Skip to main content

Digital Holography for Security Applications

  • Conference paper
  • 1077 Accesses

Abstract

A survey of Digital Holography (DH) and its employment in different application fields is provided. This paper reviews the main principles of the DH focusing on the optical techniques for security purposes. Recording and processing of three dimensional data, secured storage data, the use of Multimedia Sensor Network (MSN) for encrypted data transmission, and thus remote reconstruction of 3D images, are relevant examples in which DH represents an attractive solution. In this work, the state of art and major research challenges for this type of applications are shown and at the end fundamental open issue are discussed in order to outline the future research trends in this topic.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gabor, D.: A new microscopic principle. Nature 161, 777–778

    Google Scholar 

  2. Leith, E.N., Upatnieks, J.: Reconstructed wavefronts and communication theory. Journ. Opt. Soc Amer 54, 1295–1301

    Google Scholar 

  3. Schnars, U., Jueptner, W.: Digital Holography. Springer Edition (2005)

    Google Scholar 

  4. Skarman, B., Becker, J., Wozniak, K.: Simultaneous 3D-PIV and temperature measurements using a new CCD-based holographic interferometer. Flow Meas. Instrum. 7(1), 1–6

    Google Scholar 

  5. Seebacher, S.: Anwendung der digitalen Holografie bei der 3D-Form- und Verformungsmessung an Komponenten der Mikrosystemtechnik. Univeristy Bremen publishing house, Bremen (2001)

    Google Scholar 

  6. Akyildiz, I.F., et al.: A Survey on Sensor Networks. IEEE Communication Magazine (August 2002)

    Google Scholar 

  7. Fournier, C., Ducottet, C., Fournel, T.: Digital holographic particle image velocimetry: 3D velocity field extraction using correlation. Journal of Flow Visualization and Image Processing 11, 1–20

    Google Scholar 

  8. Virant, M., Dracos, T.: 3D PTV and its application on Lagrangian motion. Measurement Science and Technology 8, 1539–1552 (1997)

    Article  Google Scholar 

  9. Ohmi1, K., Panday, S.P., Joshi, B.: Digital Holography Based Particle Tracking Velocimetry. In: FLUCOME 2009 (2009)

    Google Scholar 

  10. Dhar, L., Hortelano, E.: The Next Generation of Optical Data Storage: Holography, RADTECH Report (November, December 2007)

    Google Scholar 

  11. Matoba, et al.: Optical Techniques for Information Security. Proceedings of the IEEE 97(6) (June 2009)

    Google Scholar 

  12. Kishk, S., et al.: Optical Encryption and Decryption of Three Dimensional Objects by Computer Generated Holograms, ???

    Google Scholar 

  13. Akyildz, I.F., Melodia, T., Chowdury, K.R.: Wireless Multimedia Sensor Networks: A Survey. IEEE Wireless Communications (December 2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Pellegrini, R.M., Persia, S., Betti, S. (2012). Digital Holography for Security Applications. In: Prasad, R., Farkas, K., Schmidt, A.U., Lioy, A., Russello, G., Luccio, F.L. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 94. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30244-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30244-2_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30243-5

  • Online ISBN: 978-3-642-30244-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics