Professional Documents
Culture Documents
Computer Generated Correlation Holograms PDF
Computer Generated Correlation Holograms PDF
input plane are expressed by the need to get two many schemes of pattern recognition [SI. In the present
separated, size-limited, phase functions, one is randomly JTC we mask the joint spectral plane, and process only
determined once before the first iteration and the other is the first diffraction order in this plane. This procedure
updated every iteration. The constraint on the JTC output enables us to obtain the cross-correlation between,
plane reflects the goal to get on part of the plane an effectively, two complex functions, although there are
intensity pattern close as much as possible to some actually two real positive functions in the input plane.
predefined image. After completing the iterative
procedure, the computer has in its memory two complex 3. SIMULATION AND EXPERIMENTAL RESULTS
functions designed for the specific task of constructing a
desired image from the cross-correlation between these To demonstrate the proposed technique, we
two functions. The present experimental demonstration is numerically and experimentally performed the three
divided into three stages: I . Computation of two complex stages of synthesizing and testing the proposed DCH. In
functions by the JTC-based POCS [SI briefly summarized the first stage the desired image (containing the letters
above. 2. Coding the complex functions as a DCH or as a DCH) was encrypted into two phase functions by the
two visually meaningful concealograms placed side by iterative JTC-based POCS algorithm [9]. Since the SLM
side on the JTC input plane. 3. Construction of the used in this study (CRL, XGA3) can modulate the
desired image from the DCH in a modified JTC transferred light with positive gray-tones only, the
configuration. complex functions were coded into a positive real
We now continue the description from the point that transparency. The obtained double-sections hologram was
the POCS algorithm has yielded two phase functions s. r . displayed on the input plane of the JTC. Each of the two
These two functions are coded into positive. real sub-holograms covered only 110x225 pixels out of
transparencies as CGHs and displayed on the input plane 600x600 pixels, as shown in Fig. 1. As we can see from
ofthe JTC. The two holograms are illuminated by a plane this picture the coded function was located in a diagonal
wave and jointly Fourier transformed. In our modified position in order to avoid the large zero-order diffraction
JTC only part of the joint spatial spectrum is observed by occurring at the origin of the joint transform correlation
a CCD. The intensity pattern of this area is displayed on a output plane.
spatial light modulator (SLM). This SLM is illuminated
by a plane wave such that the Fourier transform of the
SLM transparency is obtained on the JTC output plane.
From mathematical calculations three spatially separated
diffraction orders can be observed. The first term is the
diffraction zero-order at the vicinity of the origin of the
output plane. This term represents the autocorrelation of
the two original complex functions. The second and the
third terms correspond to the cross-correlations between
the two complex functionss and r . According to the
output results of the POCS algorithm, these cross-
correlations approximately produce the desired image.
Therefore we can retrieve the coded image by reading it Figure I : Two sub-holograms on the JTC input plane
from the vicinity of specific points. for both the simulation and experiment.
Following CGH techniques [I I ] we propose to encode A collimated beam from He-Ne laser with h=632.8nm
the complex functions s and r in a different way resemble illuminated SLM and created a diffraction pattern of the
conealogram technique [IO]. In this method the joint transform power spectrum on the back focal plane
magnitude is coded within the area o f a binary dots and of the first Fourierlens in the JTC set up. The entire
the phase within the dots' positions. Every pixel of these intensity of the joint power spectrum recorded by the
complex functions is replaced by a binary submatrix CCD isshown in Fig.2.
Inside each submatrix there is a dot represented by some
binary value, say, I , on a background of the other binary
259
In the case of conealogram coding the POCS algorithm
was tested with an image of the sign p as the hidden
watermark pattern. Each of the two gray-tone pictures,
one for hosting the watermark and the other for hosting
the deciphering key, have the size of 68x68 pixels. After
completing enough iterations of the POCS algorithm, the .
computer memory contains two continuous-tone
complex-valued matrices which should be binarized
according the rule of the concealogram technique [ I I].
The size of each halftone cell was 11x1 I pixels. and the
Figure 2 : Experimental result of three diffraction
gray-tone image is quantized with 7 levels of magnitude
orders on the joint power spectrum plane.
and 11 levels of phase
260
demonstrating that the proposed method has reached its in the latter, the binary mask is a figurative meaningful
W"8l picture instead o f a meaningless collection of dots as the
DCH. Thus, the JTC described above can be used to
reveal a watermark or steganography data embedded in
the concealogram. In this case, the concealogram is
displayed on the input plane instead of one of the sub-
holograms. Additionally, the main innovation in this study
is that an electro-optical correlator in a modified JTC
configuration deciphers the hidden information. The
hidden information is revealed as a result of a spatial
correlation between two CGH's or concealograms. As
Figure 6: Experimental results of the reconstructed consequence of the above technique, illegal deciphering
watermark observed by the CCD on the output the hidden watermark should be practically impossible
plane of the modified JTC. because it is hidden in the form of complicated phase
function. The quality of the reconstructed watermark may
For comparison, Fig. 7 shows the same constructed be improved using alternative algorithm better than the
image obtained from the numerical simulation of the POCS, or using SLM with more pixels.
process Computer simulation and optical experiment confirm
our proposed technique. Since this teihnique can be
particularly useful for preventing illegal distribution and
since our proposed method provides the advantages o f
simple design and alignment with high degree o f security
the above technique can be used for versatile applications
in security areas.
5. REFERENCES
Figure 7: Simulation results of the JTC output plane in [I] W. Bender, D. Gruhl N. Morimoto, and L. Lu, 'Techniques
which the hidden watermark was revealed. for data hiding," IBM Sysr. J . 35, pp. 313-336, 19%.
[2] D . Grover, "Steganography and watermarking of digital data."
Co,rrpa~erLaw & Securiry R e p o ~ 17 r (2). pp. IOI-I04,2001.
[3] S. Kishk, and B. Javidi, "3D object watermarking by'a 3 D
4. DISCUSSION AND CONCLUSION
hidden object," Opr. €.rp 11, pp. 874888,2M)3.
[4] H. T. Chang. W. C. Lu, and C. J. Kuo,"Multiple-Phase
We have proposed and demonstrated a new type of remeval for optical security systems by use ofrandom- phase
computer-generated hologram termed DCH. h e main encoding" Appl. Opr. 41, pp. 48254834,2002.
purpose of the method is to construct on the output plane [ 5 ] D. Abkasis, 0. A m i , J. Rosen and B. Javidi, "Security
a complex function in a conditional way. This means that optical systems based on a joint transform correlator with
two, and only two, holograms are needed to create the significantoutput," Opr. E H ~40,. pp. 1584-1589, 2001.
complex function constructed a s a cross-correlation [6] Yeh C. H.. Chang H. T., Chien H. C., and Kuo C. J., "Design
between the two holograms. The DCH can be used for of Cascaded Phase Keys for a Hierarchical Security System"
several applications such as an encryption system where Appl. Opt. 41,pp. 6128-6134,2002.
the image in the correlarion plane is considered as the [7] A. VanderLugt, "Signal detection by complex spatial filtering."
information that we wish to encrypt. The sub-hologram. IEEE Trans. It$ Theoiy IT-l0,pp. 139.146, 1964.
I [8] C. S . Weaver and J. W. Goodman. "A technique for
modified during the POCS algorithm, is the encryptcd
optically convolving two functions," Appl. Opr. S. pp. 1248-
data, whereas the other unchanged sub-hologram is 1249, I%h.
employed as the decoder for this encrypted data. When [Y] J. Rosen and J. Shamir. "Application of the projection-
this same decoder is used in several encryption onto-constraint-sets algolithm for optical panern recognition,"
procedures, it can become a general decoder for many Opr. /,err. 16, pp. 752-754, 1991.
encrypted holograms. Placing the two sub-holograms [IO] J. Rosen and B. Javidi, "Hidden images in halflone
together in the input plane o f the JTC is the only way to pictures," Appl. Opr. 40, pp. 3346-3353,ZWl.
reconstruct the original image. [ I I ] A. W. Lohmann and D. P. Pans, "Binary Fraunhofer
This concept wds combined with the recently invented holograms generated by computer," Appl. Opt. 6, pp. 1739-
hiding information method called concealogram [I 01. The 1748, 1967.
difference between the DCH and the concealogram is that
26 1