共查询到20条相似文献,搜索用时 31 毫秒
1.
A.K. Aggarwal Sushil K. Kaura D.P. Chhachhia A.K. Sharma 《Optics & Laser Technology》2006,38(2):117-121
This paper describes a novel method of incorporating concealed coding features in security holograms in the form of moiré patterns, which need an encoded key hologram to decode them. These concealed codes in the holograms are in turn recorded with an encoded feature, so that these remain invisible to the counterfeiters thereby enhancing the anti-counterfeiting ability of security holograms. These security features, which are specific kinds of moiré patterns, can only be decoded by using an encoded key hologram in the final reading process. Though these type of security holograms are quite suitable for visual inspection, they possess high degree of anti-counterfeit ability and also do not require expensive reading machines. They can also be used as security codes for better protection against counterfeiting embossed holograms. Two different recording schemes for the formation of such security holograms and typical experimental results have been presented. 相似文献
2.
A new method is described to create secrete-codes in the security holograms for enhancing their anti-counterfeiting characteristics.
To imitate these codes is difficult as pure phase objects having complex phase distribution function are used to modulate
the object beam that is recorded in conjunction with an encoded interferometric reference beam derived from a key hologram.
Lloyd’s folding mirror interferometer is used to convert phase variations of the reconstructed wave-front into an intensity
pattern for hologram authenticity verification. Creating the secrete-codes through an interferometric reference beam from
the key hologram facilitates a multi-stage authenticity verification as well as easy repositioning of the security hologram
through a specific Moiré pattern generated during the verification process.
相似文献
3.
目前 ,光学防伪技术已广泛应用于钞票、信用卡、各种证件和高档商品上。全息术是一种被广泛认知的光学防伪技术 ,编码加密技术是提高它防伪功能的重要手段。二次再现全息图是根据全息图能够进行多次记录和多次再现的特点提出的一种加密全息图。在一定的照明条件下 ,它的再现光经过一个平面反射镜的反射返回到全息图 ,作为它的第二束照明光 ,这时能够再现出被加密的图像。它是由一个像全息图和一个参考光编码全息图组合而成的。一般情况下 ,二次再现全息图存在再现光路恢复困难的问题。利用低频光栅能够较好地解决这一问题 ,使二次再现全息图达到实用性的要求。该技术用于防伪产品可提高它的防伪力度。给出了详细的理论分析、制作方法和实验结果 相似文献
4.
5.
A novel multiple information encryption by user-image-based gyrator transform hologram is proposed. In encryption process, each channel of the user image is phase encoded, modulated by random phase function and then gyrator transformed to get the gyrator spectrum of user image. Subsequently, each channel of the secret image is normalized, phase encoded, multiplied by modulated user image, and then gyrator transformed to obtain the gyrator spectrum of secret image. The encrypted digital hologram is recorded by the interference between the gyrator spectrum of user image and the spherical wave function. Similarly, the digital hologram for decryption is recorded by the interference between the gyrator spectrum of secret image and the spherical wave function. The multiple encrypted digital holograms are multiplexed into a final encoded hologram and the corresponding digital holograms for decryption are multiplexed into a final hologram for decryption. The wavelength and radius of the spherical wave function, and angle of gyrator transform are all essential keys for decryption. The proposed system has two main features. First, the encrypted hologram has no information about secret image. Second, the hologram for decryption used as identification key. Consequently the two marked security layers of information protection are achieved. The proposal can be realized by optoelectronic system. Numerical simulation results demonstrate the feasibility and security of the proposed technique. 相似文献
6.
使用计算全息进行三维信息加密的方法研究 总被引:1,自引:0,他引:1
全息加密技术作为一种特殊的加密方法被广泛应用于信息加密和防伪等领域。在全息加密过程中,光波的波长、记录距离和入射角度等参数用做加密密钥和解密密钥被人们深入研究,但所加密的信息几乎都是二维信息。利用一种基于虚拟光学的对三维信息进行加密的方法,将三维物体的大小作为一个新的密钥被引入安全全息加密算法,其安全性能得到了极大提高;在此基础上提出了对再现三维图像进行客观评价的方法,即修正峰值信噪比法(PSNR,PeakSignal-to-Noise Ratio)。模拟实验证明,计算全息方法(CGH,Computer-Generated Hologram)作为一种对三维信息进行加密的方法是可行的,修正PSNR法对再现三维图像的质量进行定量分析是有效的。 相似文献
7.
Raj Kumar 《Optics Communications》2007,279(1):120-123
This paper describes an interferometry-based scheme for concealing phase objects in a security hologram. The decoding process is based on geometrical moiré technique and requires a key for hologram authenticity verification. Decoding process is straightforward and could be carried out in white light, making it suitable for validation of security holograms. The method is described and experimental results are presented. 相似文献
8.
In practical optical security systems we must consider various circumstances for reading and decrypting encrypted holograms.
Binarization of the hologram is best suited for such applications because of the ease of handling encrypted data. However,
the decrypted image is greatly degraded by binarization. Therefore, optimization of a binary hologram is essential in using
such a technique. In this paper, we propose a fast optimization method of a binary encrypted hologram to obtain a good reconstruction
based on the error correction algorithm. In the proposed method, multiple pixels of the binary hologram are simultaneously
flipped for the optimization according to the priority for the correction. The time for the optimization is only 3% of that
of the simulated annealing method. 相似文献
9.
10.
Ding Wang 《Optics Communications》2006,267(1):79-82
A true color stereoscopic hologram is made with one-wavelength laser. Under illuminating incandescent lamp, a true color stereoscopic image can be seen from the hologram. A diffused reference light and a project object light are used in the recording of the hologram. The three primary color images of natural scenery are encoded on a white-and-black film. With the help of the encoded film, a true color hologram is recorded on a plate by single exposure and a true color stereoscopic by two exposures. The simplification of this method is apparent. Further more, it largely decreases the scattering noise of the hologram and averts the problem of color lack fidelity of the holographic image. 相似文献
11.
Securing information by use of digital holography 总被引:41,自引:0,他引:41
An information security method that uses a digital holographic technique is presented. An encrypted image is stored as a digital hologram. The decryption key is also stored as a digital hologram. The encrypted image can be electrically decrypted by use of the digital hologram of the key. This security technique provides secure storage and data transmission. Experimental results are presented to demonstrate the proposed method. 相似文献
12.
基于图像部分加入的数字全息水印技术 总被引:3,自引:0,他引:3
提出了一种以数字全息为基础的数字水印技术,实现了在原始图像中嵌入数字全息水印.考虑到传统的数字全息水印提取过程简单、易受攻击,为了提高水印信息的安全性,对传统的方法进行了改进.采用了图像部分加入的方法,将水印添加位置、水印图像大小和水印添加位置边缘像素作为水印提取密钥.实验证明,运用这种方法添加的水印具有较高的安全性. 相似文献
13.
分数傅里叶变换计算全息 总被引:1,自引:0,他引:1
在计算全息和分数傅里叶变换的基础上提出了不对称分数傅里叶变换计算全息和双随机相位不对称分数傅里叶变换计算全息。在这种方法中,首先用一随机相位函数乘以输入图像信息,然后沿x方向实施α级次的一维分数傅里叶变换,再乘以第二个随机相位函数,最后,沿y方向实施β级次的一维分数傅里叶变换。采用迂回位相编码法对变换后的结果编码,绘出计算全息图。为了恢复原始图像,需要知道变换级次和随机相位函数。利用这种方法进行图像加密,使加密图像的密钥由原来两重增加到四重,从而提高了系统的保密性能。 相似文献
14.
提出了一种基于三维物体的多重菲涅耳计算全息水印方法.将水印信号作为虚拟三维物体的层面,首先结合分区复用层析法和菲涅耳双随机相位编码方法产生复噪声形式的水印信号;然后对水印信号的频谱作共轭对称处理实现实值编码;为减小对宿主全息图数字重建的影响,将水印信号的频谱设置于对宿主数字重建影响小的频谱非感兴趣区域;编码后的信号以一定强度叠加于宿主全息图,水印信号恢复无需原始宿主全息图信息,可实现盲提取,对宿主全息图重建像面的二维码可扫描识别.仿真测试结果表明,所提出的方法具有较好的透明性和稳健性,在宿主全息图遭受滤波、JPEG(联合图像专家小组)压缩、高斯噪声、剪切、旋转等各种攻击的情况下,不论对宿主还是水印信号仍具有良好的数字重建质量,对重建像面的二维码仍可扫描识别;而重建像面水印信号的无干扰可控重建后处理操作解决了不同层面水印信号之间的衍射干扰问题,提高了水印信号的重建质量.虚拟光学手段的应用丰富了水印信号设计方法并提升了算法的安全性. 相似文献
15.
《中国光学快报(英文版)》2016,(6)
An algorithm is proposed for the fast reconstruction of off-axis digital holograms based on a combination of complex encoding(CE) and spatial multiplexing(SM). In this algorithm, every two off-axis holograms recorded in sequence are first assembled into a CE hologram using the CE method, and then four of the CE holograms are again encoded into one complex spatial multiplexing(CSM) hologram based on the SM algorithm. It is demonstrated that the eight holograms encoded into such one CSM hologram can be quickly reconstructed by performing a two-dimensional(2D) Fourier transform(FT) on the CSM hologram. Using this method, the eight 2D FTs required for the reconstruction of the eight holograms in the conventional spatial filtering methods can be simplified to a process with only one 2D FT, which can largely improve the computation efficiency with the 相似文献
16.
17.
18.
A numerically generated encryption pattern in practical optical security systems is processed through real display devices
such as electronically addressed spatial liquid-crystal devices (LCDs). The pattern to be encrypted must be therefore congenial
with electronic interfaces. In usual fact, the quality of a decrypted image in a practical system is greatly degraded due
to the mismatch between the desired encryption pattern and the generated pattern without consideration of the device structures,
such as lattice structures of LCDs. We take into account lattice structures for the displays of encryption and key patterns
in real optical security systems and apply a simulated-annealing like method for the optimization of an encrypted binary hologram.
We successfully demonstrate the decryption of holograms by this method. 相似文献
19.
In previous image watermarking methods an encoded host image and a watermark image are usually directly added, consequently the two images have cross-talk in the decryption step. To eliminate this effect, we propose a novel method based on digital holography, in which all the image pixels of the two sets of holograms resulted from two hidden images are rearranged and integrated into one set of composite holograms with a random scattering matrix (RSM). In decryption the use of this matrix can ensure the exact retrieval of each hologram, and then the perfect reconstruction of each image without cross-talk noise can be achieved. The feasibility of this method and its robustness against occlusion and additional noise are verified by computer simulations with phase-shifting interferometry and double random-phase encoding technique. This approach is suitable for both two- and three-dimensional images, and the additional RSM as a key provides a much higher level of security. 相似文献
20.
When a circularly symmetric wavefront has to be encoded onto a computer generated hologram, it is highly desirable to preserve the symmetry. The coding scheme must therefore be circularly symmetric itself. This paper introduces a particular kind of computer generated hologram which extends circular symmetry to the detour phase technique; this is obtained by working in Fresnel diffraction. The wavefront should be sampled using a circular sampling theorem such as the one derived from the Dini-Bessel expansion. The hologram then consists of weighted unit masses distributed on a set of circles, which in practice are replaced by annuli of suitable inner and outer radii. The approximations due to the detour phase method and to the annuli widths are discussed and an experimental example is shown. 相似文献