• Title/Summary/Keyword: 위상 홀로그램

Search Result 123, Processing Time 0.021 seconds

Adaptive Wavelet Transform for Digital Hologram Compression (디지털 홀로그램 압축을 위한 적응적 웨이블릿 변환)

  • Kim, Jin-Kyum;Oh, Kwan-Jung;Kim, Jin-Woong;Kim, Dong-Wook;Seo, Young-Ho
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2020.11a
    • /
    • pp.41-42
    • /
    • 2020
  • 본 논문에서는 JPEG Pleno에서 표준 데이터세트로 제공되고 있는 디지털 홀로그램의 압축 방법을 제시한다. 디지털 홀로그램의 재현에서 시각화를 위한 랜덤 위상의 추가는 간섭현상으로 인한 스페클노이즈와 더블어 홀로그램의 압축 효율을 떨어트린다. 먼저, 다양한 웨이블릿 필터를 이용하여 홀로그램 데이터에 대한 주파수 특성 분석을 진행한다. 다음으로, 홀로그램 압축에 용이한 필터를 제안한다. 마지막으로 JPEG2000의 웨이블릿 필터인 Bi-Orthogonal (4, 4)와 제안하는 웨이블릿 필터를 이용하여 SPIHT(Set partitioning in hierarchical trees)를 이용하여 압축하고 복원하고 압축률 대비 정량적 화질평가를 통해 그 효율을 분석한다.

  • PDF

Double Encryption of Digital Hologram Based on Phase-Shifting Digital Holography and Digital Watermarking (위상 천이 디지털 홀로그래피 및 디지털 워터마킹 기반 디지털 홀로그램의 이중 암호화)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2017
  • In this Paper, Double Encryption Technology Based on Phase-Shifting Digital Holography and Digital Watermarking is Proposed. For the Purpose, we First Set a Logo Image to be used for Digital Watermark and Design a Binary Phase Computer Generated Hologram for this Logo Image using an Iterative Algorithm. And Random Generated Binary Phase Mask to be set as a Watermark and Key Image is Obtained through XOR Operation between Binary Phase CGH and Random Binary Phase Mask. Object Image is Phase Modulated to be a Constant Amplitude and Multiplied with Binary Phase Mask to Generate Object Wave. This Object Wave can be said to be a First Encrypted Image Having a Pattern Similar to the Noise Including the Watermark Information. Finally, we Interfere the First Encrypted Image with Reference Wave using 2-step PSDH and get a Good Visible Interference Pattern to be Called Second Encrypted Image. The Decryption Process is Proceeded with Fresnel Transform and Inverse Process of First Encryption Process After Appropriate Arithmetic Operation with Two Encrypted Images. The Proposed Encryption and Decryption Process is Confirmed through the Computer Simulations.

Generation of vortices by a light-induced phase mask in a V-type atomic system (V형 원자계에서의 광에 의해 유도된 위상마스크에 의한 위상특이점의 생성)

  • 전진호;최원식;오명규;안경원;이재형
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2003.07a
    • /
    • pp.160-161
    • /
    • 2003
  • 위상특이점이라고도 불리는 광 보텍스(optical vortex)를 포함한 빔은 파면의 특이성 때문에 많은 관심을 끌어왔다. 위상을 정의할 수 없는 위상특이점을 따라서는 빔의 동일위상파면이 소용돌이 형태를 가진다. 그 소용돌이 정도는 위상전하(topological charge) 라는 양으로 특징지을 수 있다. 광 보텍스는 선형 및 비선형적 특성에 대해 많은 연구가 이루어져왔다. 레이저 공진기를 변형하거나, 홀로그램이나 위상마스크에 레이저를 조사하여 보텍스를 발생시키는 방법 등의 여러 방법이 알려져 있다. (중략)

  • PDF

Optical Image Encryption and Decryption System Using Interferometric Binary Phase Holograms (이진 위상 홀로그램의 간섭을 이용한 광 암호화 및 복원 시스템)

  • 김종윤;신창목;서동환;박세준;김정우;김수중
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2001.02a
    • /
    • pp.70-71
    • /
    • 2001
  • 컴퓨터와 통신의 발달로 개인의 정보와 신용이 중요시됨에 따라 여권, 신용카드 등과 같은 각종 신분증을 많이 이용함에 따라 프린터, 스캐너, 또는 복사기 등을 이용한 이들의 복제가 늘고 있다. 이를 억제하기 위해 디지털 및 광학적 위조 방지 시스템에 대한 연구가 활발하다. 현재 엠보싱(embossed) 홀로그램이 부착된 각종 신용카드와 여권이 사용되고 있으나 이는 광세기 검출기를 이용하면 마스터 홀로그램 합성 및 대량복제가 가능하다. (중략)

  • PDF

Deep learning-based Hologram generation using Amplitude and Phase Component (진폭과 위상을 이용한 딥러닝 기반의 홀로그램 생성)

  • Kang, Ji-Won;Lee, Jae-Eun;Lee, Yoon-Hyuk;Kim, Dong-Wook;Seo, Young-Ho
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2019.06a
    • /
    • pp.227-228
    • /
    • 2019
  • 본 논문에서는 딥 러닝을 기반으로 홀로그램의 연산 간소화를 제안한다. 딥 러닝 중에서도 GAN model을 기반으로 진행된다. Point source 에 대응되는 홀로그램 모델링 식을 이용하여 Amplitude 와 Phase의 Component 들을 각각의 GAN 으로 훈련시켜 얻는 방법을 제안한다.

  • PDF

Character display unit using a phase hologram array and a LC-SLM (위상 홀로그램 어레이와 LC-SLM를 이용한 문자 디스플레이 장치)

  • Kang, Bong-Gyun;Suh, Ho-Hyung;Kim, Nam
    • Journal of the Korean Institute of Telematics and Electronics D
    • /
    • v.35D no.9
    • /
    • pp.62-69
    • /
    • 1998
  • We demonstrated the character display unit using a binary phase hologram array and a liquid crystal-spatial light modulator (LC-SLM). It combines the dynamic property of the LC-SLM with the high-efficiency property of the phase hologram fabricated by photolithography. Experimental results of the proposed unit are presented. The character display unit proposed in this paper has a fundamental and important meaning as new method displaying images by using light, and it will be used in optical information processing and optical communications fields.

  • PDF

A Study on Lohmann Type Computer Generated Holograms Using a Circular Cell (원형 셀을 이용한 Lohmann형 컴퓨터 형성 홀로그램에 관한 연구)

  • Seo, Choon-Su;Jeong, Man-Ho
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.6
    • /
    • pp.519-524
    • /
    • 2006
  • In general, the Lohmann-type binary hologram represents its amplitude and phase by using the rectangular cell. In this paper, we adapts a circular cell to represents the amplitude and phase of holograms. In order to compare the characteristics of the circular cell with the rectangular one, we analyzed the results based on the computer simulations and various optical experiments. The results show that a clearer reconstructed image can be obtained by dividing one cell into many pixels. In the case of a uniform reconstructed image, the rectangular cell is better than the circular cell. However, as for the brightness of the reconstructed image, the circular cell is better than the rectangular one.

Defect Inspection of Phase Shift Photo-Mask with Digital Hologram Microscope (디지털 홀로그램 현미경을 이용한 위상차 포토마스크 결함 측정)

  • Cho, Hyung-Jun;Lim, Jin-Woong;Kim, Doo-Cheol;Yu, Young-Hun;Shin, Sang-Hoon
    • Korean Journal of Optics and Photonics
    • /
    • v.18 no.5
    • /
    • pp.303-308
    • /
    • 2007
  • We report here on the application of a digital holographic microscope as a metrology tool for the inspection and the micro-topography reconstruction of different micro-structures of phase shift photo-mask (PSM). The lithography by phase shift photo-mask uses the interference and the pattern of the PSM is not imaged by general optical microscope. The technique allows us to obtain digitally a high-fidelity surface topography description of the phase shift photo-mask with only one hologram image acquisition, allowing us to have relatively simple and compact set-ups able to give quantitative information of PSM.

An Iterative Digital Image Watermarking Technique using Encrypted Binary Phase Computer Generated Hologram in the DCT Domain (DCT 영역에서 암호화된 이진 위상 컴퓨터형성 홀로그램을 이용한 반복적 디지털 영상 워터마킹 기술)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.3
    • /
    • pp.15-21
    • /
    • 2009
  • In this paper, we proposed an iterative digital image watermarking technique using encrypted binary phase computer generated hologram in the discrete cosine transform(OCT) domain. For the embedding process of watermark, using simulated annealing algorithm, we would generate a binary phase computer generated hologram(BPCGH) which can reconstruct hidden image perfectly instead of hidden image and repeat the hologram and encrypt it through the XOR operation with key image that is ramdomly generated binary phase components. We multiply the encrypted watermark by the weight function and embed it into the DC coefficients in the DCT domain of host image and an inverse DCT is performed. For the extracting process of watermark, we compare the DC coefficients of watermarked image and original host image in the DCT domain and dividing it by the weight function and decrypt it using XOR operation with key image. And we recover the hidden image by inverse Fourier transforming the decrypted watermark. Finally, we compute the correlation between the original hidden image and recovered hidden image to determine if a watermark exits in the host image. The proposed watermarking technique use the hologram information of hidden image which consist of binary values and encryption technique so it is very secure and robust to the external attacks such as compression, noises and cropping. We confirmed the advantages of the proposed watermarking technique through the computer simulations.

Computer simulation of the removal of the 0-th order diffraction by using fourier transform in digital holography (디지털 홀로그래피에서 퓨리어 변환을 이용한 0차 회절광의 제거와 위상홀로그램의 생성에 대한 전산 모사)

  • Kim, Sung-Kyu;Park, Min-Chul;Lee, Seok;Kim, Jae-Soon;Son, Jung-Young
    • Korean Journal of Optics and Photonics
    • /
    • v.15 no.1
    • /
    • pp.39-45
    • /
    • 2004
  • A computer simulation about removal of the 0-th order diffraction is achieved by using numerical reconstruction in digital holography and the Fourier transform method. A light intensity distribution hologram is generated through numerical calculation of the interference pattern. Additionally a phase hologram without the 0-th order diffraction is generated. The removal function for elimination of the 0-the order diffraction is introduced and the numerical reconstructions with several conditions for the removal of the 0-th order diffraction and the production of high quality numerically reconstructed images are tested and compared. The removal function is proven to be more effective at the suppression of the 0-th order diffraction compared with the DC suppression method.