• Title/Summary/Keyword: 컴퓨터-생성 홀로그램

Search Result 86, Processing Time 0.025 seconds

Bus Architecture Analysis for System of Computer Generated Hologram (컴퓨터 생성 홀로그램 시스템의 버스 구조 분석)

  • Han, Ic-Syup;Lee, Yoon-Hyuk;Seo, Younh-Ho;Kim, Dong-Wook
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.07a
    • /
    • pp.115-116
    • /
    • 2012
  • 최근 차세대 영상 기술로 홀로그래피가 많은 주목을 받고 있다. 컴퓨터를 이용한 홀로그램 생성 방법(computer generated hologram, CGH)을 많이 사용하고 있는데 CGH는 많은 연산량이 요구되기 때문에 실시간의 CGH를 위해서 FPGA나 GPU를 이용한 연산 방법이 주로 사용되고 있다. 하드웨어를 기반으로 하여 구현할 경우에 내부 시스템의 비트 제한으로 인하여 S/W와 같은 품질을 얻을 수 없다. 따라서 본 논문에서는 품질의 저하를 최소화하면서 하드웨어의 자원을 최대한 감소시킬 수 있는 하드웨어 비트 너비를 분석하여 가이드라인을 제시하고자 한다.

  • PDF

Design of optimal BPCGH using combination of GA and SA Algorithm (GA와 SA 알고리듬의 조합을 이용한 최적의 BPCGH의 설계)

  • 조창섭;김철수;김수중
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5C
    • /
    • pp.468-475
    • /
    • 2003
  • In this Paper, we design an optimal binary phase computer generated hologram for Pattern generation using combined genetic algorithm and simulated annealing algorithm together. To design an optimal binary phase computer generated hologram, in searching process of the proposed method, the simple genetic algorithm is used to get an initial random transmittance function of simulated annealing algorithm. Computer simulation shows that the proposed algorithm has better performance than the genetic algorithm or simulated annealing algorithm of terms of diffraction efficiency

Design of Fresnelet Transform based on Wavelet function for Efficient Analysis of Digital Hologram (디지털 홀로그램의 효율적인 분해를 위한 웨이블릿 함수 기반 프레넬릿 변환의 설계)

  • Seo, Young-Ho;Kim, Jin-Kyum;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.3
    • /
    • pp.291-298
    • /
    • 2019
  • In this paper, we propose a Fresnel transform method using various wavelet functions to efficiently decompose digital holograms. After implementing the proposed wavelet function-based Fresnelet transforms, we apply it to the digital hologram and analyze the energy characteristics of the coefficients. The implemented wavelet transform-based Fresnelet transform is well suited for reconstructing and processing holograms which are optically obtained or generated by computer-generated hologram technique. After analyzing the characteristics of the spline function, we discuss wavelet multiresolution analysis method based on it. Through this process, we proposed a transform tool that can effectively decompose fringe patterns generated by optical interference phenomena. We implement Fresnelet transform based on wavelet function with various decomposition properties and show the results of decomposing fringe pattern using it. The results show that the energy distribution of the coefficients is significantly different depending on whether the random phase is included or not.

An Improvement of Image Encryption using Binary Phase Computer Generated Hologram and Multi XOR Operations (이진위상 컴퓨터형성홀로그램과 다중 XOR 연산을 이용한 영상 암호화의 개선)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.110-116
    • /
    • 2008
  • In this paper, we proposed an improvement technique of image encryption using binary phase computer generated hologram(BPCGH) and multi exclusive-OR(XOR) operations. For the encryption process, a BPCGH that reconstructs the original image is designed, using an iterative algorithm, and the resulting hologram is regarded as the image to be encrypted. The BPCGH is encrypted through the exclusive-OR operation with the random generated phase key image. Then the encrypted image is divided into several slide images using XOR operations. So, the performance of encryption for the image is improved. For the decryption process, we cascade the encrypted slide images and phase key image and interfere with reference wave. Then decrypted hologram image is transformed into phase information. Finally, the original image is recovered by an inverse Fourier transformation of the phase information. If the slide images are changed, we can get various decrypted BPCGH images. In the proposed security system, without a random generated key image, the original image can not be recovered. And we recover another hologram pattern according to the slide images, so it can be used in the differentiated authorization system.

  • PDF

Computer generated hologram compression using video coding techniques (비디오 코딩 기술을 이용한 컴퓨터 형성 홀로그램 압축)

  • Lee, Seung-Hyun;Park, Min-Sun
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.5
    • /
    • pp.767-774
    • /
    • 2005
  • In this paper, we propose an efficient coding method of digital hologram using standard compression tools for video images. At first, we convert fringe patterns into video data using a principle of CGH(Computer Generated Hologram), and then encode it. In this research, we propose a compression algorithm is made up of various method such as pre-processing for transform, local segmentation with global information of object image, frequency transform for coding, scanning to make fringe to video stream, classification of coefficients, and hybrid video coding. The proposed algorithm illustrated that it have better properties for reconstruction and compression rate than the previous methods.

  • PDF

Digital watermarking technique using Computer-Generated Hologram and optoelectrical extraction algorithm (컴퓨터 형성 홀로그램과 광전자적 추출 알고리즘을 이용한 디지털 워터마킹 방법)

  • Cho, Kyu-Bo;Shin, Chang-Mok;Kim, Soo-Joong
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.1
    • /
    • pp.31-37
    • /
    • 2006
  • We propose a digital watermarking technique using a computer generated hologram. The proposed method uses two random patterns separated from the computer generated hologram (CGH). One of those is embedded into the original image as hidden watermark information and then the reconstructed image can be obtained by an optical decoding algorithm with the other one as a decoding key. We analyze an occlusion of the watermarked image that is the original image containing the hidden pattern. The embedding process is performed digitally and reconstruction optically Computer simulation and an optical experiment are shown in support of the proposed technique.

Hologram Compression Technique using Motion Compensated Temporal Filtering (움직임보상 시간적 필터링을 이용한 홀로그램 압축 기법)

  • Seo, Young-Ho;Choi, Hyun-Jun;Kim, Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11B
    • /
    • pp.1296-1302
    • /
    • 2009
  • We propose an efficient coding method of digital holograms using MCTF and standard compression tools for video. The hologram is generated by a computer-generated hologram (CGH) algorithm with both an object image and its depth information. The proposed coding consists of localization by segmenting a hologram, frequency transform using $64\times64$ segment size, 2-D discrete cosine transform DCT for extracting redundancy, motion compensated temporal filtering (MCTF), segment scanning the segmented hologram to form a video sequence, and video coding, which uses H.264/AVC. The proposed algorithm illustrates that it has better properties for reconstruction, 10% higher compression rate than previous research in case of object.

Character Floating Hologram using Detection of User's Height and Motion by Depth Image (깊이 영상으로 사용자 키 검출 및 동작감지를 사용한 캐릭터 플로팅 홀로그램)

  • Oh, KyooJin;Han, DaeHyun;Kwon, SoonKak
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.4
    • /
    • pp.33-40
    • /
    • 2018
  • With the development of computer and video technology, a lot of contents are being produced as digital media methods to provide are being diversified and the intrest in digital media increases. Such contents are actively researched using human motion and user's information through camera or controller. Contents using user's information can be exposed to various people in public places and used as an advertisement. This paper proposes the character floating hologram system that is implemented using detection of user's height and motion. The purposed system detects user's height and motion from depth images and creates corresponding character from the detected data. Then it is represented using a floating hologram device. This system can be used for marketing, advertising and exhibition events using user information.

Analysis of CGH and Watermarking Method using Global 2DDCT (전역 2차원 DCT를 이용한 디지털 홀로그램의 분석 및 워터마킹 기법)

  • Choi, Hyun-Jun;Seo, Young-Ho;Yoo, Ji-Sang;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1267-1274
    • /
    • 2007
  • In this paper, we propose a digital watermarking algorithm for digital hologram generated by computer generated hologram(CGH) method. Digital hologram generated by a computer calculation(CGH) is one of the most expensive contents and its usage is being expanded. Thus, it is highly necessary to protect the ownership of digital hologram. In this paper two digital watermarking schemes are introduced hologram-domain and global 2DDCT-domain scheme. Proposed watermarking scheme showed very high imperceptibility and quite high robustness against the attacks. The purpose of this paper is to introduce these global 2DDCT based watermarking schemes. Thus, we expect that these and the contents in this paper can be very useful bases for the further digital watermarking schemes of the digital holograms.

Fast Generation of 3-D Hologram Fringe Patterns by using the Block Redundancy of 3-D Object Images and the Novel Look-up Table Method (3차원 영상의 블록 중복성 및 N-LUT 기법을 이용한 3차원 홀로그램 프린지 패턴의 고속합성)

  • Kim, Si-Hyung;Koo, Jung-Sik;Kim, Seung-Cheol;Kim, Eun-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2355-2364
    • /
    • 2012
  • Recently, the novel loop-up table(N-LUT) method to solve the tremendous memory problem of the conventional look-up table (LUT) method as well as to increase the generation speed of hologram patterns has been proposed. But, as the resolution of an input 3-D object is enhanced, the number of object points to be calculated for generation of its hologram pattern also increases, which results in a sharp increase of the computation time. Therefore, in this paper, a new approach for fast generation of the hologram pattern of 3-D object images is proposed by using the block redundancy feature of 3-D object images and the N-LUT method. Experimental results show that in the proposed method the number of object points and the overall computation time have been reduced by 43.3 % and 47.9 %, respectively compared to those of the conventional method for the case of the $5{\times}5$ block size. These good experimental results finally confirm the feasibility of the proposed method.