Paper
31 March 2000 Optical security system based on computer-generated hologram
Jong-Yun Kim, Sang-Gug Park, Cheol Su Kim, Jeong-Woo Kim, Sung-Young Kim, Soo-Joong Kim
Author Affiliations +
Abstract
A new image encoding and identification scheme is proposed for security verification by using a CGH (computer generated hologram), a random phase mask, and a correlation technique. The encrypted image, which is attached to the security product, is made by multiplying PCGH (phase CGH) with a random phase function. The random phase function plays a key role when the encrypted image is decrypted. The encrypted image can be optically recovered by a 2-f imaging system and automatically verified for a personal identification by a 4- f correlation system. Simulation results show the proposed method can be used for both the reconstruction of an original image and the recognition of an encrypted image.
© (2000) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jong-Yun Kim, Sang-Gug Park, Cheol Su Kim, Jeong-Woo Kim, Sung-Young Kim, and Soo-Joong Kim "Optical security system based on computer-generated hologram", Proc. SPIE 4043, Optical Pattern Recognition XI, (31 March 2000); https://doi.org/10.1117/12.381606
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image encryption

Computer security

3D image reconstruction

Computer generated holography

Image processing

Image filtering

Holograms

Back to Top