)

  • Kim Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.10 no.4
    • /
    • pp.16-25
    • /
    • 2005
  • In this paper, we proposed a novel algorithm combined simulated annealing and genetic algorithms for designing optimal binary phase computer generated hologram. In the process of genetic algorithm searching by block units, after the crossover and mutation operations, simulated annealing algorithm searching by pixel units is inserted. So, the performance of BPCGH was improved. Computer simulations show that the proposed combined iterative algorithm has better performance than the simulated annealing algorithm in terms of diffraction efficiency

  • PDF

A study of the hologram which records the interference of light with computer (컴퓨터로 빛의 간섭을 기록하는 홀로그램(CGH)의 특성 연구)

  • Lee, Jeong-Yeong;Jang, Woo-Yeong
    • Journal of Korean Ophthalmic Optics Society
    • /
    • v.10 no.4
    • /
    • pp.305-312
    • /
    • 2005
  • In this thesis, Lohmann's algorithm and FFT (fast Fourier transform) are used to synthesize binary-phase holograms. FFT computing is carried out for the calculation of complex wavefronts of $128{\times}128$ sampling points of an object that is numerically specified. Then using the Lohmann's algorithm, the amplitude and the phase of complex wavefronts are encoded in binary holograms on each sampling points. PC (personal computer) and laser printer are used to plot binary-phase holograms and CGH (computer generated holograms) films are obtained from this plot by photographic reduction. Holographic images of numerically specified objects are reconstructed from the He-Ne laser and the inverse Fourier optics system. We estimate the quality of holographic images according to the sampling number, application of random phase, amplitude clipping and bleaching the CGH film. We derive optimized conditions to reconstruct better holographic images and to reduce the speckle noise. FFT and Lohmann's algorithm are implemented with MS Visual BASIC 6.0 for the programming of binary-phase hologram.

  • PDF

Dual Optical Encryption for Binary Data and Secret Key Using Phase-shifting Digital Holography

  • Jeon, Seok Hee;Gil, Sang Keun
    • Journal of the Optical Society of Korea
    • /
    • v.16 no.3
    • /
    • pp.263-269
    • /
    • 2012
  • In this paper, we propose a new dual optical encryption method for binary data and secret key based on 2-step phase-shifting digital holography for a cryptographic system. Schematically, the proposed optical setup contains two Mach-Zehnder type interferometers. The inner interferometer is used for encrypting the secret key with the common key, while the outer interferometer is used for encrypting the binary data with the same secret key. 2-step phase-shifting digital holograms, which result in the encrypted data, are acquired by moving the PZT mirror with phase step of 0 or ${\pi}/2$ in the reference beam path of the Mach-Zehnder type interferometer. The digital hologram with the encrypted information is a Fourier transform hologram and is recorded on CCD with 256 gray level quantized intensities. Computer experiments show the results to be encryption and decryption carried out with the proposed method. The decryption of binary secret key image and data image is performed successfully.