TY - GEN
T1 - Authentication system based on computer generated hologram
AU - Murakami, Naoki
AU - Tanaka, Toshiyuki
PY - 2010/1/1
Y1 - 2010/1/1
N2 - Recently, biometrics authentication has been used as various security systems. The problem is that the reliability of previous authentication decreases due to some code-breaking methods. Based on the background, the demand for new security is growing. This paper proposes new security system which uses binary hologram. It aims to add counterfeit prevention and a lot of information into previous binary hologram method. In addition, proposed method uses a high accuracy image registration called as Phase-Only Correlation method for improve the performance of security system. As a result, we achieved accurate reconstructed-image in the two dimensional image.
AB - Recently, biometrics authentication has been used as various security systems. The problem is that the reliability of previous authentication decreases due to some code-breaking methods. Based on the background, the demand for new security is growing. This paper proposes new security system which uses binary hologram. It aims to add counterfeit prevention and a lot of information into previous binary hologram method. In addition, proposed method uses a high accuracy image registration called as Phase-Only Correlation method for improve the performance of security system. As a result, we achieved accurate reconstructed-image in the two dimensional image.
KW - Computer-generated hologram
KW - Phase-Only Correlation
KW - Sub-pixel estimation
UR - http://www.scopus.com/inward/record.url?scp=78649254069&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78649254069&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:78649254069
SN - 9784907764364
T3 - Proceedings of the SICE Annual Conference
SP - 1046
EP - 1049
BT - Proceedings of SICE Annual Conference 2010, SICE 2010 - Final Program and Papers
PB - Society of Instrument and Control Engineers (SICE)
ER -