• Title/Summary/Keyword: 이진 위상 컴퓨터형성홀로그램

Search Result 15, Processing Time 0.022 seconds

DCT영역에 기반한 반복적 이진위상컴퓨터형성홀로그램을 이용한 디지털 영상 워터마킹 기술

  • Kim, Cheol-Su
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2009.05a
    • /
    • pp.32-36
    • /
    • 2009
  • 본 논문에서는 DCT영역에서 반복적 이진위상컴퓨터형성홀로그램을 이용한 디지털 영상 워터마킹 기술을 제안하였다. 워터마크로 주로 사용되는 랜덤 시퀸스 또는 로고와 같은 은닉영상 대신 은닉영상을 손실없이 재생할 수 있는 이진위상컴퓨터형성홀로그램을 생성하고, 이를 반복적으로 표현해서 워터마크로 사용한다. 그리고 이 워터마크를 호스트영상의 DCT 계수에 적절한 규칙을 통해 가중치를 부여하여 삽입한 후, IDCT한다. 워터마크의 추출은 워터마킹된 영상과 호스트영상을 DCT하고, 삽입시 적용한 규칙을 통해서 수행한다. 그리고 추출된 워터마크의 역푸리에 변환과 호스트영상에 삽입하기전의 워터마크를 역푸리에 변환하여 재생한 은닉영상과의 상관을 취함으로써 워터마크의 존재여부를 검증한다. 제안한 방법은 워터마크 삽입/추출시 반복되는 홀로그램정보를 활용하고, 이진 값으로 구성되어 있으므로 기존의 어떠한 워터마킹 기술보다 외부 공격에 견실한 특징을 가지고 있으며, 컴퓨터 시뮬레이션을 통해 그 성능을 확인하였다.

  • PDF

An Implementation of Optical Security System using Interferometer and Cascaded Phase Keys (간섭계와 직렬 위상 키를 이용한 광 보안 시스템의 구현)

  • Kim Cheol-Su
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2006.05a
    • /
    • pp.205-210
    • /
    • 2006
  • 본 논문에서는 간섭계와 직렬 위상 카드를 이용한 광 보안 시스템을 제안하였다. 먼저 원영상을 암호화하기 위해 원영상을 암호화하는 것이 아니라 원영상에 대한 이진 위상 컴퓨터형성홀로그램을 반복 알고리즘을 이용하여 구하고, 이진 위상 컴퓨터형성홀로그램과 무작위 생성된 위상 키 영상과의 XOR 연산을 통해 암호화된 영상을 구한다. 홀로그램의 복호화 과정은 암호화된 영상과 암호화시에 사용된 무작위 위상 영상 키를 직렬 정합시킨 후, 기준파와의 간섭에 의해 수행된다. 이때, 간섭패턴은 주위 환경에 상당히 민감하다. 그래서 광굴절매질의 자기위상공액성질을 이용하여 안정된 간섭패턴을 얻는다. 그리고 원영상은 복원된 홀로그램을 위상 변조한 후, 역푸리에 변환하여 최종적으로 구한다. 제안된 시스템에서는 암호화시에 사용된 무작위 키 영상 정보가 없으면 전혀 복원이 되지 않고, 키 영상을 달리함에 따라 복원되는 홀로그램의 패턴을 달리할 수 있으므로 차별화된 인증 시스템에 활용할 수 있다. 그리고 홀로그램의 성질에 의해 암호화된 영상이 일부 절단되더라도 원래의 영상을 복원할 수 있다.

  • PDF

Diffraction grating interferometer for null testing of aspheric surface with binary amplitude CGH (이진 컴퓨터 형성 홀로그램을 이용한 비구면 형상 측정용 위상편이 회절격자 간섭계)

  • 황태준;김승우
    • Korean Journal of Optics and Photonics
    • /
    • v.15 no.4
    • /
    • pp.313-320
    • /
    • 2004
  • We present a null testing method fer aspheric surfaces, utilizing a phase-shifting diffraction grating interferometer along with a binary amplitude computer generated hologram (CGH). The binary amplitude CGH is designed to compensate for the wavefront between a point source and the aspheric surface under test. The fringe visibility of the grating interferometer is controlled easily by selecting suitable grating diffraction orders for the measurement and reference wavefronts or by optimizing the groove shape of the grating used. The binary amplitude CGH is designed by numerical analysis of ray tracing and fabricated using e-beam lithography for autostigmatic testing. Experimental results of a large-scale aspheric mirror surface are discussed to verify the measurement performance of the proposed diffraction grating interferometer.

An Improvement of Image Encryption using Binary Phase Computer Generated Hologram and Multi XOR Operations (이진위상 컴퓨터형성홀로그램과 다중 XOR 연산을 이용한 영상 암호화의 개선)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.110-116
    • /
    • 2008
  • In this paper, we proposed an improvement technique of image encryption using binary phase computer generated hologram(BPCGH) and multi exclusive-OR(XOR) operations. For the encryption process, a BPCGH that reconstructs the original image is designed, using an iterative algorithm, and the resulting hologram is regarded as the image to be encrypted. The BPCGH is encrypted through the exclusive-OR operation with the random generated phase key image. Then the encrypted image is divided into several slide images using XOR operations. So, the performance of encryption for the image is improved. For the decryption process, we cascade the encrypted slide images and phase key image and interfere with reference wave. Then decrypted hologram image is transformed into phase information. Finally, the original image is recovered by an inverse Fourier transformation of the phase information. If the slide images are changed, we can get various decrypted BPCGH images. In the proposed security system, without a random generated key image, the original image can not be recovered. And we recover another hologram pattern according to the slide images, so it can be used in the differentiated authorization system.

  • PDF

An Iterative Digital Image Watermarking Technique using Encrypted Binary Phase Computer Generated Hologram in the DCT Domain (DCT 영역에서 암호화된 이진 위상 컴퓨터형성 홀로그램을 이용한 반복적 디지털 영상 워터마킹 기술)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.3
    • /
    • pp.15-21
    • /
    • 2009
  • In this paper, we proposed an iterative digital image watermarking technique using encrypted binary phase computer generated hologram in the discrete cosine transform(OCT) domain. For the embedding process of watermark, using simulated annealing algorithm, we would generate a binary phase computer generated hologram(BPCGH) which can reconstruct hidden image perfectly instead of hidden image and repeat the hologram and encrypt it through the XOR operation with key image that is ramdomly generated binary phase components. We multiply the encrypted watermark by the weight function and embed it into the DC coefficients in the DCT domain of host image and an inverse DCT is performed. For the extracting process of watermark, we compare the DC coefficients of watermarked image and original host image in the DCT domain and dividing it by the weight function and decrypt it using XOR operation with key image. And we recover the hidden image by inverse Fourier transforming the decrypted watermark. Finally, we compute the correlation between the original hidden image and recovered hidden image to determine if a watermark exits in the host image. The proposed watermarking technique use the hologram information of hidden image which consist of binary values and encryption technique so it is very secure and robust to the external attacks such as compression, noises and cropping. We confirmed the advantages of the proposed watermarking technique through the computer simulations.

A Proposal of Combined Iterative Algorithm for Optimal Design of Binary Phase Computer Generated Hologram (최적의 BPCGH 설계를 위한 합성 반복 알고리듬 제안)

  • Kim Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.10 no.4
    • /
    • pp.16-25
    • /
    • 2005
  • In this paper, we proposed a novel algorithm combined simulated annealing and genetic algorithms for designing optimal binary phase computer generated hologram. In the process of genetic algorithm searching by block units, after the crossover and mutation operations, simulated annealing algorithm searching by pixel units is inserted. So, the performance of BPCGH was improved. Computer simulations show that the proposed combined iterative algorithm has better performance than the simulated annealing algorithm in terms of diffraction efficiency

  • PDF

Digital Image Watermarking Technique using Scrambled Binary Phase Computer Generated Hologram in Discrete Cosine Transform Domain (DCT영역에서 스크램블된 이진 위상 컴퓨터형성홀로그램을 이용한 디지털 영상 워터마킹 기술)

  • Kim, Cheol-Su
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.3
    • /
    • pp.403-413
    • /
    • 2011
  • In this paper, we proposed a digital image watermarking technique using scrambled binary phase computer generated hologram in the discrete cosine transform(DCT) domain. For the embedding process of watermark. Using simulated annealing algorithm, we would generate a binary phase computer generated hologram(BPCGH) which can reconstruct hidden image perfectly instead of hidden image and encrypt it through the scramble operation. We multiply the encrypted watermark by the weight function and embed it into the DC coefficients in the DCT domain of host image and an inverse DCT is performed. For the extracting process of watermark, we compare the DC coefficients of watermarked image and original host image in the DCT domain and dividing it by the weight function and decrypt it using descramble operation. And we recover the hidden image by inverse Fourier transforming the decrypted watermark. Finally, we compute the correlation between the original hidden image and recovered hidden image to determine if a watermark exits in the host image. The proposed watermarking technique use the hologram information of hidden image which consist of binary values and scramble encryption technique so it is very secure and robust to the various external attacks such as compression, noises and cropping. We confirmed the advantages of the proposed watermarking technique through the computer simulations.

An Implementation of Stable Optical Security System using Interferometer and Cascaded Phase Keys (간섭계와 직렬 위상 키를 이용한 안정한 광 보안 시스템의 구현)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.1
    • /
    • pp.101-107
    • /
    • 2007
  • In this paper, we proposed an stable optical security system using interferometer and cascaded phase keys. For the encryption process, a BPCGH(binary phase computer generated hologram) that reconstructs the origial image is designed, using an iterative algorithm and the resulting hologram is regarded as the image to be encrypted. The BPCGH is encrypted through the exclusive-OR operation with the random generated phase key image. For the decryption process, we cascade the encrypted image and phase key image and interfere with reference wave. Then decrypted hologram image is transformed into phase information. Finally, the origianl image is recovered by an inverse Fourier transformation of the phase information. During this process, interference intensity is very sensitive to external vibrations. a stable interference pattern is obtained using self-pumped phase-conjugate minor made of the photorefractive material. In the proposed security system, without a random generated key image, the original image can not be recovered. And we recover another hologram pattern according to the key images, so can be used an authorized system.

  • PDF

Double Encryption of Digital Hologram Based on Phase-Shifting Digital Holography and Digital Watermarking (위상 천이 디지털 홀로그래피 및 디지털 워터마킹 기반 디지털 홀로그램의 이중 암호화)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2017
  • In this Paper, Double Encryption Technology Based on Phase-Shifting Digital Holography and Digital Watermarking is Proposed. For the Purpose, we First Set a Logo Image to be used for Digital Watermark and Design a Binary Phase Computer Generated Hologram for this Logo Image using an Iterative Algorithm. And Random Generated Binary Phase Mask to be set as a Watermark and Key Image is Obtained through XOR Operation between Binary Phase CGH and Random Binary Phase Mask. Object Image is Phase Modulated to be a Constant Amplitude and Multiplied with Binary Phase Mask to Generate Object Wave. This Object Wave can be said to be a First Encrypted Image Having a Pattern Similar to the Noise Including the Watermark Information. Finally, we Interfere the First Encrypted Image with Reference Wave using 2-step PSDH and get a Good Visible Interference Pattern to be Called Second Encrypted Image. The Decryption Process is Proceeded with Fresnel Transform and Inverse Process of First Encryption Process After Appropriate Arithmetic Operation with Two Encrypted Images. The Proposed Encryption and Decryption Process is Confirmed through the Computer Simulations.

A Study on Lohmann Type Computer Generated Holograms Using a Circular Cell (원형 셀을 이용한 Lohmann형 컴퓨터 형성 홀로그램에 관한 연구)

  • Seo, Choon-Su;Jeong, Man-Ho
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.6
    • /
    • pp.519-524
    • /
    • 2006
  • In general, the Lohmann-type binary hologram represents its amplitude and phase by using the rectangular cell. In this paper, we adapts a circular cell to represents the amplitude and phase of holograms. In order to compare the characteristics of the circular cell with the rectangular one, we analyzed the results based on the computer simulations and various optical experiments. The results show that a clearer reconstructed image can be obtained by dividing one cell into many pixels. In the case of a uniform reconstructed image, the rectangular cell is better than the circular cell. However, as for the brightness of the reconstructed image, the circular cell is better than the rectangular one.