首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This paper describes a simple method for making dual beam encoded extended fractional Fourier transform (EFRT) security holograms. The hologram possesses different stages of encoding so that security features are concealed and remain invisible to the counterfeiter. These concealed and encoded anticounterfeit security features in the security hologram can only be read through a key hologram. Key hologram also facilitates in-built repositioning of security hologram. The method of fabrication, the principle of reconstruction and the experimental results are presented.   相似文献   

2.
This paper describes an interferometry-based scheme for concealing phase objects in a security hologram. The decoding process is based on geometrical moiré technique and requires a key for hologram authenticity verification. Decoding process is straightforward and could be carried out in white light, making it suitable for validation of security holograms. The method is described and experimental results are presented.  相似文献   

3.
Raj Kumar  D Mohan  A K Aggarwal 《Pramana》2007,68(3):443-450
A new method is described to create secrete-codes in the security holograms for enhancing their anti-counterfeiting characteristics. To imitate these codes is difficult as pure phase objects having complex phase distribution function are used to modulate the object beam that is recorded in conjunction with an encoded interferometric reference beam derived from a key hologram. Lloyd’s folding mirror interferometer is used to convert phase variations of the reconstructed wave-front into an intensity pattern for hologram authenticity verification. Creating the secrete-codes through an interferometric reference beam from the key hologram facilitates a multi-stage authenticity verification as well as easy repositioning of the security hologram through a specific Moiré pattern generated during the verification process.   相似文献   

4.
We presented “hologravure” as the generalization of a scratch hologram, generated by computer from a three-dimensional (3D) model by using an appropriate software, and laser-drawing with a conventional engraver-laser system. For making this type of computer-generated hologram, neither diffractive optics, nor mask pattern or photo-reduction of a transparency onto a high resolution film plate is needed. The shape of a 3D virtual object is encoded in a two-dimensional (2D) multiple circular-scratch drawing. A computer program was created for generating the holograms. Hologravures representing several 3D models are engraved on different materials, and the quality of the lines traced by the CO2 laser is considered. Sheets of acrylic, polycarbonate, glass and thermo-resistant pieces of acetate were tested. Reconstructed images of all this computer-generated and laser engraved holograms and also of computer assisted and hand-drawn scratch holograms, synthesized by means of the same software are shown.  相似文献   

5.
Implementation of holographic moiré inspection is demonstrated using one hologram to project the reference grating and a further hologram to produce moiré patterns. Well contrasted moiré fringes are obtained. Results of calibration tests are reported and an example of object contouring is presented.  相似文献   

6.
A novel multiple information encryption by user-image-based gyrator transform hologram is proposed. In encryption process, each channel of the user image is phase encoded, modulated by random phase function and then gyrator transformed to get the gyrator spectrum of user image. Subsequently, each channel of the secret image is normalized, phase encoded, multiplied by modulated user image, and then gyrator transformed to obtain the gyrator spectrum of secret image. The encrypted digital hologram is recorded by the interference between the gyrator spectrum of user image and the spherical wave function. Similarly, the digital hologram for decryption is recorded by the interference between the gyrator spectrum of secret image and the spherical wave function. The multiple encrypted digital holograms are multiplexed into a final encoded hologram and the corresponding digital holograms for decryption are multiplexed into a final hologram for decryption. The wavelength and radius of the spherical wave function, and angle of gyrator transform are all essential keys for decryption. The proposed system has two main features. First, the encrypted hologram has no information about secret image. Second, the hologram for decryption used as identification key. Consequently the two marked security layers of information protection are achieved. The proposal can be realized by optoelectronic system. Numerical simulation results demonstrate the feasibility and security of the proposed technique.  相似文献   

7.
A phase-shifting moiré interferometry and hole-drilling combined system was developed to determine residual stresses. The relationship between the 2D displacement data of three points around the drilled hole and the residual stresses relieved by hole-drilling was established. The experimental setup consisted of a four-beam moiré interferometer and a computer-controlled hole-drilling system. Two phase shifters controlled by computer were fixed in two of the four optic paths to directly get the displacement data. With special residual stresses calculation software, the phase distributions of the u and v field obtained by moiré interferometry were quickly converted into values of residual stresses. To analyze the accuracy of this experimental system, an aluminum specimen with a blind hole in the center was real-time tensioned in this system. The displacement field obtained by phase shifting moiré interferometry was compared with the finite element method solution. Good agreement was found with respect to each other. As an application, the in-depth residual stresses of a shot-peened aluminum plate were measured by this method, and possible error sources were discussed.  相似文献   

8.
对不同时期和采用各种技术制作的彩色全息图以及所使用的记录材料进行了较全面的介绍。这些技术包括光全息术、计算全息术和数字全息术。并对彩色全息术的未来发展进行了展望。  相似文献   

9.
莫尔技术用于制作隐型全息密码的应用研究   总被引:3,自引:1,他引:2  
提出根据莫尔理论制作隐型全息密码的方法,对此方法作了理论分析并给出实验结果。此方法有制作过程简单,所制作的密码隐蔽性高,检验密码方便的特点。有效地提高全息标识的防伪能力,因而具有很高的经济价值。  相似文献   

10.
It is possible to apply a new recording material with high diffraction efficiency (of the order of 82.3%) to replicate computer phase or analogical holograms. This material is the all purpose adhesive UHU®. It is constituted by some components of polyvinyl, nitrates and some solvent agents; it is easily applied to any substrate. We record this material with heat generation by hand rubbing, using a mask (Kodalith® films) manufactured with lithographic techniques. The holographic replication is excellent on the new material UHU® adhesive, showing a phase modulation for refraction index and relief. This modulation is determined by the cured polymers process induced by friction, as pressure and temperature, with an anaerobic reaction.For copy of conventional holograms at high frequencies (holographic ranges), the diffraction efficiency parameter is in the neighborhood of 19.1% at first order or more, depending on diffraction efficiency of the pattern of the hologram. The hologram is elaborated in the absence of any development process and does not need to have carefully controlled conditions of the environment. Following this process, the hologram is obtained at standard atmospheric conditions of pressure and temperature.  相似文献   

11.
单波长编码计算机制彩色彩虹全息图的研究   总被引:5,自引:2,他引:3  
蔡晓鸥  王辉  李勇 《光子学报》2006,35(7):1013-1017
提出计算机制三维物体彩色全息图的新方法.通过理论分析表明,在满足一定的条件下,三个不同原色的点光源所产生的全息图光栅结构和距全息图不同距离的三个同色物点的光产生的全息图光栅结构是等价的.根据这一原理并参照彩虹全息技术,研究了物体三原色信息光分布的编码方法和全息图的算法,用单波长计算实现彩色全息图的制作,同时,较为完满地解决了全息图叠加和色串扰问题.实验结果证明了该方法的可行性及有效性.  相似文献   

12.
It is experimentally demonstrated that the image resolution from an in-line Fraunhofer hologram degrades appreciably when the centre of the diffraction pattern from a 5-bar resolution target is located asymmetrically in the hologram aperture. This effect is confirmed and analysed using calculated and experimentally measured images from holograms of a one-dimensional wire. Increasing asymmetry results in an increasing error in the measured linewidth, and a reduction of image resolution. A simple model based on average fringe contrast is used to predict this decrease in resolution with transverse object position.  相似文献   

13.
An algorithm is proposed for the fast reconstruction of off-axis digital holograms based on a combination of complex encoding(CE) and spatial multiplexing(SM). In this algorithm, every two off-axis holograms recorded in sequence are first assembled into a CE hologram using the CE method, and then four of the CE holograms are again encoded into one complex spatial multiplexing(CSM) hologram based on the SM algorithm. It is demonstrated that the eight holograms encoded into such one CSM hologram can be quickly reconstructed by performing a two-dimensional(2D) Fourier transform(FT) on the CSM hologram. Using this method, the eight 2D FTs required for the reconstruction of the eight holograms in the conventional spatial filtering methods can be simplified to a process with only one 2D FT, which can largely improve the computation efficiency with the  相似文献   

14.
In this paper, a new theta modulation multiplexing scheme for producing multiplexed computer-generated holograms (CGHs) is proposed. Under this scheme, normal Lohmann-type CGHs are individually modulated by gratings with different orientations and then superimposed to form a single hologram. The proposed method results in a higher storage capacity without the increase of hologram space. Theoretical analysis and experimental results are presented.  相似文献   

15.
In previous image watermarking methods an encoded host image and a watermark image are usually directly added, consequently the two images have cross-talk in the decryption step. To eliminate this effect, we propose a novel method based on digital holography, in which all the image pixels of the two sets of holograms resulted from two hidden images are rearranged and integrated into one set of composite holograms with a random scattering matrix (RSM). In decryption the use of this matrix can ensure the exact retrieval of each hologram, and then the perfect reconstruction of each image without cross-talk noise can be achieved. The feasibility of this method and its robustness against occlusion and additional noise are verified by computer simulations with phase-shifting interferometry and double random-phase encoding technique. This approach is suitable for both two- and three-dimensional images, and the additional RSM as a key provides a much higher level of security.  相似文献   

16.
Volume hologram scheme using optical fiber for spatial multiplexing   总被引:1,自引:0,他引:1  
Kang YH  Kim KH  Lee B 《Optics letters》1997,22(10):739-741
Speckle patterns from optical fibers are used for reference beams in writing and reading volume holograms. The photorefractive volume hologram with the scheme shows good spatial selectivity for spatial (shift) multiplexing. Experimental results are presented and compared with numerical analysis.  相似文献   

17.
目前 ,光学防伪技术已广泛应用于钞票、信用卡、各种证件和高档商品上。全息术是一种被广泛认知的光学防伪技术 ,编码加密技术是提高它防伪功能的重要手段。二次再现全息图是根据全息图能够进行多次记录和多次再现的特点提出的一种加密全息图。在一定的照明条件下 ,它的再现光经过一个平面反射镜的反射返回到全息图 ,作为它的第二束照明光 ,这时能够再现出被加密的图像。它是由一个像全息图和一个参考光编码全息图组合而成的。一般情况下 ,二次再现全息图存在再现光路恢复困难的问题。利用低频光栅能够较好地解决这一问题 ,使二次再现全息图达到实用性的要求。该技术用于防伪产品可提高它的防伪力度。给出了详细的理论分析、制作方法和实验结果  相似文献   

18.
Computer-generated image holograms are particularly useful for 3D-display applications. We discuss the properties of the reconstructions obtained with this hologram type. Conditions are given which must be fulfilled to ensure a disturbance free reconstruction. A new efficient algorithm is presented which implements the hidden surface effect for synthetic image holograms.Presented at the International Commission for Optics Topical Meeting, Kyoto, 1994.  相似文献   

19.
A theoretical model of light diffraction by tilted holographic gratings in photopolymeric materials in the nonstationary regime of reading, which describes the dynamic process of optical hologram amplification with allowance for the photopolymerization and diffusion mechanisms of recording, is developed. For the given model, the dynamics of the diffraction efficiency and selective properties of hologram reading are modeled numerically when Bragg's conditions are satisfied and violated. It is demonstrated that the diffraction characteristics of tilted holograms are spatially noninvariant for the reading beam direction. The optimal conditions of reading of tilted holograms are established.  相似文献   

20.
A simple method of recording full-view rainbow-reflection holograms on a single flat plate is described: only one white-light illuminating source is required in the reconstruction process. The hologram can be viewed from opposite sides, where each side of a three-dimensional object, with its original spatial relationship, is displayed in bright colours.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号