Share Email Print

Proceedings Paper

Optical security system based on computer-generated hologram
Author(s): Jong-Yun Kim; Sang-Gug Park; Cheol Su Kim; Jeong-Woo Kim; Sung-Young Kim; Soo-Joong Kim
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

A new image encoding and identification scheme is proposed for security verification by using a CGH (computer generated hologram), a random phase mask, and a correlation technique. The encrypted image, which is attached to the security product, is made by multiplying PCGH (phase CGH) with a random phase function. The random phase function plays a key role when the encrypted image is decrypted. The encrypted image can be optically recovered by a 2-f imaging system and automatically verified for a personal identification by a 4- f correlation system. Simulation results show the proposed method can be used for both the reconstruction of an original image and the recognition of an encrypted image.

Paper Details

Date Published: 31 March 2000
PDF: 8 pages
Proc. SPIE 4043, Optical Pattern Recognition XI, (31 March 2000); doi: 10.1117/12.381606
Show Author Affiliations
Jong-Yun Kim, Kyungpook National Univ. (South Korea)
Sang-Gug Park, Research Institute of Industrial Science & Technology (South Korea)
Cheol Su Kim, Kyongju Univ. (South Korea)
Jeong-Woo Kim, Dongyang Univ. (South Korea)
Sung-Young Kim, Uiduk Univ. (South Korea)
Soo-Joong Kim, Kyungpook National Univ. (South Korea)

Published in SPIE Proceedings Vol. 4043:
Optical Pattern Recognition XI
David P. Casasent; Tien-Hsin Chao, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?