C. Treviño-Palacios, A. Olivares-Pérez, O. J. Zapata-Nava
{"title":"安全系统与光密钥访问","authors":"C. Treviño-Palacios, A. Olivares-Pérez, O. J. Zapata-Nava","doi":"10.1117/12.742333","DOIUrl":null,"url":null,"abstract":"In this work we present a security system that uses an optical key as control access device. The optical key is a computer generated hologram (CGH) recorded using optical damage onto a transparent material using a high power pulsed laser. When we reproduce the CGH with a laser we obtain the codified image on the holographic plane. Placing a camera in this plane the reconstructed image is captured. Using a comparing program that contains the prerecorded security image the access is authorized or denied.","PeriodicalId":359625,"journal":{"name":"Symposium on Optics in Industry","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Security system with optical key access\",\"authors\":\"C. Treviño-Palacios, A. Olivares-Pérez, O. J. Zapata-Nava\",\"doi\":\"10.1117/12.742333\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this work we present a security system that uses an optical key as control access device. The optical key is a computer generated hologram (CGH) recorded using optical damage onto a transparent material using a high power pulsed laser. When we reproduce the CGH with a laser we obtain the codified image on the holographic plane. Placing a camera in this plane the reconstructed image is captured. Using a comparing program that contains the prerecorded security image the access is authorized or denied.\",\"PeriodicalId\":359625,\"journal\":{\"name\":\"Symposium on Optics in Industry\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-03-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Symposium on Optics in Industry\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1117/12.742333\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Symposium on Optics in Industry","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.742333","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this work we present a security system that uses an optical key as control access device. The optical key is a computer generated hologram (CGH) recorded using optical damage onto a transparent material using a high power pulsed laser. When we reproduce the CGH with a laser we obtain the codified image on the holographic plane. Placing a camera in this plane the reconstructed image is captured. Using a comparing program that contains the prerecorded security image the access is authorized or denied.