• Title/Summary/Keyword: Binary Phase Computer Generated Hologram

Search Result 22, Processing Time 0.024 seconds

Effects of the Phase Error on the MTF Characteristics of Binary-phase Hologram Optical Low-pass Filter (컴퓨터로 설계한 2 위상 흘로그램 광 저대역 필터에서 위상차가 필터의 MTF 특성에 미치는 영향)

  • Go, Chun-Soo;Oh, Yong-Ho
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.18 no.8
    • /
    • pp.739-746
    • /
    • 2005
  • When we design a binary phase holographic optical low-pass filter (HOLF), the phase difference is generally set to be $\pi$ to optimize the diffraction efficiency. However, the phase difference of real HOLF mostly deviate from $\pi$ by the error in the fabrication process. The deviation causes the (0,0)-th order diffracted beam to increase, which results In raising the diffraction efficiency. To study the effects of the phase error on the performance of HOLF, we calculated the MTF of HOLF for various phase differences. The results show that the phase error of 10 $\%$ makes little change in the filtering characteristics of HOLF. Considering the filtering by lens and CCD, the effects of the phase error becomes much smaller. To confirm it experimentally, we fabricated HOLFs for various phase differences. After installing it in a digital camera, we take picture of test targets and observe the Moire fringes and the resolution. The results agree with our prediction.

Diffraction grating interferometer for null testing of aspheric surface with binary amplitude CGH (이진 컴퓨터 형성 홀로그램을 이용한 비구면 형상 측정용 위상편이 회절격자 간섭계)

  • 황태준;김승우
    • Korean Journal of Optics and Photonics
    • /
    • v.15 no.4
    • /
    • pp.313-320
    • /
    • 2004
  • We present a null testing method fer aspheric surfaces, utilizing a phase-shifting diffraction grating interferometer along with a binary amplitude computer generated hologram (CGH). The binary amplitude CGH is designed to compensate for the wavefront between a point source and the aspheric surface under test. The fringe visibility of the grating interferometer is controlled easily by selecting suitable grating diffraction orders for the measurement and reference wavefronts or by optimizing the groove shape of the grating used. The binary amplitude CGH is designed by numerical analysis of ray tracing and fabricated using e-beam lithography for autostigmatic testing. Experimental results of a large-scale aspheric mirror surface are discussed to verify the measurement performance of the proposed diffraction grating interferometer.

Analysis of Reconstructed Images of Computer Generated Hologram Formed according to Grating Modulation Methods (회절격자의 변조방식에 따라 형성된 CGH의 재생 영상 분석)

  • Jeong, Man-Ho
    • Korean Journal of Optics and Photonics
    • /
    • v.19 no.5
    • /
    • pp.360-364
    • /
    • 2008
  • The diffraction efficiencies of gratings are affected by the inner structure which is determined by modulation type. CGH (Computer generated Hologram) basically uses the principles of a diffraction grating. As like as the diffraction gratings the patterns recorded in the CGH are different according to modulation methods which result in the performances of the reconstructed images. In this paper, on this fact CGHs are recorded according to sinusoidal and rectangular modulation methods and the characteristics of reconstructed images are analyzed. Also the reconstruction performances of the amplitude and phase, phase-only and binary phase CGH are analyzed.

Implementation of Stable Optical Information Security System using Interference-based Computer Generated Hologram iud $BaTiO_3$ (간섭을 기반으로한 컴퓨터형성홀로그램과 $BaTiO_3$를 이용한 안정한 광 정보보호 시스템의 구현)

  • 김철수;김종윤;박영호;김수중;조창섭
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8C
    • /
    • pp.827-834
    • /
    • 2003
  • In this paper, we implemented an optical information security system using computer generated hologram based on the principle of interference and BaTiO$_3$that is photorefractive material. First of all, we would generate binary phase hologram which can reconstruct the original image perfectly, and regard this hologram as the image to be encrypted. And then applying the interference rule to the hologram, encrypted and reference (fkey information) images are generated. In the decrypting process, we can get an interference intensity by interfering the reference image and the encrypted image in the Mach-Zehnder interferometer. and transforming interference intensity information into phase information using LCD(liquid crystal display) and finally recover original image by inverse Fourier transforming the phase information. In this process, the Intensity information generated by interference of two images is very sensitive to external vibrations. So, we get a stable interference using the characteristic of SPPCM(self pumped phase conjugate mirror) of BaTiO$_3$that is photorefractive material. The proposed method has an advantage of double image encryption by encrypting the hologram of the image instead of original image.

An Implementation of Stable Optical Security System using Interferometer and Cascaded Phase Keys (간섭계와 직렬 위상 키를 이용한 안정한 광 보안 시스템의 구현)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.1
    • /
    • pp.101-107
    • /
    • 2007
  • In this paper, we proposed an stable optical security system using interferometer and cascaded phase keys. For the encryption process, a BPCGH(binary phase computer generated hologram) that reconstructs the origial image is designed, using an iterative algorithm and the resulting hologram is regarded as the image to be encrypted. The BPCGH is encrypted through the exclusive-OR operation with the random generated phase key image. For the decryption process, we cascade the encrypted image and phase key image and interfere with reference wave. Then decrypted hologram image is transformed into phase information. Finally, the origianl image is recovered by an inverse Fourier transformation of the phase information. During this process, interference intensity is very sensitive to external vibrations. a stable interference pattern is obtained using self-pumped phase-conjugate minor made of the photorefractive material. In the proposed security system, without a random generated key image, the original image can not be recovered. And we recover another hologram pattern according to the key images, so can be used an authorized system.

  • PDF

Real time optical image generation using phase grating with simulated annealing algorithm (Simulated Annealing 알고리즘에 의한 위상격자를 이용한 실시간 광 영상 생성)

  • 김철수;김정우;배장근;김수중
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.33B no.6
    • /
    • pp.149-155
    • /
    • 1996
  • In this paper, we designed binary phase grating with SA (simulated annealing) algorithm for image generation, and used LCTV(liquid crystal television) as phase modulator. We generated optical image using LCTV which controlled by personal computer in real time. Many parameters in SA algorithm are determined by average deviation of the cost function, not experimental method. It was confirmed that the LCTV could be used as a phase modulator through mach-zehnder interferometering experiment. The various optical images are generated in real itme by fourier transforming of the phase gratings on LCTV which is controlled by personal computer and they can be used for optical interconnection in a neural network and addressing information in a volume hologram etc.

  • PDF

A Study on Lohmann Type Computer Generated Holograms Using a Circular Cell (원형 셀을 이용한 Lohmann형 컴퓨터 형성 홀로그램에 관한 연구)

  • Seo, Choon-Su;Jeong, Man-Ho
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.6
    • /
    • pp.519-524
    • /
    • 2006
  • In general, the Lohmann-type binary hologram represents its amplitude and phase by using the rectangular cell. In this paper, we adapts a circular cell to represents the amplitude and phase of holograms. In order to compare the characteristics of the circular cell with the rectangular one, we analyzed the results based on the computer simulations and various optical experiments. The results show that a clearer reconstructed image can be obtained by dividing one cell into many pixels. In the case of a uniform reconstructed image, the rectangular cell is better than the circular cell. However, as for the brightness of the reconstructed image, the circular cell is better than the rectangular one.

A Study on the Holographic Optical Element for Multiple Image Processing (다중 영상처리용 홀로그래피 광학소자에 관한 연구)

  • Kim, Nam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.12
    • /
    • pp.1353-1361
    • /
    • 1992
  • Holographic optical element(HOE) is fabricated with the properties of lightweight, thin thickness and interconnectivity for free space. Particularly, HOE for optical interconnection and multiple image processing should have a high efficiency and equal spot intensity, Nonlinear equations for 2-dimensional binary phase grating(BPG) structure is solved by computer simulation based on modified Newton method. Computer-generated pattern drawn by plotter is scaled down and translated into the microfilm. After contact printing between the microfilm and silver halide hologram film, phase diffraction grating produces the $5{\times}5$ multiple spots. Experimental results are shown that bleached phase grating has a high efficiency and equal focused beams except central zero order.

  • PDF

DCT영역에 기반한 반복적 이진위상컴퓨터형성홀로그램을 이용한 디지털 영상 워터마킹 기술

  • Kim, Cheol-Su
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2009.05a
    • /
    • pp.32-36
    • /
    • 2009
  • 본 논문에서는 DCT영역에서 반복적 이진위상컴퓨터형성홀로그램을 이용한 디지털 영상 워터마킹 기술을 제안하였다. 워터마크로 주로 사용되는 랜덤 시퀸스 또는 로고와 같은 은닉영상 대신 은닉영상을 손실없이 재생할 수 있는 이진위상컴퓨터형성홀로그램을 생성하고, 이를 반복적으로 표현해서 워터마크로 사용한다. 그리고 이 워터마크를 호스트영상의 DCT 계수에 적절한 규칙을 통해 가중치를 부여하여 삽입한 후, IDCT한다. 워터마크의 추출은 워터마킹된 영상과 호스트영상을 DCT하고, 삽입시 적용한 규칙을 통해서 수행한다. 그리고 추출된 워터마크의 역푸리에 변환과 호스트영상에 삽입하기전의 워터마크를 역푸리에 변환하여 재생한 은닉영상과의 상관을 취함으로써 워터마크의 존재여부를 검증한다. 제안한 방법은 워터마크 삽입/추출시 반복되는 홀로그램정보를 활용하고, 이진 값으로 구성되어 있으므로 기존의 어떠한 워터마킹 기술보다 외부 공격에 견실한 특징을 가지고 있으며, 컴퓨터 시뮬레이션을 통해 그 성능을 확인하였다.

  • PDF

Optical Visual Cryptography using the Characteristics of Spatial Light Modulation (공간광변조 특성을 이용한 광비쥬얼 크립토그래피)

  • Yi, Sang-Yi;Wi, Sung-Min;Lee, Seung-Hyun;Yoo, Ji-Sang;Kim, Dong-Wook
    • Korean Journal of Optics and Photonics
    • /
    • v.18 no.3
    • /
    • pp.202-207
    • /
    • 2007
  • Optical visual cryptography (OVC) based on binary computer generated holograms (BCGH) is proposed. OVC used optics instead of human eyesight for decryption of visual cryptography (VC). As a result, it was possible to adapt cryptography to an optical system. However, it also had some difficulties because it did not overcome the existing problems of VC completely. This paper suggests a method of optical cryptography implementation based on the phase modulation characteristics of a liquid crystal display (LCD). The problems are evaluated by simulation. This system shows that the noise is reduced and resolution is improved compared with the conventional OVC.