• Title/Summary/Keyword: Computer holography

Search Result 86, Processing Time 0.026 seconds

Computer simulation of the removal of the 0-th order diffraction by using fourier transform in digital holography (디지털 홀로그래피에서 퓨리어 변환을 이용한 0차 회절광의 제거와 위상홀로그램의 생성에 대한 전산 모사)

  • Kim, Sung-Kyu;Park, Min-Chul;Lee, Seok;Kim, Jae-Soon;Son, Jung-Young
    • Korean Journal of Optics and Photonics
    • /
    • v.15 no.1
    • /
    • pp.39-45
    • /
    • 2004
  • A computer simulation about removal of the 0-th order diffraction is achieved by using numerical reconstruction in digital holography and the Fourier transform method. A light intensity distribution hologram is generated through numerical calculation of the interference pattern. Additionally a phase hologram without the 0-th order diffraction is generated. The removal function for elimination of the 0-the order diffraction is introduced and the numerical reconstructions with several conditions for the removal of the 0-th order diffraction and the production of high quality numerically reconstructed images are tested and compared. The removal function is proven to be more effective at the suppression of the 0-th order diffraction compared with the DC suppression method.

Double Encryption of Digital Hologram Based on Phase-Shifting Digital Holography and Digital Watermarking (위상 천이 디지털 홀로그래피 및 디지털 워터마킹 기반 디지털 홀로그램의 이중 암호화)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2017
  • In this Paper, Double Encryption Technology Based on Phase-Shifting Digital Holography and Digital Watermarking is Proposed. For the Purpose, we First Set a Logo Image to be used for Digital Watermark and Design a Binary Phase Computer Generated Hologram for this Logo Image using an Iterative Algorithm. And Random Generated Binary Phase Mask to be set as a Watermark and Key Image is Obtained through XOR Operation between Binary Phase CGH and Random Binary Phase Mask. Object Image is Phase Modulated to be a Constant Amplitude and Multiplied with Binary Phase Mask to Generate Object Wave. This Object Wave can be said to be a First Encrypted Image Having a Pattern Similar to the Noise Including the Watermark Information. Finally, we Interfere the First Encrypted Image with Reference Wave using 2-step PSDH and get a Good Visible Interference Pattern to be Called Second Encrypted Image. The Decryption Process is Proceeded with Fresnel Transform and Inverse Process of First Encryption Process After Appropriate Arithmetic Operation with Two Encrypted Images. The Proposed Encryption and Decryption Process is Confirmed through the Computer Simulations.

Fast Computation Algorithm of Fresnel Holograms Using Recursive Addition Method (반복 가산 기법을 이용한 Fresnel 홀로그램의 고속 계산 알고리듬)

  • Choi, Hyun-Jun;Seo, Young-Ho;Kim, Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5C
    • /
    • pp.386-394
    • /
    • 2008
  • For digital holographic video system, it is important to generate digital hologram as fast as possible. This paper proposed a fixed-point method and fast generation method that can calculate the Fresnel hologram using operation of whole-coordinate recursive addition. To compute the digital hologram, 3D object is assumed to be a collection of depth-map point generated using a PC. Our algorithm can compute a phase on a hologram by recursive addition with fixed-point format at a high speed. When we operated this algorithm on a personal computer, we could maximally compute digital hologram about 70% faster than conventional method and about 30% faster than of [3]'s method.

Recording of larger object by using two confocal lenses in digital holography (디지털 홀로그래피에서의 공초점 렌즈계를 이용한 보다 큰 물체의 기록)

  • 김성규;최현희;손정영
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.3
    • /
    • pp.244-248
    • /
    • 2003
  • When confocal lenses are applied to a digital holography system, the interference pattern of a larger object size can be recorded on CCD. The angle of incoming light to the CCD can be reduced by the ratio of the two focal lengths of confocal lenses. The recordable spatial frequency is limited by the unit cell size of the CCD. Therefore the spatial frequency of interference on the CCD is lowered by reduction of the incoming light angle. By using confocal lenses , another merit can be achieved that the area of the zero order diffraction is reduced by the square of the ratio of two focal lengths at the numerical reconstruction.

Secret-key-sharing Cryptosystem Using Optical Phase-shifting Digital Holography

  • Jeon, Seok Hee;Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • v.3 no.2
    • /
    • pp.119-127
    • /
    • 2019
  • A new secret-key-sharing cryptosystem using optical phase-shifting digital holography is proposed. The proposed secret-key-sharing algorithm is based on the Diffie-Hellman key-exchange protocol, which is modified to an optical cipher system implemented by a two-step quadrature phase-shifting digital holographic encryption method using orthogonal polarization. Two unknown users' private keys are encrypted by two-step phase-shifting digital holography and are changed into three digital-hologram ciphers, which are stored by computer and are opened to a public communication network for secret-key-sharing. Two-step phase-shifting digital holograms are acquired by applying a phase step of 0 or ${\pi}/2$ in the reference beam's path. The encrypted digital hologram in the optical setup is a Fourier-transform hologram, and is recorded on CCDs with 256 quantized gray-level intensities. The digital hologram shows an analog-type noise-like randomized cipher with a two-dimensional array, which has a stronger security level than conventional electronic cryptography, due to the complexity of optical encryption, and protects against the possibility of a replay attack. Decryption with three encrypted digital holograms generates the same shared secret key for each user. Schematically, the proposed optical configuration has the advantage of producing a kind of double-key encryption, which can enhance security strength compared to the conventional Diffie-Hellman key-exchange protocol. Another advantage of the proposed secret-key-sharing cryptosystem is that it is free to change each user's private key in generating the public keys at any time. The proposed method is very effective cryptography when applied to a secret-key-exchange cryptosystem with high security strength.

Photon-counting digital holography

  • Hayasaki, Yoshio
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2009.10a
    • /
    • pp.165-166
    • /
    • 2009
  • A hologram was recorded with two-dimensional scanning of an optical fiber connected to a single-photon counting detector under ultra-weak illumination. The object image was clearly reconstructed in a computer from the hologram. The dependence of hologram quality on the illumination light intensity was estimated.

  • PDF

Digital Holography for 3D Color Display of Real Objects incoherently illuminated

  • Yatagai, Toyohiko;Sando, Yusuke
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2005.07a
    • /
    • pp.117-120
    • /
    • 2005
  • The proposed method is based on extracting information from 3-D Fourier spectra calculated from some projection incoherent images. Three colored computer-generated holograms (CGHs) are synthesized from 3-D Fourier spectra. Optically reconstructed full-color images are presented.

  • PDF

Research Activities on Holographic Video in Japan

  • Yoshikawa, Hiroshi
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2009.10a
    • /
    • pp.1175-1178
    • /
    • 2009
  • Recently, researches on holographic 3D video display are getting very active, though the goal is still challenging. This paper describes recent research activities on the holographic video system in Japan. It includes hologram calculations and acquisitions as well as displays.

  • PDF

Error Analysis for Optical Security by means of 4-Step Phase-Shifting Digital Holography

  • Lee, Hyun-Jin;Gil, Sang-Keun
    • Journal of the Optical Society of Korea
    • /
    • v.10 no.3
    • /
    • pp.118-123
    • /
    • 2006
  • We present an optical security method for binary data information by using 4-step phase-shifting digital holography and we analyze tolerance error for the decrypted data. 4-step phase-shifting digital holograms are acquired by moving the PZT mirror with equidistant phase steps of ${\pi}/2$ in the Mach-Zender type interferometer. The digital hologram in this method is a Fourier transform hologram and is quantized with 256 gray level. The decryption performance of the binary data information is analyzed. One of the most important errors is the quantization error in detecting the hologram intensity on CCD. The greater the number of quantization error pixels and the variation of gray level increase, the more the number of error bits increases for decryption. Computer experiments show the results for encryption and decryption with the proposed method and show the graph to analyze the tolerance of the quantization error in the system.

Theoretical study on incoherent triangular holography without bias and conjugate image (바이어스와 공액영상이 제거된 인코히어런트 삼각 홀로그래피에 대한 이론적 연구)

  • Kim, Soo-Gil;Kim, Eun-Soo;Lee, Hyuk;Lee, Byoung-Ho
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.10
    • /
    • pp.144-151
    • /
    • 1996
  • In this paper, the theoretical analysis and the computer simulation of a new modified cochran's triangular interferometer as an incoherent holography, which can eliminate bias and conjugate image problems of the conventional cochran's triangular interferometer, are spresented. In other words, it is theoretically derived by using jones matrix operation that bias and conjugate image can be removed by adding simple optical components including a polarizing beam splitter, wave plates, and linear polarizers to the conventional with a point source, we demonstrated the validity of the suggested method by comparing the modified cocharan's triangular interferometer with the conventional one.

  • PDF