Paper
31 March 2000 Optical security system based on computer-generated hologram
Jong-Yun Kim, Sang-Gug Park, Cheol Su Kim, Jeong-Woo Kim, Sung-Young Kim, Soo-Joong Kim
Author Affiliations +
Abstract
A new image encoding and identification scheme is proposed for security verification by using a CGH (computer generated hologram), a random phase mask, and a correlation technique. The encrypted image, which is attached to the security product, is made by multiplying PCGH (phase CGH) with a random phase function. The random phase function plays a key role when the encrypted image is decrypted. The encrypted image can be optically recovered by a 2-f imaging system and automatically verified for a personal identification by a 4- f correlation system. Simulation results show the proposed method can be used for both the reconstruction of an original image and the recognition of an encrypted image.
© (2000) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jong-Yun Kim, Sang-Gug Park, Cheol Su Kim, Jeong-Woo Kim, Sung-Young Kim, and Soo-Joong Kim "Optical security system based on computer-generated hologram", Proc. SPIE 4043, Optical Pattern Recognition XI, (31 March 2000); https://doi.org/10.1117/12.381606
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image encryption

Computer security

3D image reconstruction

Computer generated holography

Image processing

Image filtering

Holograms

RELATED CONTENT


Back to Top