基于夫琅和费算法的通信计算机生成的安全全息图

M. R. Hossain, O. Mojumder, A. Haque
{"title":"基于夫琅和费算法的通信计算机生成的安全全息图","authors":"M. R. Hossain, O. Mojumder, A. Haque","doi":"10.1109/ICECTE48615.2019.9303519","DOIUrl":null,"url":null,"abstract":"In this work, we developed a Computer-Generated Hologram (CGH) based on Fraunhofer algorithm using Matlab for making a relatively secured communication system. In the Fraunhofer algorithm, the computation of far-field amplitude is carried out through Fourier transform which is required to calculate the interference pattern of digital holograms. Here the communicative holograms are developed by means of adding the far-field amplitude of main object image and reference object image. The reconstruction of the main object image is also accomplished the use of this algorithm. We detect the image overlapping constraints in the output image and additionally find the technique to avoid the overlapping between the main object image and inverted main object image at the receiver side. According to the properties of the hologram, the decoding of transmitted hologram is nearly impossible except reference information, so the proposed communicative holographic machine can be applied in the area of secure communication.","PeriodicalId":320507,"journal":{"name":"2019 3rd International Conference on Electrical, Computer & Telecommunication Engineering (ICECTE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Communicative Computer Generated Hologram for Security in Communication System Using Fraunhofer Algorithm\",\"authors\":\"M. R. Hossain, O. Mojumder, A. Haque\",\"doi\":\"10.1109/ICECTE48615.2019.9303519\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this work, we developed a Computer-Generated Hologram (CGH) based on Fraunhofer algorithm using Matlab for making a relatively secured communication system. In the Fraunhofer algorithm, the computation of far-field amplitude is carried out through Fourier transform which is required to calculate the interference pattern of digital holograms. Here the communicative holograms are developed by means of adding the far-field amplitude of main object image and reference object image. The reconstruction of the main object image is also accomplished the use of this algorithm. We detect the image overlapping constraints in the output image and additionally find the technique to avoid the overlapping between the main object image and inverted main object image at the receiver side. According to the properties of the hologram, the decoding of transmitted hologram is nearly impossible except reference information, so the proposed communicative holographic machine can be applied in the area of secure communication.\",\"PeriodicalId\":320507,\"journal\":{\"name\":\"2019 3rd International Conference on Electrical, Computer & Telecommunication Engineering (ICECTE)\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 3rd International Conference on Electrical, Computer & Telecommunication Engineering (ICECTE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECTE48615.2019.9303519\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 3rd International Conference on Electrical, Computer & Telecommunication Engineering (ICECTE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECTE48615.2019.9303519","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在这项工作中,我们利用Matlab开发了基于弗劳恩霍夫算法的计算机生成全息图(CGH),以制作一个相对安全的通信系统。在弗劳恩霍夫算法中,通过傅里叶变换计算远场振幅,这是计算数字全息图干涉图样所必需的。在这里,通过添加主物像和参考物像的远场振幅来开发通信全息图。利用该算法还完成了主目标图像的重建。我们检测了输出图像中的图像重叠约束,并找到了避免接收侧主目标图像与倒立主目标图像重叠的技术。根据全息图的特性,传输全息图除参考信息外几乎不可能解码,因此所提出的通信全息机可以应用于保密通信领域。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Communicative Computer Generated Hologram for Security in Communication System Using Fraunhofer Algorithm
In this work, we developed a Computer-Generated Hologram (CGH) based on Fraunhofer algorithm using Matlab for making a relatively secured communication system. In the Fraunhofer algorithm, the computation of far-field amplitude is carried out through Fourier transform which is required to calculate the interference pattern of digital holograms. Here the communicative holograms are developed by means of adding the far-field amplitude of main object image and reference object image. The reconstruction of the main object image is also accomplished the use of this algorithm. We detect the image overlapping constraints in the output image and additionally find the technique to avoid the overlapping between the main object image and inverted main object image at the receiver side. According to the properties of the hologram, the decoding of transmitted hologram is nearly impossible except reference information, so the proposed communicative holographic machine can be applied in the area of secure communication.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信