OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: James C. Wyant
  • Vol. 45, Iss. 19 — Jul. 1, 2006
  • pp: 4617–4624

Performance comparison of iterative algorithms for generating digital correlation holograms used in optical security systems

David Abookasis, Amit Batikoff, Hagay Famini, and Joseph Rosen  »View Author Affiliations


Applied Optics, Vol. 45, Issue 19, pp. 4617-4624 (2006)
http://dx.doi.org/10.1364/AO.45.004617


View Full Text Article

Enhanced HTML    Acrobat PDF (1731 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

An optical security system based on a correlation between two separate binary computer-generated holograms has been developed and experimentally tested. The two holograms are designed using two different iterative algorithms: the projection- onto constrained sets algorithm and the direct binary search (DBS) algorithm. By placing the ready-to-use holograms on a modified joint transform correlator input plane, an output image is constructed as a result of a spatial correlation between the two functions coded by the holograms. Both simulation and experimental results are presented to demonstrate the system's performance. While we concentrate mainly on the DBS algorithm, we also compare the performance of both algorithms.

© 2006 Optical Society of America

OCIS Codes
(070.2590) Fourier optics and signal processing : ABCD transforms
(070.4560) Fourier optics and signal processing : Data processing by optical means
(090.1760) Holography : Computer holography
(100.3010) Image processing : Image reconstruction techniques
(100.4550) Image processing : Correlators

History
Original Manuscript: August 24, 2005
Revised Manuscript: November 30, 2005
Manuscript Accepted: December 21, 2005

Citation
David Abookasis, Amit Batikoff, Hagay Famini, and Joseph Rosen, "Performance comparison of iterative algorithms for generating digital correlation holograms used in optical security systems," Appl. Opt. 45, 4617-4624 (2006)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-45-19-4617


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. B. Javidi, "Securing information with optical technologies," Phys. Today 50(3), 27-32 (1997). [CrossRef]
  2. H. T. Chang, W. C. Lu, and C. J. Kuo, "Multiple-phase retrieval for optical security systems by use of random-phase encoding," Appl. Opt. 41, 4825-4834 (2002). [CrossRef] [PubMed]
  3. A. Sinha, and K. Singh, "A technique for image encryption using digital signature," Opt. Commun. 218, 229-234 (2003). [CrossRef]
  4. D. Abookasis and J. Rosen, "Digital correlation holograms implemented on a joint transform correlator," Opt. Commun. 225, 31-37 (2003). [CrossRef]
  5. D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, "Security optical systems based on a joint transform correlator with significant output images," Opt. Eng. 40, 1584-1589 (2001). [CrossRef]
  6. J. J. Burch, "A computer algorithm for the synthesis of spatial frequency filter," Proc. IEEE 55, 599-601 (1967). [CrossRef]
  7. M. A. Seldowitz, J. P. Allebach, and D. W. Sweeney, "Synthesis of digital holograms by direct binary search," Appl. Opt. 26, 2788-2798 (1987). [CrossRef] [PubMed]
  8. B. K. Jennison, J. P. Allebach, and D. W. Sweeney, "Efficient design of direct-binary-search computer generated holograms," J. Opt. Soc. A 8, 652-660 (1991). [CrossRef]
  9. J-Y. Zhuang and O. K. Ersoy, "Fast decimation-in-frequency direct binary search algorithms for synthesis of computer-generated holograms," J. Opt. Soc. A 11, 135-143 (1994). [CrossRef]
  10. B. B. Chhetri, S. Yang, and T. Shimomura, "Stochastic approach in the efficient design of the direct-binary-search algorithm for hologram synthesis," Appl. Opt. 39, 5956-5964 (2000). [CrossRef]
  11. J. Ohtsubo and A. Fujimoto, "Practical image encryption and decryption by phase-coding technique for optical security systems," Appl. Opt. 41, 4848-4855 (2002). [CrossRef] [PubMed]
  12. D. Abookasis, O. Montal, O. Abramson, and J. Rosen, "Watermarks encrypted in a concealogram and deciphered by a modified joint transform correlator," Appl. Opt. 44, 3019-3023 (2005). [CrossRef] [PubMed]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited