Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/107250
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Electrical and Electronic Engineering-
dc.creatorChen, Wen_US
dc.date.accessioned2024-06-13T01:04:54Z-
dc.date.available2024-06-13T01:04:54Z-
dc.identifier.isbn978-150902870-2en_US
dc.identifier.urihttp://hdl.handle.net/10397/107250-
dc.description2016 IEEE 14th International Conference on Industrial Informatics (INDIN), 19-21 July 2016, Poitiers, Franceen_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.rights©2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
dc.rightsThe following publication W. Chen, "Computer-generated hologram authentication via optical correlation," 2016 IEEE 14th International Conference on Industrial Informatics (INDIN), Poitiers, France, 2016, pp. 536-540 is available at https://doi.org/10.1109/INDIN.2016.7819220.en_US
dc.titleComputer-generated hologram authentication via optical correlationen_US
dc.typeConference Paperen_US
dc.identifier.spage536en_US
dc.identifier.epage540en_US
dc.identifier.doi10.1109/INDIN.2016.7819220en_US
dcterms.abstractComputer-generated hologram (CGH) has attracted much attention over the past decades, and has been widely applied in many areas, such as display, security and optical tweezer. In this paper, CGH-based authentication approach is presented by using optical correlation. After the original image is sparsified, phase-only mask is iteratively extracted as ciphertext based on CGH system. It is illustrated that the decoded information can be effectively and correctly authenticated by using optical correlation.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationIn Proceedings of 2016 IEEE 14th International Conference on Industrial Informatics (INDIN), 19-21 July 2016, Poitiers, France, p. 536-540en_US
dcterms.issued2016-
dc.identifier.scopus2-s2.0-85012893824-
dc.relation.conferenceIEEE International Conference on Industrial Informatics [INDIN]-
dc.description.validate202404 bckw-
dc.description.oaAccepted Manuscripten_US
dc.identifier.FolderNumberEIE-0752-
dc.description.fundingSourceOthersen_US
dc.description.fundingTextThe Hong Kong Polytechnic Universityen_US
dc.description.pubStatusPublisheden_US
dc.identifier.OPUS9588686-
dc.description.oaCategoryGreen (AAM)en_US
Appears in Collections:Conference Paper
Files in This Item:
File Description SizeFormat 
Chen_Computer-Generated_Hologram_Authentication.pdfPre-Published version512.15 kBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

6
Citations as of Jun 30, 2024

Downloads

3
Citations as of Jun 30, 2024

SCOPUSTM   
Citations

3
Citations as of Jun 21, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.