Security of Volume Hologram─Research of Encryption and Decryption of Random Phase
碩士 === 大同大學 === 光電工程研究所 === 91 === An optical security holographic memory encrypted by a random phase key and decrypted by a holographic key (a holographic optical element; HOE) is presented and demonstrated. The security hologram is based on protecting the access to the memory from the u...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/10218377183782686992 |
id |
ndltd-TW-091TTU00124006 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-091TTU001240062015-10-13T13:36:00Z http://ndltd.ncl.edu.tw/handle/10218377183782686992 Security of Volume Hologram─Research of Encryption and Decryption of Random Phase 保密性體積全像─亂相編碼保密與解密之研究 Yu-Cheng Chen 陳裕政 碩士 大同大學 光電工程研究所 91 An optical security holographic memory encrypted by a random phase key and decrypted by a holographic key (a holographic optical element; HOE) is presented and demonstrated. The security hologram is based on protecting the access to the memory from the unauthorized users by encoding the reference waves. The holographic decryption key is fabricated by storing the wavefront information of the set of reference beams. Each addressed reference beam is stored in the HOE through holographic multiplexing technique. The decryption process is achieved by using the reconstruction reference beam to access the secure data. This security hologram system is suitable for practical application and provides a high level of security, since the decryption key can be controlled copied but the decryption HOEs are difficult to counterfeit. Wei-Chia Su 蘇威佳 2003 學位論文 ; thesis 0 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 大同大學 === 光電工程研究所 === 91 === An optical security holographic memory encrypted by a random phase key and decrypted by a holographic key (a holographic optical element; HOE) is presented and demonstrated. The security hologram is based on protecting the access to the memory from the unauthorized users by encoding the reference waves. The holographic decryption key is fabricated by storing the wavefront information of the set of reference beams. Each addressed reference beam is stored in the HOE through holographic multiplexing technique. The decryption process is achieved by using the reconstruction reference beam to access the secure data. This security hologram system is suitable for practical application and provides a high level of security, since the decryption key can be controlled copied but the decryption HOEs are difficult to counterfeit.
|
author2 |
Wei-Chia Su |
author_facet |
Wei-Chia Su Yu-Cheng Chen 陳裕政 |
author |
Yu-Cheng Chen 陳裕政 |
spellingShingle |
Yu-Cheng Chen 陳裕政 Security of Volume Hologram─Research of Encryption and Decryption of Random Phase |
author_sort |
Yu-Cheng Chen |
title |
Security of Volume Hologram─Research of Encryption and Decryption of Random Phase |
title_short |
Security of Volume Hologram─Research of Encryption and Decryption of Random Phase |
title_full |
Security of Volume Hologram─Research of Encryption and Decryption of Random Phase |
title_fullStr |
Security of Volume Hologram─Research of Encryption and Decryption of Random Phase |
title_full_unstemmed |
Security of Volume Hologram─Research of Encryption and Decryption of Random Phase |
title_sort |
security of volume hologram─research of encryption and decryption of random phase |
publishDate |
2003 |
url |
http://ndltd.ncl.edu.tw/handle/10218377183782686992 |
work_keys_str_mv |
AT yuchengchen securityofvolumehologramresearchofencryptionanddecryptionofrandomphase AT chényùzhèng securityofvolumehologramresearchofencryptionanddecryptionofrandomphase AT yuchengchen bǎomìxìngtǐjīquánxiàngluànxiāngbiānmǎbǎomìyǔjiěmìzhīyánjiū AT chényùzhèng bǎomìxìngtǐjīquánxiàngluànxiāngbiānmǎbǎomìyǔjiěmìzhīyánjiū |
_version_ |
1717739073261535232 |