• Title/Summary/Keyword: binary phase mask

Search Result 23, Processing Time 0.036 seconds

Double Encryption of Binary Image using a Random Phase Mask and Two-step Phase-shifting Digital Holography (랜덤 위상 마스크와 2-단계 위상 천이 디지털 홀로그래피를 이용한 이진 영상 이중 암호화)

  • Kim, Cheolsu
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.6
    • /
    • pp.1043-1051
    • /
    • 2016
  • In this paper, double encryption technique of binary image using random phase mask and 2-step phase-shifting digital holography is proposed. After phase modulating of binary image, firstly, random phase mask to be used as key image is generated through the XOR operation with the binary phase image. And the first encrypted image is encrypted again through the fresnel transform and 2-step phase-shifting digital holography. In the decryption, simple arithmetic operation and inverse Fresnel transform are used to get the first decryption image, and second decryption image is generated through XOR operation between first decryption image and key image. Finally, the original binary image is recovered through phase modulation.

Holographic storage of binary amplitude data patterns via their random phase modulation (이진진폭데이타 영상의 랜덤위상변조를 통한 홀로그래픽 저장)

  • 오용석;신동학;장주석
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2001.02a
    • /
    • pp.62-63
    • /
    • 2001
  • We studied a method to use a variable discrete random phase mask in 2-D binary data representation for efficient holographic data storage. The variable phase mask is realized by use of a liquid crystal display.

  • PDF

Resolution Limit Analysis of Isolated Patterns Using Optical Proximity Correction Method with Attenuated Phase Shift Mask (Attenuated Phase Shift Mask에 광 근접 효과 보정을 적용한 고립 패턴의 해상 한계 분석)

  • 김종선;오용호;임성우;고춘수;이재철
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.13 no.11
    • /
    • pp.901-907
    • /
    • 2000
  • As the minimum feature size for making ULSI approaches the wavelength of light source in optical lithography, the aerial image is so hardly distorted because of the optical proximity effect that the accurate mask image reconstruction on wafer surface is almost impossible. We applied the Optical Proximity Correction(OPC) on isolated patterns assuming Attenuated Phase Shift Mask(APSM) as well as binary mask, to correct the widening of isolated patterns. In this study, we found that applying OPC to APSM shows much better improvement not only in enhancing the resolution and fidelity of t도 images but also in enhancing the process margin than applying OPC to the binary mask. Also, we propose the OPC method of APSM for isolated patterns, the size of which is less than the wavelength of the ArF excimer laser. Finally, we predicted the resolution limit of optical lithography through the aerial image simulation.

  • PDF

A Novel Volume Hologram Encryption Using Complementary Data and Binary Amplitude Mask (상보 데이터와 이진 진폭 마스크를 이용한 새로운 체적 홀로그램 암호화)

  • Kim, Hyun;Kim, Do-Hyung;Lee, Yeon-H.
    • Transactions of the Society of Information Storage Systems
    • /
    • v.1 no.2
    • /
    • pp.143-149
    • /
    • 2005
  • In this paper we propose a novel volume hologram encryption system with binary amplitude masks rather than phase masks, in which volume holograms can be securely recorded against the attacks by a third party. In our system, the encryption is done by multiplexing two volume holograms in such a way that an original binary data page is first stored as a volume hologram by interference with a binary amplitude mask and then the complementary data page is stored as another volume hologram by interference with the complementary binary amplitude mask over the first hologram. The operation principle of our system is explained with the well-known theory of recording and reading a volume hologram in a photorefractive material and the experimental results are presented. Experimental data show that our encryption system is protected from blind decryptions by randomly-generated incorrect amplitude masks.

  • PDF

Holographic s forage of random-phase-modulation-added binary amplitude data (랜덤 위상변조가 가미된 이진 진폭 데이터 영상의 홀로그래픽 저장)

  • 오용석;신동학;장주석
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.489-492
    • /
    • 2001
  • We studied a method to use a variable discrete random phase mask in 2-D binary data representation for efficient holographic data storage. The variable phase mask is realized by use of a twisted nematic liquid crystal display.

  • PDF

Double Encryption of Digital Hologram Based on Phase-Shifting Digital Holography and Digital Watermarking (위상 천이 디지털 홀로그래피 및 디지털 워터마킹 기반 디지털 홀로그램의 이중 암호화)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2017
  • In this Paper, Double Encryption Technology Based on Phase-Shifting Digital Holography and Digital Watermarking is Proposed. For the Purpose, we First Set a Logo Image to be used for Digital Watermark and Design a Binary Phase Computer Generated Hologram for this Logo Image using an Iterative Algorithm. And Random Generated Binary Phase Mask to be set as a Watermark and Key Image is Obtained through XOR Operation between Binary Phase CGH and Random Binary Phase Mask. Object Image is Phase Modulated to be a Constant Amplitude and Multiplied with Binary Phase Mask to Generate Object Wave. This Object Wave can be said to be a First Encrypted Image Having a Pattern Similar to the Noise Including the Watermark Information. Finally, we Interfere the First Encrypted Image with Reference Wave using 2-step PSDH and get a Good Visible Interference Pattern to be Called Second Encrypted Image. The Decryption Process is Proceeded with Fresnel Transform and Inverse Process of First Encryption Process After Appropriate Arithmetic Operation with Two Encrypted Images. The Proposed Encryption and Decryption Process is Confirmed through the Computer Simulations.

Improved Margin of Absorber Pattern Sidewall Angle Using Phase Shifting Extreme Ultraviolet Mask (위상변위 극자외선 마스크의 흡수체 패턴의 기울기에 대한 오차허용도 향상)

  • Jang, Yong Ju;Kim, Jung Sik;Hong, Seongchul;Ahn, Jinho
    • Journal of the Semiconductor & Display Technology
    • /
    • v.15 no.2
    • /
    • pp.32-37
    • /
    • 2016
  • Sidewall angle (SWA) of an absorber stack in extreme ultraviolet lithography mask is considered to be $90^{\circ}$ ideally, however, it is difficult to obtain $90^{\circ}$ SWA because absorber profile is changed by complicated etching process. As the imaging performance of the mask can be varied with this SWA of the absorber stack, more complicated optical proximity correction is required to compensate for the variation of imaging performance. In this study, phase shift mask (PSM) is suggested to reduce the variation of imaging performance due to SWA change by modifying mask material and structure. Variations of imaging performance and lithography process margin depending on SWA were evaluated through aerial image and developed resist simulations to confirm the advantages of PSM over the binary intensity mask (BIM). The results show that the variations of normalized image log slope and critical dimension bias depending on SWA are reduced with PSM compared to BIM. Process margin for exposure dose and focus was also improved with PSM.

Optical Encryption based on Visual Cryptography and Interferometry (시각 암호와 간섭계를 이용한 광 암호화)

  • 이상수;서동환;김종윤;박세준;신창목;김수중;박상국
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2000.08a
    • /
    • pp.126-127
    • /
    • 2000
  • In this paper, we proposed an optical encryption method based in the concept of visual cryptography and interferometry. In our method a secret binary image was divided into two sub-images and they were encrypted by 'XOR' operation with a random key mask. Finally each encrypted image was changed into phase mask. By interference of these two phase masks the original image was obtained. Compared with general visual encryption method, this optical method had good signal-to-noise ratio due to no need to generate sub-pixels like visual encryption.

  • PDF

Characteristics of holographic storage of random-phase-modulation-added binary amplitude data (랜덤 위상변조가 가미된 이진 진폭 데이터 영상의 홀로그래픽 저장 특성)

  • 오용석;신동학;장주석
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.2
    • /
    • pp.289-296
    • /
    • 2001
  • We propose a method to add phase-modulation to binary amplitude data pages using a twisted-nematic liquid crystal display as a dynamic phase mask. For this, the phase modulation characteristics of the display were examined both theoretically and experimentally, and an unexpected abnormal phenomenon was found experimentally in which the modulation property changed as the incident beam intensity increased. To investigate the characteristics of holographically storing the binary data images, eight pages of holograms were stored at one spot of in un-thick Dupont's photopolymer with angle multiplexing. When phase-modulation-added pages were stored at the Fourier plane, the uniformity of the signal beam at the plane was improved, and thus more holograms can be recorded with our method, compared with the conventional case of using only binary amplitude modulation under the same condition.

  • PDF

Binary Phase-based Optical Encryption System Using the Principle of Interference (간섭의 원리를 이용한 이진 위상의 광학적 암호화 시스템)

  • 서동환;신창목;김수중
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.1
    • /
    • pp.29-35
    • /
    • 2003
  • In this paper, we propose an improved image decryption system using a phase-encoded image and the principle of interference. An original image and a random image consist of only binary values. The phase-encoded original image is encrypted into a binary phase-only image by multiplying with a phase-encoded random key. Therefore the phase-encoded images have two phase values 0 or $\pi$. The proposed decryption technique is simply performed by interfering between a reference wave and a direct pixel-to-pixel mapping of the encrypted image with a decrypting key. Optical experiments confirmed that the proposed technique is a simple and robust architecture for optical encryption.