Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/107250
DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Electrical and Electronic Engineering | - |
dc.creator | Chen, W | en_US |
dc.date.accessioned | 2024-06-13T01:04:54Z | - |
dc.date.available | 2024-06-13T01:04:54Z | - |
dc.identifier.isbn | 978-150902870-2 | en_US |
dc.identifier.uri | http://hdl.handle.net/10397/107250 | - |
dc.description | 2016 IEEE 14th International Conference on Industrial Informatics (INDIN), 19-21 July 2016, Poitiers, France | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers | en_US |
dc.rights | ©2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | en_US |
dc.rights | The following publication W. Chen, "Computer-generated hologram authentication via optical correlation," 2016 IEEE 14th International Conference on Industrial Informatics (INDIN), Poitiers, France, 2016, pp. 536-540 is available at https://doi.org/10.1109/INDIN.2016.7819220. | en_US |
dc.title | Computer-generated hologram authentication via optical correlation | en_US |
dc.type | Conference Paper | en_US |
dc.identifier.spage | 536 | en_US |
dc.identifier.epage | 540 | en_US |
dc.identifier.doi | 10.1109/INDIN.2016.7819220 | en_US |
dcterms.abstract | Computer-generated hologram (CGH) has attracted much attention over the past decades, and has been widely applied in many areas, such as display, security and optical tweezer. In this paper, CGH-based authentication approach is presented by using optical correlation. After the original image is sparsified, phase-only mask is iteratively extracted as ciphertext based on CGH system. It is illustrated that the decoded information can be effectively and correctly authenticated by using optical correlation. | - |
dcterms.accessRights | open access | en_US |
dcterms.bibliographicCitation | In Proceedings of 2016 IEEE 14th International Conference on Industrial Informatics (INDIN), 19-21 July 2016, Poitiers, France, p. 536-540 | en_US |
dcterms.issued | 2016 | - |
dc.identifier.scopus | 2-s2.0-85012893824 | - |
dc.relation.conference | IEEE International Conference on Industrial Informatics [INDIN] | - |
dc.description.validate | 202404 bckw | - |
dc.description.oa | Accepted Manuscript | en_US |
dc.identifier.FolderNumber | EIE-0752 | - |
dc.description.fundingSource | Others | en_US |
dc.description.fundingText | The Hong Kong Polytechnic University | en_US |
dc.description.pubStatus | Published | en_US |
dc.identifier.OPUS | 9588686 | - |
dc.description.oaCategory | Green (AAM) | en_US |
Appears in Collections: | Conference Paper |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Chen_Computer-Generated_Hologram_Authentication.pdf | Pre-Published version | 512.15 kB | Adobe PDF | View/Open |
Page views
6
Citations as of Jun 30, 2024
Downloads
3
Citations as of Jun 30, 2024
SCOPUSTM
Citations
3
Citations as of Jun 21, 2024
![](/image/google_scholar.jpg)
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.