Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Optimization of Hologram for Security Applications

Optimization cf Hologram for Security Applications studies optical security systems for practical applications in authentication, such as in a card system. The advantages of the optical method in a security are the fast decoding of an encrypted image and the identification of it. Firstly, the authors study a common method of joint transform correlation for optical security systems and the optimization of binary holograms, and prove that the optimization of the hologram can be a powerful tool in the enhancement of system performance. An alternative method employs a phase-coding technique which enables easier realization of practical applications in optical security systems. [Pg.393]


See other pages where Optimization of Hologram for Security Applications is mentioned: [Pg.317]    [Pg.319]    [Pg.321]    [Pg.323]    [Pg.325]    [Pg.327]    [Pg.329]    [Pg.331]    [Pg.333]    [Pg.335]    [Pg.337]    [Pg.339]    [Pg.317]    [Pg.319]    [Pg.321]    [Pg.323]    [Pg.325]    [Pg.327]    [Pg.329]    [Pg.331]    [Pg.333]    [Pg.335]    [Pg.337]    [Pg.339]    [Pg.317]    [Pg.321]    [Pg.338]   


SEARCH



Hologram

Security applications

© 2024 chempedia.info