首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This paper describes a novel method of incorporating concealed coding features in security holograms in the form of moiré patterns, which need an encoded key hologram to decode them. These concealed codes in the holograms are in turn recorded with an encoded feature, so that these remain invisible to the counterfeiters thereby enhancing the anti-counterfeiting ability of security holograms. These security features, which are specific kinds of moiré patterns, can only be decoded by using an encoded key hologram in the final reading process. Though these type of security holograms are quite suitable for visual inspection, they possess high degree of anti-counterfeit ability and also do not require expensive reading machines. They can also be used as security codes for better protection against counterfeiting embossed holograms. Two different recording schemes for the formation of such security holograms and typical experimental results have been presented.  相似文献   

2.
Raj Kumar  D Mohan  A K Aggarwal 《Pramana》2007,68(3):443-450
A new method is described to create secrete-codes in the security holograms for enhancing their anti-counterfeiting characteristics. To imitate these codes is difficult as pure phase objects having complex phase distribution function are used to modulate the object beam that is recorded in conjunction with an encoded interferometric reference beam derived from a key hologram. Lloyd’s folding mirror interferometer is used to convert phase variations of the reconstructed wave-front into an intensity pattern for hologram authenticity verification. Creating the secrete-codes through an interferometric reference beam from the key hologram facilitates a multi-stage authenticity verification as well as easy repositioning of the security hologram through a specific Moiré pattern generated during the verification process.   相似文献   

3.
目前 ,光学防伪技术已广泛应用于钞票、信用卡、各种证件和高档商品上。全息术是一种被广泛认知的光学防伪技术 ,编码加密技术是提高它防伪功能的重要手段。二次再现全息图是根据全息图能够进行多次记录和多次再现的特点提出的一种加密全息图。在一定的照明条件下 ,它的再现光经过一个平面反射镜的反射返回到全息图 ,作为它的第二束照明光 ,这时能够再现出被加密的图像。它是由一个像全息图和一个参考光编码全息图组合而成的。一般情况下 ,二次再现全息图存在再现光路恢复困难的问题。利用低频光栅能够较好地解决这一问题 ,使二次再现全息图达到实用性的要求。该技术用于防伪产品可提高它的防伪力度。给出了详细的理论分析、制作方法和实验结果  相似文献   

4.
双重分数傅里叶变换计算全息   总被引:5,自引:3,他引:2  
提出了双重分数傅里叶变换计算全息,在这种方法中,将两个图像的信息分别经不同阶的分数傅里叶变换后,记录在同一张分数傅里叶变换计算全息图上,它需要两个特定的分数傅里叶变换系统才能再现出所记录的图像信息,利用其再现方式的特殊性,可制成一种新的安全认证系统。  相似文献   

5.
A novel multiple information encryption by user-image-based gyrator transform hologram is proposed. In encryption process, each channel of the user image is phase encoded, modulated by random phase function and then gyrator transformed to get the gyrator spectrum of user image. Subsequently, each channel of the secret image is normalized, phase encoded, multiplied by modulated user image, and then gyrator transformed to obtain the gyrator spectrum of secret image. The encrypted digital hologram is recorded by the interference between the gyrator spectrum of user image and the spherical wave function. Similarly, the digital hologram for decryption is recorded by the interference between the gyrator spectrum of secret image and the spherical wave function. The multiple encrypted digital holograms are multiplexed into a final encoded hologram and the corresponding digital holograms for decryption are multiplexed into a final hologram for decryption. The wavelength and radius of the spherical wave function, and angle of gyrator transform are all essential keys for decryption. The proposed system has two main features. First, the encrypted hologram has no information about secret image. Second, the hologram for decryption used as identification key. Consequently the two marked security layers of information protection are achieved. The proposal can be realized by optoelectronic system. Numerical simulation results demonstrate the feasibility and security of the proposed technique.  相似文献   

6.
使用计算全息进行三维信息加密的方法研究   总被引:1,自引:0,他引:1  
全息加密技术作为一种特殊的加密方法被广泛应用于信息加密和防伪等领域。在全息加密过程中,光波的波长、记录距离和入射角度等参数用做加密密钥和解密密钥被人们深入研究,但所加密的信息几乎都是二维信息。利用一种基于虚拟光学的对三维信息进行加密的方法,将三维物体的大小作为一个新的密钥被引入安全全息加密算法,其安全性能得到了极大提高;在此基础上提出了对再现三维图像进行客观评价的方法,即修正峰值信噪比法(PSNR,PeakSignal-to-Noise Ratio)。模拟实验证明,计算全息方法(CGH,Computer-Generated Hologram)作为一种对三维信息进行加密的方法是可行的,修正PSNR法对再现三维图像的质量进行定量分析是有效的。  相似文献   

7.
This paper describes an interferometry-based scheme for concealing phase objects in a security hologram. The decoding process is based on geometrical moiré technique and requires a key for hologram authenticity verification. Decoding process is straightforward and could be carried out in white light, making it suitable for validation of security holograms. The method is described and experimental results are presented.  相似文献   

8.
In practical optical security systems we must consider various circumstances for reading and decrypting encrypted holograms. Binarization of the hologram is best suited for such applications because of the ease of handling encrypted data. However, the decrypted image is greatly degraded by binarization. Therefore, optimization of a binary hologram is essential in using such a technique. In this paper, we propose a fast optimization method of a binary encrypted hologram to obtain a good reconstruction based on the error correction algorithm. In the proposed method, multiple pixels of the binary hologram are simultaneously flipped for the optimization according to the priority for the correction. The time for the optimization is only 3% of that of the simulated annealing method.  相似文献   

9.
一种基于二元位相加密的大信息量数字全息水印   总被引:14,自引:10,他引:4  
陈林森  周小红  邵洁 《光子学报》2005,34(4):616-620
研究了一种基于二元位相加密的大信息量数字全息水印方法,对需隐藏的水印信息用二元位相编码,然后再用2台阶位相密钥进行加密,作为水印插入宿主图像中,解码后得到了高质量的水印结果.与平面波照明数字全息水印相比,采用位相密钥数字全息水印有效地提高了水印提取的安全性和相对光学效率,并保持了对大信息量水印的提取质量,解码过程不依赖于原图像. 计算和分析了二元位相密钥的空间分布对水印信息提取质量的影响,计算结果验证了理论的正确性.  相似文献   

10.
A true color stereoscopic hologram is made with one-wavelength laser. Under illuminating incandescent lamp, a true color stereoscopic image can be seen from the hologram. A diffused reference light and a project object light are used in the recording of the hologram. The three primary color images of natural scenery are encoded on a white-and-black film. With the help of the encoded film, a true color hologram is recorded on a plate by single exposure and a true color stereoscopic by two exposures. The simplification of this method is apparent. Further more, it largely decreases the scattering noise of the hologram and averts the problem of color lack fidelity of the holographic image.  相似文献   

11.
Securing information by use of digital holography   总被引:41,自引:0,他引:41  
An information security method that uses a digital holographic technique is presented. An encrypted image is stored as a digital hologram. The decryption key is also stored as a digital hologram. The encrypted image can be electrically decrypted by use of the digital hologram of the key. This security technique provides secure storage and data transmission. Experimental results are presented to demonstrate the proposed method.  相似文献   

12.
基于图像部分加入的数字全息水印技术   总被引:3,自引:0,他引:3  
刘晓珂  苏显渝 《光子学报》2008,37(4):740-744
提出了一种以数字全息为基础的数字水印技术,实现了在原始图像中嵌入数字全息水印.考虑到传统的数字全息水印提取过程简单、易受攻击,为了提高水印信息的安全性,对传统的方法进行了改进.采用了图像部分加入的方法,将水印添加位置、水印图像大小和水印添加位置边缘像素作为水印提取密钥.实验证明,运用这种方法添加的水印具有较高的安全性.  相似文献   

13.
分数傅里叶变换计算全息   总被引:1,自引:0,他引:1  
盛兆玄  孙新利 《光学技术》2008,34(1):156-158
在计算全息和分数傅里叶变换的基础上提出了不对称分数傅里叶变换计算全息和双随机相位不对称分数傅里叶变换计算全息。在这种方法中,首先用一随机相位函数乘以输入图像信息,然后沿x方向实施α级次的一维分数傅里叶变换,再乘以第二个随机相位函数,最后,沿y方向实施β级次的一维分数傅里叶变换。采用迂回位相编码法对变换后的结果编码,绘出计算全息图。为了恢复原始图像,需要知道变换级次和随机相位函数。利用这种方法进行图像加密,使加密图像的密钥由原来两重增加到四重,从而提高了系统的保密性能。  相似文献   

14.
陈家祯  郑子华  叶锋  连桂仁  许力 《物理学报》2017,66(23):234202-234202
提出了一种基于三维物体的多重菲涅耳计算全息水印方法.将水印信号作为虚拟三维物体的层面,首先结合分区复用层析法和菲涅耳双随机相位编码方法产生复噪声形式的水印信号;然后对水印信号的频谱作共轭对称处理实现实值编码;为减小对宿主全息图数字重建的影响,将水印信号的频谱设置于对宿主数字重建影响小的频谱非感兴趣区域;编码后的信号以一定强度叠加于宿主全息图,水印信号恢复无需原始宿主全息图信息,可实现盲提取,对宿主全息图重建像面的二维码可扫描识别.仿真测试结果表明,所提出的方法具有较好的透明性和稳健性,在宿主全息图遭受滤波、JPEG(联合图像专家小组)压缩、高斯噪声、剪切、旋转等各种攻击的情况下,不论对宿主还是水印信号仍具有良好的数字重建质量,对重建像面的二维码仍可扫描识别;而重建像面水印信号的无干扰可控重建后处理操作解决了不同层面水印信号之间的衍射干扰问题,提高了水印信号的重建质量.虚拟光学手段的应用丰富了水印信号设计方法并提升了算法的安全性.  相似文献   

15.
An algorithm is proposed for the fast reconstruction of off-axis digital holograms based on a combination of complex encoding(CE) and spatial multiplexing(SM). In this algorithm, every two off-axis holograms recorded in sequence are first assembled into a CE hologram using the CE method, and then four of the CE holograms are again encoded into one complex spatial multiplexing(CSM) hologram based on the SM algorithm. It is demonstrated that the eight holograms encoded into such one CSM hologram can be quickly reconstructed by performing a two-dimensional(2D) Fourier transform(FT) on the CSM hologram. Using this method, the eight 2D FTs required for the reconstruction of the eight holograms in the conventional spatial filtering methods can be simplified to a process with only one 2D FT, which can largely improve the computation efficiency with the  相似文献   

16.
 原子全息光刻即采用二元计算全息片掩模来操纵原子,实现微细结构的制作。传统二元计算全息产生的全息片在重现时会产生不止一个实像,这对于原子全息光刻的操作是不利的。提出了一种非相位编码的方法,该方法利用基元函数叠加方式产生实的编码前全息图,再利用类似罗曼Ⅲ型的编码方式产生二元计算全息图。模拟结果表明,利用该方法产生的掩模板可以产生单一的同原始图案相对应的微细结构。  相似文献   

17.
提出了一种条纹移动及形状变化都能预先设定的图案可控动态莫尔全息图的设计方法和制作技术。这种图案可控动态莫尔全息图能够产生旋转、放缩、变换等动态效果。给出了详细的理论分析和实验结果。它是一项非常实用的技术 ,用该技术制作的全息图防伪能力显著提高 ,而且容易目视鉴别  相似文献   

18.
A numerically generated encryption pattern in practical optical security systems is processed through real display devices such as electronically addressed spatial liquid-crystal devices (LCDs). The pattern to be encrypted must be therefore congenial with electronic interfaces. In usual fact, the quality of a decrypted image in a practical system is greatly degraded due to the mismatch between the desired encryption pattern and the generated pattern without consideration of the device structures, such as lattice structures of LCDs. We take into account lattice structures for the displays of encryption and key patterns in real optical security systems and apply a simulated-annealing like method for the optimization of an encrypted binary hologram. We successfully demonstrate the decryption of holograms by this method.  相似文献   

19.
In previous image watermarking methods an encoded host image and a watermark image are usually directly added, consequently the two images have cross-talk in the decryption step. To eliminate this effect, we propose a novel method based on digital holography, in which all the image pixels of the two sets of holograms resulted from two hidden images are rearranged and integrated into one set of composite holograms with a random scattering matrix (RSM). In decryption the use of this matrix can ensure the exact retrieval of each hologram, and then the perfect reconstruction of each image without cross-talk noise can be achieved. The feasibility of this method and its robustness against occlusion and additional noise are verified by computer simulations with phase-shifting interferometry and double random-phase encoding technique. This approach is suitable for both two- and three-dimensional images, and the additional RSM as a key provides a much higher level of security.  相似文献   

20.
When a circularly symmetric wavefront has to be encoded onto a computer generated hologram, it is highly desirable to preserve the symmetry. The coding scheme must therefore be circularly symmetric itself. This paper introduces a particular kind of computer generated hologram which extends circular symmetry to the detour phase technique; this is obtained by working in Fresnel diffraction. The wavefront should be sampled using a circular sampling theorem such as the one derived from the Dini-Bessel expansion. The hologram then consists of weighted unit masses distributed on a set of circles, which in practice are replaced by annuli of suitable inner and outer radii. The approximations due to the detour phase method and to the annuli widths are discussed and an experimental example is shown.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号