• Title/Summary/Keyword: Phase hologram

Search Result 148, Processing Time 0.024 seconds

Study on Digital Holography with Self-Reference Hologram (자체 홀로그램을 기준홀로그램으로 이용한 디지털 홀로그래피 연구)

  • Shin, Sang-Hoon;Cho, Hyung-Jun;Jung, Won-Ki;Kim, Doo-Cheol;Yu, Young-Hun
    • Korean Journal of Optics and Photonics
    • /
    • v.22 no.5
    • /
    • pp.214-218
    • /
    • 2011
  • In this paper we have applied self-reference hologram to DHM (digital holography microscopy) to remove phase aberration. We have constructed an off-axis reflection- type digital holography microscope. We have extracted a low spatial frequency hologram from the conjugated hologram and used it as a reference hologram. Experimentally we show that distortion of image and aberration of phase in a measurement system are removed using the self-reference hologram.

Optical Encryption of Binary Information using 2-step Phase-shifting Digital Holography (2-단계 위상 천이 디지털 홀로그래피를 이용한 이진 정보 광 암호화 기법)

  • Byun, Hyun-Joong;Gil, Sang-Keun
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.5
    • /
    • pp.401-411
    • /
    • 2006
  • We propose an optical encryption/decryption technique for a security system based on 2-step phase-shifting digital holography. Phase-shilling digital holography is used for recording phase and amplitude information on a CCD device. 2-step phase-shifting is implemented by moving the PZT mirror with phase step of 0 or ${\pi}/2$. The binary data and the key are expressed with random code and random phase patterns. The digital hologram is a Fourier transform hologram and is recorded on CCD with 256 gray level quantization. We remove the DC term of the digital hologram fur data reconstruction, which is essential to reconstruct the original binary input data/image. The error evaluation fer the decrypted binary data is analyzed. One of errors is a quantization error in detecting the hologram intensity on CCD, and the other is generated from decrypting the data with the incorrect key. The technique using 2-step phase-shifting holography is more efficient than a 4-step method because 2-step phase-shifting holography system uses less data than the 4-step method for data storage or transmission. The simulation shows that the proposed technique gives good results fur the optical encryption of binary information.

Novel Optimization Method of Phase-Only Computer-Generated Hologram Using the Phase-Shift Characteristic (위상천이특성을 이용한 새로운 Phase-Only CGH 계산)

  • Kim, Tae-Hyeon;Kim, Bong-Sik;Park, Woo-Sang
    • Korean Journal of Optics and Photonics
    • /
    • v.27 no.3
    • /
    • pp.101-105
    • /
    • 2016
  • In this study we propose the novel optimization method of the phase-only computer-generated hologram (CGH), to improve calculation speed compared to the conventional method. While the conventional method is calculated using numerical analysis, the novel method is calculated using the phase-shift characteristic of Fourier transformation. In addition, the selectivity of noise filtering lets it decrease the calculation time. The validity of the reconstructed image using the novel method is verified by comparing simulation results to ideal and conventional data, and the improvement of texture and sharpness of the reconstructed image is confirmed by simulation.

A Novel Volume Hologram Encryption Using Complementary Data and Binary Amplitude Mask (상보 데이터와 이진 진폭 마스크를 이용한 새로운 체적 홀로그램 암호화)

  • Kim, Hyun;Kim, Do-Hyung;Lee, Yeon-H.
    • Transactions of the Society of Information Storage Systems
    • /
    • v.1 no.2
    • /
    • pp.143-149
    • /
    • 2005
  • In this paper we propose a novel volume hologram encryption system with binary amplitude masks rather than phase masks, in which volume holograms can be securely recorded against the attacks by a third party. In our system, the encryption is done by multiplexing two volume holograms in such a way that an original binary data page is first stored as a volume hologram by interference with a binary amplitude mask and then the complementary data page is stored as another volume hologram by interference with the complementary binary amplitude mask over the first hologram. The operation principle of our system is explained with the well-known theory of recording and reading a volume hologram in a photorefractive material and the experimental results are presented. Experimental data show that our encryption system is protected from blind decryptions by randomly-generated incorrect amplitude masks.

  • PDF

Rough surface characterization using off-axis digital holographic microscopy compensated with self-hologram rotation

  • Ibrahim, Dahi Ghareab Abdelsalam
    • Current Applied Physics
    • /
    • v.18 no.11
    • /
    • pp.1261-1267
    • /
    • 2018
  • In this paper, an off-axis digital holographic microscopy compensated with self-hologram rotation is presented. The process is implemented via subtracting the unwrapped phase maps of the off-axis parabolic hologram and its rotation $180^{\circ}$ to eliminate the tilt induced by the angle between the spherical object wave O and the plane reference wave R. Merit of the proposed method is that it can be done without prior knowledge of physical parameters and hence can reconstruct a parabolic hologram of $1024{\times}768$ pixels within tens of milliseconds since it doesn't require a digital reference wave. The method is applied to characterize rough gold bumps and the obtained results were compared with those extracted from the conventional reconstruction method. The comparison showed that the proposed method can characterize rough surfaces with excellent contrast and in realtime. Merit of the proposed method is that it can be used for monitoring smaller biological cells and micro-fluidic devices.

Study on Digital Holography with Conjugated Hologram (복소공액 홀로그램을 이용한 디지털 홀로그래피 연구)

  • Shin, Sang-Hoon;Kim, Doo-Cheol;Yu, Young-Hun
    • Korean Journal of Optics and Photonics
    • /
    • v.21 no.4
    • /
    • pp.146-150
    • /
    • 2010
  • In this paper we have applied phase conjugated holographyto DHM (digital holography microscopy) to remove phase aberration and noise. Generally,digital holographyincludes the phase information of the object, phase aberration terms introduced by the measurement system and noise terms (DC term and twin images). These aberrations and noise terms decrease the quality of the reconstructed phase image. We could obtain a conjugated hologram which includes only phase information of object. Experimentally we show that distortion of image and aberration of phase in a measurement system are removed using the conjugation hologram.

Computer Generated Hologram for Beam Control of LCOS based Wavelength Selective Switch (LCOS기반의 파장선택스위치 빔제어용 컴퓨터 생성 홀로그램)

  • Lee, Yong-Min;Han, Chang Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.6
    • /
    • pp.744-749
    • /
    • 2016
  • This paper presents the design of a computer-generated hologram for beam control of an LCOS-based wavelength selective switch, which is the core technology for next-generation ROADM. By introducing a computer-generated hologram instead of general grating patterns to control the LCOS device, we contribute to building a more efficient wavelength selective switch. With the use of phase modulation properties of LCOS devices, we designed the hologram for five-port output and a 40-channel wavelength selective switch. We applied a multi-level phase modulation technique with the Gerchberg-Saxton algorithm to produce the hologram, which is easily scalable to any different type of wavelength selective switch. With an experimental setup, we verified the usability of the hologram designed for five-port output. We also suggest a hologram design technique for beam control of a 40-channel wavelength selective switch.

A Proposal of Combined Iterative Algorithm for Optimal Design of Binary Phase Computer Generated Hologram (최적의 BPCGH 설계를 위한 합성 반복 알고리듬 제안)

  • Kim Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.10 no.4
    • /
    • pp.16-25
    • /
    • 2005
  • In this paper, we proposed a novel algorithm combined simulated annealing and genetic algorithms for designing optimal binary phase computer generated hologram. In the process of genetic algorithm searching by block units, after the crossover and mutation operations, simulated annealing algorithm searching by pixel units is inserted. So, the performance of BPCGH was improved. Computer simulations show that the proposed combined iterative algorithm has better performance than the simulated annealing algorithm in terms of diffraction efficiency

  • PDF

Secret-key-sharing Cryptosystem Using Optical Phase-shifting Digital Holography

  • Jeon, Seok Hee;Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • v.3 no.2
    • /
    • pp.119-127
    • /
    • 2019
  • A new secret-key-sharing cryptosystem using optical phase-shifting digital holography is proposed. The proposed secret-key-sharing algorithm is based on the Diffie-Hellman key-exchange protocol, which is modified to an optical cipher system implemented by a two-step quadrature phase-shifting digital holographic encryption method using orthogonal polarization. Two unknown users' private keys are encrypted by two-step phase-shifting digital holography and are changed into three digital-hologram ciphers, which are stored by computer and are opened to a public communication network for secret-key-sharing. Two-step phase-shifting digital holograms are acquired by applying a phase step of 0 or ${\pi}/2$ in the reference beam's path. The encrypted digital hologram in the optical setup is a Fourier-transform hologram, and is recorded on CCDs with 256 quantized gray-level intensities. The digital hologram shows an analog-type noise-like randomized cipher with a two-dimensional array, which has a stronger security level than conventional electronic cryptography, due to the complexity of optical encryption, and protects against the possibility of a replay attack. Decryption with three encrypted digital holograms generates the same shared secret key for each user. Schematically, the proposed optical configuration has the advantage of producing a kind of double-key encryption, which can enhance security strength compared to the conventional Diffie-Hellman key-exchange protocol. Another advantage of the proposed secret-key-sharing cryptosystem is that it is free to change each user's private key in generating the public keys at any time. The proposed method is very effective cryptography when applied to a secret-key-exchange cryptosystem with high security strength.

Optical implementation of two-stage free-space interconnection network using hologram arrays (홀로그램 어레이를 이용한 2단 자유공간 광연결 구현)

  • 지창환;박진상;장주성;정신일
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.7
    • /
    • pp.253-260
    • /
    • 1996
  • In this paper, a simple scheme of two-stage free-space photonic swiching system for nonblocking optical interconnections has been investigated using holgorams. The multistage system requires a smaller number of interconnections for a given number of inpuut-output nonblocking ports than the single stage system does. Here hologram elements were used to change interconnection beam paths. In order to increase the idffraction efficiency of the hologram elements in photographic plates, a bleaching technique was used, which converts the amplitude hologram to the phase hologram. To show sthe feasibility of our optical interconnection system, it was implemented using the bleached hologram arrays and an LCTV spatial light modulator, and the sytem as a photonic switching system was demonstrated.

  • PDF