Applications of digital holography for information security

2Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Secure optical storage based on a configuration of a joint transform correlator (JTC) using a photorefractive material is presented. A key code designed by an optimized algorithm so that its Fourier transform has a uniform amplitude distribution and a uniformly random phase distribution is introduced. Original two-dimensional data and the key code are placed side-by-side at the input plane. Both of them are stored in a photorefractive material as a joint power spectrum. The retrieval of the original data can be achieved with the same key code. We can record multiple two-dimensional data in the same crystal by angular multiplexing and/or key-code multiplexing.

Cite

CITATION STYLE

APA

Nomura, T., Tajahuerce, E., Matoba, O., & Javidi, B. (2005). Applications of digital holography for information security. In Advanced Sciences and Technologies for Security Applications (Vol. 1, pp. 241–269). Springer. https://doi.org/10.1007/0-387-25096-4_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free