1999
DOI: 10.1117/1.602058
|View full text |Cite
|
Sign up to set email alerts
|

Transformed phase mask and photoanisotropic material in optical correlators applied for security verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
11
0

Year Published

2000
2000
2011
2011

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…In this case, not only peak intensities, but also vector distances between peaks can be regarded as identification criteria. 6,7 Let us consider briefly the linear and nonlinear models of such the RHM's producing and identification. …”
Section: Conditions Of Master Hologram Recording and Reconstructionmentioning
confidence: 99%
See 2 more Smart Citations
“…In this case, not only peak intensities, but also vector distances between peaks can be regarded as identification criteria. 6,7 Let us consider briefly the linear and nonlinear models of such the RHM's producing and identification. …”
Section: Conditions Of Master Hologram Recording and Reconstructionmentioning
confidence: 99%
“…The part of correlation response covering the first diffraction order area is used for creation of an identification feature vector and its comparison with a reference feature vector. 6 The results of reconstruction of master holograms and RHMs are represented in Fig. 6 and Fig.…”
Section: Reconstruction and Analysis Of Rhms And Refelecting Master Hmentioning
confidence: 99%
See 1 more Smart Citation
“…[4][5][6][7][8] We have created the optical/digital device (ODD) for the identification of credit cards [8][9][10][11][12] . The well-known security verification technique 1-3 is suitable for this purpose.…”
Section: Introductionmentioning
confidence: 99%
“…Optical encryption have the added property that a large amount of data can be stored or retrieved in parallel and at high speed. The first to be used were techniques related to analog en cryption methods based on different correlation architectures [7,8]. These setups can be considered as the basis for the design of real-time optical security devices.…”
mentioning
confidence: 99%