Securing of Two and Three Dimensional Information Based on In-line Digital Holography
|
|
- Barnard Hardy
- 5 years ago
- Views:
Transcription
1 Securing of Two and Three Dimensional Information Based on In-line Digital Holography Hesham Eldeeb Computer & System Department Electronic Research Institute National Research Center, Dokki, Giza Cairo, Egypt Abstract: - A method that combines the high speed of digital encryption and the high security of optical encryption with the advantages of electronic transmission, storage, and decryption is introduced. The encryption is performed by use of multi-dimensional lock on the hologram plan, providing high security in the encrypted image and a key with many degrees of freedom. We described how our method can be adapted to encrypt either 2D or 3D information. Electronic decryption can be performed and a correlation method, which has several advantages over the FFT, used for reconstruction procedure. The most important of these advantages is that the width and the length of the hologram need not to be equal. This gives the proposed method a unique technique compared to any other security methods. Experimental results for both 2D and 3D information including setup are shown. Key-Words: - Information security, computer generated holography, encryption, decryption, 3D virtual image. 1 Introduction Information hiding is a fast growing research subject that has drawn increasing attention from both academic and business circles as it covers a great number of application areas in the field of information technology to prevent huge economic losses [1]. Recently, a number of optical methods have been proposed for the purpose of information hiding, since the data/image encryption with optical information processing has many inherent advantages such as the capability of parallel processing, the increase in security level. Those optical encryption methods reported either employing an all-optics or a hybrid system to implement the image encryption and decryption. Especially, hybrid systems utilize digital holography to reconstruct and decrypt hidden information, but they all optically recorded the hologram of the object with CCD camera.[2],[3],[4] In this paper, unlike the previously reported optical encryption methods, we present a new method that is based on a concept of a digital optics, which means that we implement the encryption and decryption process totally with digital method. By using this method, one is able to virtually select a wavelength for encoding digital hologram instead of using specific physical light source like a laser with certain wavelength. Also, one is able to freely select spatial position of the signal plane from a much larger and more flexible scope. Thus a dramatic increase of the imperceptibility and security level will be introduced. Secondly, digital recording and encryption technique totally get rid of the physical limitations imposed by optical or electronic hardware, such as the complexity of optical hardware, lack of flexibility, etc [5]. In practical systems, data security is an important issue. Optical encryption techniques provide a high level of security [6-8] because there are many degrees of freedom to encode the information, such as amplitude, phase, wavelength, and polarization. Figure (1) shows the overall block diagram for Secure Communication system using the proposed digital holography multi-dimensional lock method. This article discusses the proposed method for Computer-Generated (CGH) using raytracing technique and encryption procedure in section 2. Section 3 describes the details of decryption part of this method and the reconstruction of virtual image using correlation method. The experimental results for 2D and 3D objects are presented in section 4. The conclusion is discussed in section 5.
2 2D or 3D original data CCD Camera Or CGH Digital Virtual Image of the Original Data Multifunction Encrypt -ion Reconstruction of the Original Data (digital/ optical) Encrypted data Decrypting data Decrypting system using correct functions & parameters Electronic Transmition /Internet Fig.1 Block diagram of the proposed secure communication system 2 Methodology of hologram generation and Encryption procedure 2.1 generation using ray-tracing method Ray-tracing is a convenient way to model optical systems using a computer. This technique simulates the light that reaches the hologram plane by using thousands of geometrical rays, each with a starting point in the reference or object model and a direction of travel. The sum of all input rays comprises a representation of the interference pattern inside the hologram plane [9],[10]. Most of the CGHs described in literature are simply two-dimensional Fourier transforms of a twodimensional image plane. Although the fringe pattern on the plate is calculated by a computer, what is calculated is a Fourier transformation. In these holograms, the principal mode of reconstruction is Fraunhofer diffraction which limits low frequency spatial information to the center of the interference pattern and higher frequency components to the edges. Alternatively, holograms generated via ray tracing distribute information so that different areas of the plate correspond to different perspectives of the object. In the past, however, implementation of this algorithm has not been trivial since the quantity of calculations quickly approached the limits of computing technology [10] Ray-tracing method In computer simulations of holograms by ray tracing, the complex amplitudes that reach the plane of the photographic film from different directions are summed up [9]. The object beam is modeled as if the object were made of point sources. The light wave from a point source can be written as: Eo = Ao exp( ikr) / R (1) where k is the wave number and A o is the light wave amplitude which is real and exp(ikr ) is the phase factor. The time-dependent phase exp( iωt) is ignored in this model since it does not change the final result. R is the distance between the hologram plane and the point ( x, y, z) on the object : / 2 R ( x, y, z, ξ, η) = [( x ξ ) + ( y η) + z ] (2) where ( ξ, η) is the coordinate on the hologram plane. The x y plane is parallel to the ξ η plane, the z -axis is chosen to be perpendicular to the hologram and the hologram is set at z = 0. For simplicity we use a reference beam of normal incidence yielding the approximation N 2 Aj exp( ikrαj ) Iα 1+ (3) AR j= 1 Rαj This equation is used for hologram generation by ray tracing using the computer simulation [9]. 2.2 Encryption procedure The digital holography-based technique is originally not designed for data encryption setup. However as the method enables one to digitally recording and reconstructing the image, it opens possibility to employ this technique for encoding an image as a
3 hologram that irreproducible using the existing intensity based detector [11],[12],[13]. To illustrate our idea, in this paper, we utilize the encryption parameters z, wavelength ( λ ), width (W) and length (L) of hologram. Also, we can divide the hologram into four parts or more and calculating lock functions for example cosine, subtract, logarithm and exponential,.etc., as shown in fig.2. Digital Function(1) Function(3) Fig.2 Data encryption setup with multifunction lock The parameters and the functions can be secretly selected during the process of encrypting and encoding digital hologram, so it is an unknown for unauthorized third parties. If unauthorized parties attempt to decrypt host image without the knowledge of encoding process, it will be extremely difficult to determine the decoding parameters to decode the hologram. As, for example, the virtual wavelength λ can be a value selected from huge numerical range instead of one coming from physical existed light sources. This also implies that a slight mismatch between recording and reconstructing parameters will change the position of reconstructed image a lot, leading to its disappearance in space. Also, the ray-tracing method for recording and the correlation method for reconstruction give the flexibility over FFT to choose the width different than the length of the hologram. This means that if the third party for any reason know the one dimension from the hologram it is so difficult to find the other. The normal distance between the hologram plane and the object plane z at recording phase is also unknown for the third party to reconstruct the correct image. In other words, virtual wavelength λ, z, W, L, and functions of encryption can be utilize to design multi-dimensional lock 3 Methodology of decryption procedure and reconstruction of virtual image 3.1 Decryption procedure Function(2) Function(4) Encrypted After receiving the encrypted hologram in the desired side, the decryption procedure begins. The using of the correct inversed functions will lead to success in decryption of the data, as shown in fig.3. Encrypted Fig(3) Data decryption setup with the correct multifunction key These data, digital hologram, will be an input for the next step in the proposed secure system which is the reconstruction of virtual image. The use of correct reconstruction setup parameters will lead to output the desired image (data). 3.2 The correlation method for virtual 3D image reconstruction In this paper, we use quite a different method which is not related to the ideas that hold for conventional holography by using FFT. This method is based on the correlation between the hologram of a point source and the hologram of real objects [14]. In order to retrieve the 3D pattern A ( x, y, z), we perform the calculation φ i = α Inv(Function(1)) Inv(Function(2)) Inv(Function(3)) Inv(Function(4)) α ( kr ) I cos / R, (4) iα where the summation over α is performed on the surface of the hologram. We approved in pervious paper [15] that this process can retrieve the image, that means, A( x, y, z) ϕi. A quick comparison between conventional holography using FFT method and the correlation method is shown in Table 1 [13],[14],[15]. From Table (1) the correlation method has many facilities in the encryption/decryption process more than FFT method. This gives our security method a unique technique compared to any other methods. 4 Results Although the off-axis setup is widely chosen, there are certain applications that must be performed using the In-line setting. Such applications for example are widely found in particle field analysis. In this paper, the setup is chosen to be In-line setup. As approve for the proposed security method, we tested it with two different objects. iα Decrypted
4 Table (1) Conventional method using FFT 1 Shape and size of object planes must dependent on those of the hologram plane 2 The sampling points on the hologram and object plane must be equally-spaced Cartesian grid 3 m The number of grid points must be in the form 2 and must be the same on the hologram and object plane. 4 Separated, segmented and/or curved hologram cannot be used. Correlation method Shape and size of object planes can be independent on those of the hologram plane Not necessary Not necessary Separated and segmented hologram can be used. A 2D object of circle model consists of 284 points, is shown in figure (4). A 3D object of pyramid model of different planes consisting of 616 points whose size gradually shrinks in the Z-direction is shown in fig(5). Inverse of encrypted functions together in the same process. The correlation method is used for reconstruction of the desired image, as shown in fig(7)(a). Reconstruction with wrong parameters will result with incorrect output, as shown in fig(7)(b). Fig.4 2D object of a circle model Fig.5 3D object of pyramid model gradually shrinks in the Z-direction Fig.6.a shows the generated hologram with 400 x 300 pixels of the 2D object using ray tracing method. The wavelength used in this processing is equal to 1GHz. Fig.6.b shows the hologram after encryption by the new method. The four function used in this encryption are cosine, subtract, logarithm and exponential. Sure, the method can be implemented by any other functions as discussed in the pervious sections. Then you can send the encrypted hologram through the internet, or any other communication channel, to the destination side. Therefore even if some unauthorized intruder acquires the encrypted hologram, he would not be able to reproduce the original object image. Only the right decryption can be done, by calculating the a. hologram with 400 x 300 pixels of the 2D object b. the same hologram after encryption by the proposed method Fig.6 CGH of 2D with ray-tracing method a. reconstruction of the desired image b. reconstruction with wrong parameters will result with Incorrect output Fig.7 Reconstruction of 2D object with correlation method
5 The same processing is done on the 3D object of a pyramid with different z planes, as shown in fig(8) and fig(9). a. hologram with 400 x 300 pixels of the 3D object b. the same hologram after encryption by the proposed method Fig.8 CGH of 3D with ray-tracing method Z0 Z1 Z2 Z3 Fig.9 Reconstruction of the desired image with different cross-sections plans in Z direction with correct multi-dimensional key Reconstruction with wrong parameters will result with Incorrect output, as discussed with the 2D object. The FFT method can not be used for either generation or reconstruction for this processing, as the width of the hologram is different than the length. This gives more security for the proposed method over conventional methods. 5 Conclusion We have developed a method to design a high security system based on computer-generated holography with the advantages of securing electronic transmutation and storage of 2D or 3D information. According to our method, one can design multi-dimensional lock in order to receive a chosen image. The resulting masks can be used for security and encryption, as the desired image will be received in the output plane only when the multidimensional key is known. The correlation method is used for reconstruction of virtual image which give several advantages over the well known FFT method. This gives our security method a unique technique compared to any other methods. Also, dividing the hologram to parts that each of them has different encryption function, this adds more locking difficulty for the third party. Finally, this digital method can be expanded to encrypt/decrypt different kinds of information, such audio signals, video signals, digital images, maps, and other physical signals, while optical methods are limited to optical images. References: [1] Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn, Information Hiding- A Survey, Proceeding of the IEEE, Vol. 87, No. 7, July [2] T. Nomura and S. Mikan, B. Javidi, Optical Image Encryption using an Optimally Designed Encryption Key, Proceedings of the International Workshop on Optical Display and Information Processing, Korea, May 15-16, [3] B. Javidi and T. Nomura, Securing information by use of digital holography, Opt. Letter. 25, 2000, pp [4] S. Lai and M. A. Neifeld, Digital wavefront reconstruction and its application to image encryption, Opt. Comm. 178, (2000), pp [5] Xiang Peng, Lingfeng Yu and Lilong Cai, Double-lock for image encryption with virtual optical wavelength, Optics express Vol. 10, No. 1 January 14, 2002, pp [6] O. Matoba and B. Javidi, Encrypted optical storage with wavelength-key and random phase codes," Appl. Opt. 38, 1999, pp [7] E. Tajahuerce, O. Matoba, S.C. Verrall, and B. Javidi, Optoelectronic information encryption with phaseshifting interferometry, Appl. Opt. 39, (2000), pp [8] L. Yu and L. Cai, Iterative algorithm with a constraint condition for numerical reconstruction of a three dimensional object from its hologram, J. Opt. Soc. Am. A, 18, 2001, pp [9] Stein,A. D., Wang, Z., Leigh, J. S., Jr., Computer generated holograms: A simplified ray-tracing approach, Computer in Physics, vol. 6, 1992, pp [10] Hesham Eldeib, Takashi Yabe, A Fast Computer Holography System and Its Experimental verification, Journal of Computer modeling and simulation in engineering, vol.2,1996, pp
6 [11] Enrique Tajahuerce, Osamu Matoba, Steven C. Verrall, and Bahram Javidi, Optoelectronic information encryption with phase-shifting interferometry, APPLIED OPTICS, Vol. 39, No. 14, May 2000 [12] Thomas J. Naughton, John B. Mc Donald, and Bahram Javidi, Efficient compression of Fresnel fields for Internet transmission of three-dimensional images, Applied Optics, vol. 42, no. 23, August 2003, pp [13] Hesham Eldeeb, Takashi Yabe and Toshio Yoshino, Efficient Design of Computer Algorithm for Improving the Gabor-Type Holography, Proceedings of IEEE international conference on Systems, Man and Cybernetics SMC97, Oct. 1997, Orlando, USA, vol.3, pp [14] Hesham Eldeib, A High Performance Computing Algorithm for Improving the IN-Line Holography, Journal of Computer modeling and simulation in engineering, vol. 4, No.2, May 1999 [15]Tomoyoshi Ito, Hesham Eldeib, Kenji Yoshida, Shinya Takahashi, Takashi Yabe and Tomoaki Kunugi, Special-Purpose Computer for Holography HORN-2, Computer Physics Communications, vol.93, No.1, January 1996, pp
Three-dimensional scene reconstruction using digital holograms
Three-dimensional scene reconstruction using digital holograms Conor P. Mc Elhinney, a Jonathan Maycock, a John B. McDonald, a Thomas J. Naughton, a and Bahram Javidi b a Department of Computer Science,
More informationDigital correlation hologram implemented on optical correlator
Digital correlation hologram implemented on optical correlator David Abookasis and Joseph Rosen Ben-Gurion University of the Negev Department of Electrical and Computer Engineering P. O. Box 653, Beer-Sheva
More informationSolution to the Twin Image Problem in Holography
1 Solution to the Twin Image Problem in Holography Tatiana Latychevskaia & Hans-Werner Fink Institute of Physics, University of Zurich, Winterthurerstrasse 190, CH-8057, Switzerland While the invention
More informationInvited Paper. Nukui-Kitamachi, Koganei, Tokyo, , Japan ABSTRACT 1. INTRODUCTION
Invited Paper Wavefront printing technique with overlapping approach toward high definition holographic image reconstruction K. Wakunami* a, R. Oi a, T. Senoh a, H. Sasaki a, Y. Ichihashi a, K. Yamamoto
More informationHolography. How is that different than photography? How is it accomplished? Amplitude & Phase
Holography 1948: Dennis Gabor proposes lensless imaging: wavefront reconstruction. Calls it total recording or Holo gram Concept: record and recreate wavefront incident on film. Amplitude & Phase How is
More informationHolographic Method for Extracting Three-Dimensional Information with a CCD Camera. Synopsis
Mem. Fac. Eng., Osaka City Univ., Vol. 36,pp. 1-11.(1995) Holographic Method for Extracting Three-Dimensional Information with a CCD Camera by Hideki OKAMOTO*, Hiroaki DEDA*, Hideya TAKAHASHI**, and Eiji
More informationEfficient compression of Fresnel fields for Internet transmission of three-dimensional images
Efficient compression of Fresnel fields for Internet transmission of three-dimensional images Thomas J. Naughton, John B. McDonald, and Bahram Javidi We compress phase-shift digital holograms whole Fresnel
More informationCoupling of surface roughness to the performance of computer-generated holograms
Coupling of surface roughness to the performance of computer-generated holograms Ping Zhou* and Jim Burge College of Optical Sciences, University of Arizona, Tucson, Arizona 85721, USA *Corresponding author:
More informationLED holographic imaging by spatial-domain diffraction computation of. textured models
LED holographic imaging by spatial-domain diffraction computation of textured models Ding-Chen Chen, Xiao-Ning Pang, Yi-Cong Ding, Yi-Gui Chen, and Jian-Wen Dong* School of Physics and Engineering, and
More informationNoise reduction for digital holograms in a discrete cosine transform (DCT) domain
Optica Applicata, Vol. XL, No. 4, 2010 Noise reduction for digital holograms in a discrete cosine transform (DCT) domain HYUN-JUN CHOI 1*, YOUNG-HO SEO 2, DONG-WOOK KIM 2 1 Anyang University, 708-113,
More informationDistortion Correction for Conical Multiplex Holography Using Direct Object-Image Relationship
Proc. Natl. Sci. Counc. ROC(A) Vol. 25, No. 5, 2001. pp. 300-308 Distortion Correction for Conical Multiplex Holography Using Direct Object-Image Relationship YIH-SHYANG CHENG, RAY-CHENG CHANG, AND SHIH-YU
More informationFourier, Fresnel and Image CGHs of three-dimensional objects observed from many different projections
Fourier, Fresnel and Image CGHs of three-dimensional objects observed from many different projections David Abookasis and Joseph Rosen Ben-Gurion University of the Negev Department of Electrical and Computer
More informationModeling of diffractive optical elements for lens design.
Juan L. Rayces and Lan Lebich OA Applied Optics, 7421 Orangewood Ave., Garden Grove, A 92641. Abstract. The use of a standard aspheric profile to describe conventional optical elements in lens design programs
More informationDigitalna Holografija i Primjene
Digitalna Holografija i Primjene Hrvoje Skenderović Institut za fiziku 5. PIF Radionica, IRB, 16.12.2014. Holography Dennis Gabor invented holography in 1948 as a method for recording and reconstructing
More informationSmooth shading of specular surfac Title ased high-definition CGH Author(s) MATSUSHIMA, Kyoji 2011 3DTV Conference: The True Vi Citation, Transmission and Display of 3D ) Issue Date 2011 URL http://hdl.handle.net/10112/5575
More informationPHYSICS. Chapter 33 Lecture FOR SCIENTISTS AND ENGINEERS A STRATEGIC APPROACH 4/E RANDALL D. KNIGHT
PHYSICS FOR SCIENTISTS AND ENGINEERS A STRATEGIC APPROACH 4/E Chapter 33 Lecture RANDALL D. KNIGHT Chapter 33 Wave Optics IN THIS CHAPTER, you will learn about and apply the wave model of light. Slide
More informationThe Analysis of Traffic of IP Packets using CGH. Self Organizing Map
2015 International Conference on Computational Science and Computational Intelligence The Analysis of Traffic of IP Packets using CGH Self Organizing Maps Hiroshi Dozono Department of Advanced Fusion Saga
More information16. Holography. Dennis Gabor (1947) Nobel Prize in Physics (1971)
16. Holography Dennis Gabor (1947) Nobel Prize in Physics (1971) Photography Records intensity distribution of light. Does not record direction. Two-dimensional image. Holography = whole + writing Records
More informationParallel two-step spatial carrier phase-shifting common-path interferometer with a Ronchi grating outside the Fourier plane
Parallel two-step spatial carrier phase-shifting common-path interferometer with a Ronchi grating outside the Fourier plane Mingguang Shan, Bengong Hao, Zhi Zhong,* Ming Diao, and Yabin Zhang College of
More informationTutorial Solutions. 10 Holographic Applications Holographic Zone-Plate
10 Holographic Applications 10.1 Holographic Zone-Plate Tutorial Solutions Show that if the intensity pattern for on on-axis holographic lens is recorded in lithographic film, then a one-plate results.
More informationSimulation study of phase retrieval for hard X-ray in-line phase contrast imaging
450 Science in China Ser. G Physics, Mechanics & Astronomy 2005 Vol.48 No.4 450 458 Simulation study of phase retrieval for hard X-ray in-line phase contrast imaging YU Bin 1,2, PENG Xiang 1,2, TIAN Jindong
More informationLab Report: Optical Image Processing
Lab Report: Optical Image Processing Kevin P. Chen * Advanced Labs for Special Topics in Photonics (ECE 1640H) University of Toronto March 5, 1999 Abstract This report describes the experimental principle,
More informationMetallic Transmission Screen for Sub-wavelength Focusing
Metallic Transmission Screen for Sub-wavelength Focusing A.M.H. Wong, C.D. Sarris and G.V. leftheriades Abstract: A simple metallic transmission screen is proposed that is capable of focusing an incident
More informationLAGRANGIAN PARTICLE TRACKING IN ISOTROPIC TURBULENT FLOW VIA HOLOGRAPHIC AND INTENSITY BASED STEREOSCOPY. By Kamran Arjomand
LAGRANGIAN PARTICLE TRACKING IN ISOTROPIC TURBULENT FLOW VIA HOLOGRAPHIC AND INTENSITY BASED STEREOSCOPY By Kamran Arjomand I. Background A. Holographic Imaging 1. Acquire Hologram 3. Numerical Reconstruction
More informationWhite-light interference microscopy: minimization of spurious diffraction effects by geometric phase-shifting
White-light interference microscopy: minimization of spurious diffraction effects by geometric phase-shifting Maitreyee Roy 1, *, Joanna Schmit 2 and Parameswaran Hariharan 1 1 School of Physics, University
More informationINTERFERENCE. where, m = 0, 1, 2,... (1.2) otherwise, if it is half integral multiple of wavelength, the interference would be destructive.
1.1 INTERFERENCE When two (or more than two) waves of the same frequency travel almost in the same direction and have a phase difference that remains constant with time, the resultant intensity of light
More informationRetardagraphy: A novel technique for optical recording of the. retardance pattern of an optical anisotropic object on a
Retardagraphy: A novel technique for optical recording of the retardance pattern of an optical anisotropic object on a polarization-sensitive film using a single beam Daisuke Barada, 1,, Kiyonobu Tamura,
More informationShading of a computer-generated hologram by zone plate modulation
Shading of a computer-generated hologram by zone plate modulation Takayuki Kurihara * and Yasuhiro Takaki Institute of Engineering, Tokyo University of Agriculture and Technology, 2-24-16 Naka-cho, Koganei,Tokyo
More informationREMOTE SENSING OF SURFACE STRUCTURES
REMOTE SENSING OF SURFACE STRUCTURES A.W. Koch, P. Evanschitzky and M. Jakobi Technische Universität München Institute for Measurement Systems and Sensor Technology D-8090 München, Germany Abstract: The
More informationMeasurements of the characteristics of spray droplets using in-line digital particle holography
Journal of Mechanical Science and Technology 3 (9) 67~679 Journal of Mechanical Science and Technology www.springerlink.com/content/738-494x DOI.7/s6-9-47- Measurements of the characteristics of spray
More informationModifications of detour phase computer-generated holograms
Modifications of detour phase computer-generated holograms Uriel Levy, Emanuel Marom, and David Mendlovic The detour phase method for the design of computer-generated holograms can be modified to achieve
More informationRegion segmentation and parallel processing for creating large-scale CGHs in polygon source method
Practical Holography XXIII: Materials and Applications, eds. H. I. Bjelkhagen, R. K. Kostuk, SPIE#733, 7330E(009). 1 Region segmentation and parallel processing for creating large-scale CGHs in polygon
More informationHigh spatial resolution measurement of volume holographic gratings
High spatial resolution measurement of volume holographic gratings Gregory J. Steckman, Frank Havermeyer Ondax, Inc., 8 E. Duarte Rd., Monrovia, CA, USA 9116 ABSTRACT The conventional approach for measuring
More informationThis paper is part of the following report: UNCLASSIFIED
UNCLASSIFIED Defense Technical Information Center Compilation Part Notice ADPO 11846 TITLE: Stream Cipher Based on Pseudo-Random Number Generation Using Optical Affine Transformation DISTRIBUTION: Approved
More informationTitle. Author(s)Yamaguchi, Kazuhiro; Sakamoto, Yuji. CitationApplied Optics, 48(34): H203-H211. Issue Date Doc URL. Rights.
Title Computer generated hologram with characteristics of Author(s)Yamaguchi, Kazuhiro; Sakamoto, Yuji CitationApplied Optics, 48(34): H203-H211 Issue Date 2009-12-01 Doc URL http://hdl.handle.net/2115/52148
More informationSupplementary Figure 1: Schematic of the nanorod-scattered wave along the +z. direction.
Supplementary Figure 1: Schematic of the nanorod-scattered wave along the +z direction. Supplementary Figure 2: The nanorod functions as a half-wave plate. The fast axis of the waveplate is parallel to
More informationZero Order Correction of Shift-multiplexed Computer Generated Fourier Holograms Recorded in Incoherent Projection Scheme
VII International Conference on Photonics and Information Optics Volume 2018 Conference Paper Zero Order Correction of Shift-multiplexed Computer Generated Fourier Holograms Recorded in Incoherent Projection
More informationFresnel and Fourier digital holography architectures: a comparison.
Fresnel and Fourier digital holography architectures: a comparison. Damien P., David S. Monaghan, Nitesh Pandey, Bryan M. Hennelly. Department of Computer Science, National University of Ireland, Maynooth,
More informationShift estimation method based fringe pattern profilometry and performance comparison
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2005 Shift estimation method based fringe pattern profilometry and performance
More informationDraft SPOTS Standard Part III (7)
SPOTS Good Practice Guide to Electronic Speckle Pattern Interferometry for Displacement / Strain Analysis Draft SPOTS Standard Part III (7) CALIBRATION AND ASSESSMENT OF OPTICAL STRAIN MEASUREMENTS Good
More informationFRESNEL DIFFRACTION AND PARAXIAL WAVE EQUATION. A. Fresnel diffraction
19 IV. FRESNEL DIFFRACTION AND PARAXIAL WAVE EQUATION A. Fresnel diffraction Any physical optical beam is of finite transverse cross section. Beams of finite cross section may be described in terms of
More informationIntroduction to Computer-Based Holography
Mitglied der Helmholtz-Gemeinschaft Introduction to Computer-Based Holography October 29, 2013 Carsten Karbach, Jülich Supercomputing Centre (JSC) Why computergenerated holography? Applications Source:
More informationAP Physics Problems -- Waves and Light
AP Physics Problems -- Waves and Light 1. 1975-4 (Physical Optics) a. Light of a single wavelength is incident on a single slit of width w. (w is a few wavelengths.) Sketch a graph of the intensity as
More informationVibration parameter measurement using the temporal digital hologram sequence and windowed Fourier transform
THEORETICAL & APPLIED MECHANICS LETTERS 1, 051008 (2011) Vibration parameter measurement using the temporal digital hologram sequence and windowed Fourier transform Chong Yang, 1, 2 1, a) and Hong Miao
More informationChapter 24. Wave Optics. Wave Optics. The wave nature of light is needed to explain various phenomena
Chapter 24 Wave Optics Wave Optics The wave nature of light is needed to explain various phenomena Interference Diffraction Polarization The particle nature of light was the basis for ray (geometric) optics
More informationNEW OPTICAL MEASUREMENT TECHNIQUE FOR SI WAFER SURFACE DEFECTS USING ANNULAR ILLUMINATION WITH CROSSED NICOLS
NEW OPTICAL MEASUREMENT TECHNIQUE FOR SI WAFER SURFACE DEFECTS USING ANNULAR ILLUMINATION WITH CROSSED NICOLS Satoru Takahashi 1, Takashi Miyoshi 1, Yasuhiro Takaya 1, and Takahiro Abe 2 1 Department of
More informationAnalysis of the Gaussian Beam on a Corrugated Dielectric Interface
(An ISO 3297: 27 Certified Organization) Vol. 3, Issue 9, September 214 Analysis of the Gaussian Beam on a Corrugated Dielectric Interface Mohamed B. El_Mashade 1, Adel Shaaban 2 Department of Electrical
More informationThree Dimensional Measurements by Deflectometry and Double Hilbert Transform
Three Dimensional Measurements by Deflectometry and Double Hilbert Transform Silin Na*, Sanghoon Shin**, Younghun Yu* * Department of Physics, Jeju National University, Jeju, 63243, Korea ** Kanghae Precision
More informationUniversity of Huddersfield Repository
University of Huddersfield Repository Muhamedsalih, Hussam, Jiang, Xiang and Gao, F. Interferograms analysis for wavelength scanning interferometer using convolution and fourier transform. Original Citation
More informationChapter 24. Wave Optics. Wave Optics. The wave nature of light is needed to explain various phenomena
Chapter 24 Wave Optics Wave Optics The wave nature of light is needed to explain various phenomena Interference Diffraction Polarization The particle nature of light was the basis for ray (geometric) optics
More informationSimple, complete, and novel quantitative model of holography for students of science and science education
Journal of Physics: Conference Series Simple, complete, and novel quantitative model of holography for students of science and science education To cite this article: Dale W Olson 2013 J. Phys.: Conf.
More informationSIMULATION AND VISUALIZATION IN THE EDUCATION OF COHERENT OPTICS
SIMULATION AND VISUALIZATION IN THE EDUCATION OF COHERENT OPTICS J. KORNIS, P. PACHER Department of Physics Technical University of Budapest H-1111 Budafoki út 8., Hungary e-mail: kornis@phy.bme.hu, pacher@phy.bme.hu
More informationObtaining the curve Phase shift vs gray level of a spatial light modulator Holoeye LC2012
Journal of Physics: Conference Series PAPER OPEN ACCESS Obtaining the curve Phase shift vs gray level of a spatial light modulator Holoeye LC2012 To cite this article: B Villalobos-Mendoza et al 2015 J.
More informationChapter 24. Wave Optics
Chapter 24 Wave Optics Diffraction Huygen s principle requires that the waves spread out after they pass through slits This spreading out of light from its initial line of travel is called diffraction
More information*
Resolution enhancement in digital holography by self-extrapolation of holograms Tatiana Latychevskaia * and Hans-Werner Fink Physics Institute, University of Zurich, Winterthurerstrasse 190, CH-8057, Switzerland
More informationCondenser Optics for Dark Field X-Ray Microscopy
Condenser Optics for Dark Field X-Ray Microscopy S. J. Pfauntsch, A. G. Michette, C. J. Buckley Centre for X-Ray Science, Department of Physics, King s College London, Strand, London WC2R 2LS, UK Abstract.
More informationChapter 38 Wave Optics (II)
Chapter 38 Wave Optics (II) Initiation: Young s ideas on light were daring and imaginative, but he did not provide rigorous mathematical theory and, more importantly, he is arrogant. Progress: Fresnel,
More informationEvaluation of Two-Dimensional Phase Unwrapping Algorithms for Interferometric Adaptive Optics Utilizing Liquid-Crystal Spatial Light Modulators
48 The Open Optics Journal, 008,, 48-5 Open Access Evaluation of Two-Dimensional Phase Unwrapping Algorithms for Interferometric Adaptive Optics Utilizing Liquid-Crystal Spatial Light Modulators K.L. Baker
More information1 Laboratory #4: Division-of-Wavefront Interference
1051-455-0073, Physical Optics 1 Laboratory #4: Division-of-Wavefront Interference 1.1 Theory Recent labs on optical imaging systems have used the concept of light as a ray in goemetrical optics to model
More information5. Double Slit Diffraction
Double Date slit : diffraction 5. Double Slit Diffraction Background Aim of the experiment Huygens s principle Interference Fraunhofer and Fresnel diffraction Coherence Laser 1. To plot the intensity distribution
More informationFormulation of the rotational transformation of wave fields and their application to digital holography
Formulation of the rotational transformation of wave fields and their application to digital holography Kyoji Matsushima Department of Electrical and Electronic Engineering, Kansai University, Yamate-cho
More informationUniversity Physics (Prof. David Flory) Chapt_37 Monday, August 06, 2007
Name: Date: 1. If we increase the wavelength of the light used to form a double-slit diffraction pattern: A) the width of the central diffraction peak increases and the number of bright fringes within
More informationComputer-generated holograms for threedimensional
Computer-generated holograms for three-dimensional surface objects with shade and texture Kyoji Matsushima Digitally synthetic holograms of surface model objects are investigated for reconstructing threedimensional
More informationWaves & Oscillations
Physics 42200 Waves & Oscillations Lecture 41 Review Spring 2016 Semester Matthew Jones Final Exam Date:Tuesday, May 3 th Time:7:00 to 9:00 pm Room: Phys 112 You can bring one double-sided pages of notes/formulas.
More informationMeasurement of Highly Parabolic Mirror using Computer Generated Hologram
Measurement of Highly Parabolic Mirror using Computer Generated Hologram Taehee Kim a, James H. Burge b, Yunwoo Lee c a Digital Media R&D Center, SAMSUNG Electronics Co., Ltd., Suwon city, Kyungki-do,
More informationMEASUREMENT OF THE WAVELENGTH WITH APPLICATION OF A DIFFRACTION GRATING AND A SPECTROMETER
Warsaw University of Technology Faculty of Physics Physics Laboratory I P Irma Śledzińska 4 MEASUREMENT OF THE WAVELENGTH WITH APPLICATION OF A DIFFRACTION GRATING AND A SPECTROMETER 1. Fundamentals Electromagnetic
More informationSingle Photon Interference
December 19, 2006 D. Lancia P. McCarthy Classical Interference Intensity Distribution Overview Quantum Mechanical Interference Probability Distribution Which Path? The Effects of Making a Measurement Wave-Particle
More informationHolographic elements for Fourier transform
Optica Applicata, Vol. XXXIV, No. 1, 2004 Holographic elements for Fourier transform EUGENIUSZ JAGOSZEWSKI, ANDRZEJ ANDRUCHÓW Institute of Physics, Wrocław University of Technology, Wybrzeże Wyspiańskiego
More informationDesign of Optical Lens for Quasi-diffraction-free beam using Particle Swarm Optimization
Vol. (COMCOMS 5), pp.46-5 http://dx.doi.org/.457/astl.5..47 Design of Optical Lens for Quasi-diffraction-free beam using Particle Swarm Optimization Takafumi Fujimoto and Yoko Maemura Graduate School of
More informationLaser Diffraction and Interference
Laser Diffraction and Interference Objective 1. To determine the wavelength of laser light from a thin wire diffraction pattern.. Compare the thickness of the wire with the single-slit width that form
More informationDevelopment of shape measuring system using a line sensor in a lateral shearing interferometer
Development of shape measuring system using a line sensor in a lateral shearing interferometer Takashi NOMURA*a, Kazuhide KAMIYA*a, Akiko NAGATA*a, Hatsuzo TASHIRO **b, Seiichi OKUDA ***c a Toyama Prefectural
More informationComputer generated Fourier holograms for undergraduate optics laboratory
Computer generated Fourier holograms for undergraduate optics laboratory A. Vijayakumar 1, B. J. Jackin 2 and P. K. Palanisamy 3 1 Department of Electrical Engineering Indian Institute of Technology Madras
More informationEfficient Text Encryption and Hiding with Double-Random Phase-Encoding
Sensors 2012, 12, 13441-13457; doi:10.3390/s121013441 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Efficient Text Encryption and Hiding with Double-Random Phase-Encoding Jun
More informationMICHELSON S INTERFEROMETER
MICHELSON S INTERFEROMETER Objectives: 1. Alignment of Michelson s Interferometer using He-Ne laser to observe concentric circular fringes 2. Measurement of the wavelength of He-Ne Laser and Na lamp using
More informationReconstruction of purely absorbing, absorbing and phaseshifting, and strong phase-shifting objects from their single-shot in-line holograms
Reconstruction of purely absorbing, absorbing and phaseshifting, and strong phase-shifting objects from their single-shot in-line holograms Tatiana Latychevskaia* and Hans-Werner Fink Physics Institute,
More informationHANDBOOK OF THE MOIRE FRINGE TECHNIQUE
k HANDBOOK OF THE MOIRE FRINGE TECHNIQUE K. PATORSKI Institute for Design of Precise and Optical Instruments Warsaw University of Technology Warsaw, Poland with a contribution by M. KUJAWINSKA Institute
More informationA Comparison of the Iterative Fourier Transform Method and. Evolutionary Algorithms for the Design of Diffractive Optical.
A Comparison of the Iterative Fourier Transform Method and Evolutionary Algorithms for the Design of Diffractive Optical Elements Philip Birch, Rupert Young, Maria Farsari, David Budgett, John Richardson,
More informationHolographic Elements in Solar Concentrator and Collection Systems
Holographic Elements in Solar Concentrator and Collection Systems Raymond K. Kostuk,2, Jose Castro, Brian Myer 2, Deming Zhang and Glenn Rosenberg 3 Electrical and Computer Engineering, Department University
More informationarxiv: v1 [physics.optics] 1 Mar 2015
Random phase-free kinoform for large objects arxiv:1503.00365v1 [physics.optics] 1 Mar 2015 Tomoyoshi Shimobaba, 1 Takashi Kakue, 1 Yutaka Endo, 1 Ryuji Hirayama, 1 Daisuke Hiyama, 1 Satoki Hasegawa, 1
More informationDiffraction: Propagation of wave based on Huygens s principle.
Diffraction: In addition to interference, waves also exhibit another property diffraction, which is the bending of waves as they pass by some objects or through an aperture. The phenomenon of diffraction
More informationLab2: Single Photon Interference
Lab2: Single Photon Interference Xiaoshu Chen* Department of Mechanical Engineering, University of Rochester, NY, 14623 ABSTRACT The wave-particle duality of light was verified by multi and single photon
More informationFull-Color image reconstruction by holography for 3D X-ray CT
Full-Color image reconstruction by holography for 3D X-ray CT Akifumi Koike, Hisashi Morii, Mitsuhiro Yomori, Yoichiro Neo, Toru Aoki, Hidenori Mimura Shizuoka University, 3-5-1 Johoku, Nakaku, Hamamatsu
More informationImage quality improvement of polygon computer generated holography
Image quality improvement of polygon computer generated holography Xiao-Ning Pang, Ding-Chen Chen, Yi-Cong Ding, Yi-Gui Chen, Shao-Ji Jiang, and Jian-Wen Dong* School of Physics and Engineering, and State
More informationPolarization imaging by use of digital holography
Polarization imaging by use of digital holography Tristan Colomb, Pia Dahlgren, Didier Beghuin, Etienne Cuche, Pierre Marquet, and Christian Depeursinge We present what we believe to be a new digital holographic
More informationContrast Optimization A new way to optimize performance Kenneth Moore, Technical Fellow
Contrast Optimization A new way to optimize performance Kenneth Moore, Technical Fellow What is Contrast Optimization? Contrast Optimization (CO) is a new technique for improving performance of imaging
More informationAcceleration of the calculation speed of computer-generated holograms using the sparsity of the holographic fringe pattern for a 3D object
Vol. 24, No. 22 31 Oct 2016 OPTICS EXPRESS 25317 Acceleration of the calculation speed of computer-generated holograms using the sparsity of the holographic fringe pattern for a 3D object HAK GU KIM, HYUNWOOK
More informationManual Diffraction. Manual remote experiment Project e-xperimenteren+ J. Snellenburg, J.M.Mulder
Manual remote experiment Project e-xperimenteren+ J. Snellenburg, J.M.Mulder 30-01-006 Colofon Manual diffraction Manual remote experiment Project e-xperimenteren+ Stichting Digitale Universiteit Oudenoord
More informationmywbut.com Diffraction
Diffraction If an opaque obstacle (or aperture) is placed between a source of light and screen, a sufficiently distinct shadow of opaque (or an illuminated aperture) is obtained on the screen.this shows
More informationPlane Wave Imaging Using Phased Array Arno Volker 1
11th European Conference on Non-Destructive Testing (ECNDT 2014), October 6-10, 2014, Prague, Czech Republic More Info at Open Access Database www.ndt.net/?id=16409 Plane Wave Imaging Using Phased Array
More informationThree-dimensional angle measurement based on propagation vector analysis of digital holography
Three-dimensional angle measurement based on propagation vector analysis of digital holography Lingfeng Yu, 1, * Giancarlo Pedrini, 1 Wolfgang Osten, 1 and Myung K. Kim 2 1 Institut für Technische Optik,
More informationAPPLICATION OF RADON TRANSFORM IN CT IMAGE MATCHING Yufang Cai, Kuan Shen, Jue Wang ICT Research Center of Chongqing University, Chongqing, P.R.
APPLICATION OF RADON TRANSFORM IN CT IMAGE MATCHING Yufang Cai, Kuan Shen, Jue Wang ICT Research Center of Chongqing University, Chongqing, P.R.China Abstract: When Industrial Computerized Tomography (CT)
More informationTwo pixel computer generated hologram using a zero twist nematic liquid crystal spatial light modulator
Two pixel computer generated hologram using a zero twist nematic liquid crystal spatial light modulator Philip M. Birch, Rupert Young, David Budgett, Chris Chatwin School of Engineering, University of
More informationspecular diffuse reflection.
Lesson 8 Light and Optics The Nature of Light Properties of Light: Reflection Refraction Interference Diffraction Polarization Dispersion and Prisms Total Internal Reflection Huygens s Principle The Nature
More informationOPTI-521 Graduate Report 2 Matthew Risi Tutorial: Introduction to imaging, and estimate of image quality degradation from optical surfaces
OPTI-521 Graduate Report 2 Matthew Risi Tutorial: Introduction to imaging, and estimate of image quality degradation from optical surfaces Abstract The purpose of this tutorial is to introduce the concept
More informationContrast Optimization: A faster and better technique for optimizing on MTF ABSTRACT Keywords: INTRODUCTION THEORY
Contrast Optimization: A faster and better technique for optimizing on MTF Ken Moore, Erin Elliott, Mark Nicholson, Chris Normanshire, Shawn Gay, Jade Aiona Zemax, LLC ABSTRACT Our new Contrast Optimization
More informationChapter 24. Wave Optics
Chapter 24 Wave Optics Wave Optics The wave nature of light is needed to explain various phenomena Interference Diffraction Polarization The particle nature of light was the basis for ray (geometric) optics
More informationBasic optics. Geometrical optics and images Interference Diffraction Diffraction integral. we use simple models that say a lot! more rigorous approach
Basic optics Geometrical optics and images Interference Diffraction Diffraction integral we use simple models that say a lot! more rigorous approach Basic optics Geometrical optics and images Interference
More informationDIFFRACTION 4.1 DIFFRACTION Difference between Interference and Diffraction Classification Of Diffraction Phenomena
4.1 DIFFRACTION Suppose a light wave incident on a slit AB of sufficient width b, as shown in Figure 1. According to concept of rectilinear propagation of light the region A B on the screen should be uniformly
More informationHolographic measurement and synthesis of optical field using a spatial light modulator
Holographic measurement and synthesis of optical field using a spatial light modulator Joonku Hahn NCRCAPAS School of Electrical Engineering Seoul National University Introduction Overview of digital holography
More informationAberrations in Holography
Aberrations in Holography D Padiyar, J Padiyar 1070 Commerce St suite A, San Marcos, CA 92078 dinesh@triple-take.com joy@triple-take.com Abstract. The Seidel aberrations are described as they apply to
More information