Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/89946
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Electronic and Information Engineering-
dc.contributorChinese Mainland Affairs Office-
dc.creatorChen, W-
dc.date.accessioned2021-05-13T08:32:55Z-
dc.date.available2021-05-13T08:32:55Z-
dc.identifier.issn0143-8166-
dc.identifier.urihttp://hdl.handle.net/10397/89946-
dc.language.isoenen_US
dc.publisherElsevieren_US
dc.rights© 2019 Elsevier Ltd. All rights reserved.en US
dc.rights© 2019. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/.en US
dc.rightsThe following publication Chen, W. (2019). Single-shot in-line holographic authentication using phase and amplitude modulation. Optics and Lasers in Engineering, 121, 473-478 is available at https://doi.org/10.1016/j.optlaseng.2019.05.011.en US
dc.subjectIn-line holographic authenticationen_US
dc.subjectOptical authenticationen_US
dc.subjectOptical securityen_US
dc.subjectSingle-shot holographyen_US
dc.titleSingle-shot in-line holographic authentication using phase and amplitude modulationen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage473-
dc.identifier.epage478-
dc.identifier.volume121-
dc.identifier.doi10.1016/j.optlaseng.2019.05.011-
dcterms.abstractIn this paper, single-shot in-line holographic authentication using phase and amplitude modulation is presented. Amplitude modulation and phase modulation are presented and conducted at reference wave path to obtain noise-like reference wavefront and to generate the parameters (masks) at reference wave path as security keys for single-shot in-line digital holography, and its application, i.e., optical authentication, is presented to show validity of the proposed digital holographic system. A reference optical path using the cascaded random amplitude-only and phase-only masks is applied as an example. Only one in-line digital hologram is used for object reconstruction, and the recovered objects can be effectively authenticated. It is illustrated that parameters (e.g., masks) flexibly designed at reference wave path can facilitate wavefront retrieval in the CCD plane and also can act like security keys for optical information authentication. @ Elsevier, 2019.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationOptics and lasers in engineering, Oct. 2019, v. 121, p. 473-478-
dcterms.isPartOfOptics and lasers in engineering-
dcterms.issued2019-10-
dc.identifier.scopus2-s2.0-85065661174-
dc.description.validate202105 bcvc-
dc.description.oaAccepted Manuscripten_US
dc.identifier.FolderNumbera0739-n17-
dc.identifier.SubFormID1345-
dc.description.fundingSourceRGC-
dc.description.fundingSourceOthers-
dc.description.fundingTextRGC: 25201416-
dc.description.fundingTextOthers: R2016A030, R2016A009, G-YBVU, 4-BCDY, 4-ZZHM, 1-ZE5F-
dc.description.pubStatusPublisheden_US
dc.description.oaCategoryGreen (AAM)en_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
a0739-n17_1345.pdfPre-Published version1.7 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

73
Last Week
1
Last month
Citations as of Apr 14, 2025

Downloads

67
Citations as of Apr 14, 2025

SCOPUSTM   
Citations

10
Citations as of Dec 19, 2025

WEB OF SCIENCETM
Citations

7
Citations as of Oct 10, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.