• Title/Summary/Keyword: Mirror image rule

Search Result 5, Processing Time 0.022 seconds

Estimation of Specular Light Power by Adjusting Incident Laser Power for Measuring Mirror-Like Surface Roughness (경면 거칠기 측정을 위해 레이저 입사 강도 조정에 의한 정반사 광량 추정 알고리즘 개발)

  • 서영호;김주년;안중환
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.21 no.6
    • /
    • pp.94-101
    • /
    • 2004
  • From the Beckmann's reflection model of wave incident, reflected light from a surface is known to have not only specular but also diffuse components. The specular component dominant a surface for a mirror-like surface is distributed on the almost the same area as the spot on the surface, but the diffuse component region dominant f3r a rough surface spreads scattered on the larger areas than the spot. Therefore, statistic parameters from the scattered light distribution are more meaningful in the diffuse region, while the magnitude of rather meaning in the specular region. In usual, there need two sensors to acquire two kinds of information: Photo-detector for light intensity magnitude and image sensor for light intensity distribution. But dual sensor scheme requires a beam splitter usually to feed light to each sensor, and moreover there is not a combination rule to relieve the different sensor characteristics. In this study a new method is proposed for acquisition of the dual information using only an image sensor. Specular region is established on an image area being distinguished from a diffuse component, and laser power is adjusted so that no pixel of the image sensor in the specular region is saturated. Simulation based on the light reflection theory and the experimental results are quite well matched, and thus the proposed method was proved to be very useful for mirror-like surface measurement.

Implementation of Stable Optical Information Security System using Interference Hologram and Photorefractive Material (간섭 홀로그램과 광굴절매질을 이용한 안정한 광 정보보호 시스템의 구현)

  • 김철수
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2001.05a
    • /
    • pp.64-76
    • /
    • 2001
  • In this paper, A simple image hologram encryption and decryption technique based on the principle of interference are proposed. The technique using the photorefractive material for getting a stable interference pattern is also proposed. And combine these two techniques, I would like to implement a stable optical information security system. In the encrypting process, I would generate binary phase hologram which can reconstruct original image perfectly, and regard this hologram as original image to be encrypted image. And then the hologram is encrypted as randomly generated binary phase image. Reference image is also generated from the encrypted image by applying interference rule. In the decrypting process, I can get a interference intensity by interfering the reference image and the encrypted image in the interferometer. and transform inferference intensity information into phase information. I recover original image by inverse Fourier transforming the phase information. In this process, the intensity information generated by interference of two images is very sensitive to external vibrations. So, I would like to get a stable interference using the characteristic of SPPCM(self pumped phase conjugate mirror) in photorefractive materials, especially BaTiO₃.

  • PDF

Optical Image Hiding Technique using Real-Valued Decoding Key (실수값 복원키를 이용한 광 영상 은닉 기술)

  • Cho, Kyu-Bo;Seo, Dong-Hoan;Choi, Eun-chang
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.6 no.3
    • /
    • pp.168-173
    • /
    • 2011
  • In this paper, an optical image hiding technique using real-valued decoding key is proposed. In the embedding process, a each zero-padded original image placed in a quadrants on an input plane is multiplied by a statistically independent random phase pattern and is Fourier transformed. An encoded image is obtained by taking the real-valued data from the Fourier transformed image. And then a phase-encoded pattern, used as a hidden image and a decoding key, is generated by the use of multiple phase wrapping from the encoded images. A transmitted image is made from the linear superposition of the weighted hidden images and a cover image. In reconstruction process, the mirror reconstructed images can be obtained at two quadrants by the inverse-Fourier transform of the product of the transmitted image and the decoding key. Computer simulation and optical experiment are demonstrated in order to confirm the proposed technique.

A Comparative Law Study on the Formation of Contracts for the International Sale (국제매매계약(國際賣買契約)의 성립(成立)에 관한 비교법적(比較法的) 연구(硏究) - CISG와 UNIDROIT 원칙(原則)을 중심(中心)으로 -)

  • Bae, Jun-Il
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.12
    • /
    • pp.85-106
    • /
    • 1999
  • To the extent that CISG and UNIDROIT Principles address the same issues, the rules laid down in the latter are normally taken either literally or at least in substance from the corresponding provisions of the former. Nevertheless, we may find cases where the latter depart from the former. The purpose of this paper is comparison of the two instruments, especially in part of contract formation. The result of this paper shows the fact that in the chapter of UNIDROIT Principles on formation provisions are included on the manner in which requirements that an offer and an acceptance must meet are more comprehensive, and in result a contract may be concluded more easily.

  • PDF

Implementation of Stable Optical Information Security System using Interference-based Computer Generated Hologram iud $BaTiO_3$ (간섭을 기반으로한 컴퓨터형성홀로그램과 $BaTiO_3$를 이용한 안정한 광 정보보호 시스템의 구현)

  • 김철수;김종윤;박영호;김수중;조창섭
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8C
    • /
    • pp.827-834
    • /
    • 2003
  • In this paper, we implemented an optical information security system using computer generated hologram based on the principle of interference and BaTiO$_3$that is photorefractive material. First of all, we would generate binary phase hologram which can reconstruct the original image perfectly, and regard this hologram as the image to be encrypted. And then applying the interference rule to the hologram, encrypted and reference (fkey information) images are generated. In the decrypting process, we can get an interference intensity by interfering the reference image and the encrypted image in the Mach-Zehnder interferometer. and transforming interference intensity information into phase information using LCD(liquid crystal display) and finally recover original image by inverse Fourier transforming the phase information. In this process, the Intensity information generated by interference of two images is very sensitive to external vibrations. So, we get a stable interference using the characteristic of SPPCM(self pumped phase conjugate mirror) of BaTiO$_3$that is photorefractive material. The proposed method has an advantage of double image encryption by encrypting the hologram of the image instead of original image.