**Part 4**

**Holograms in Security Applications** 

314 Holograms – Recording Materials and Applications

[6] G. Martinez Niconoff, P. Martinez-Vara, J. Muñoz-Lopez, J.C. Juarez M and A. Carbajal-

[7] G. Bernine, "Small-amplitude perturbation theory for two dimensional surfaces, in light

[8] T.A. Leskova, M. Leyva-Lucero, E. R. Mendez, A.A. Maradudin, I.V. Novikov, "The

metal surface in the Kretschmann geometry" Opt. Comm., 183, 529, 2000 [9] E. Korolev, "Dynamic holography in alkali metal vapour", Optics and Laser Technology,

[10] 10.- Ryan M. Camacho, Preveen K. Vudyasetu A and John C. Howell, "Four-wave-

[11] D.L. Mill, "Nonlinear Optics: Basic concepts" 2nd ed. (Springer-Verlag, New York,

[13] J. Arlt, V. Garces-Chavez, W. Sibbett and K. Dholakia, "Optical micromanipulation

[14] D. P. Rhodes, G.P.T. Lancaster, J. Livesey, D. Mcgloin, J. Arlt and K. Dholakia,

[15] J. Durnin, "Exact solutions for diffraction free beams I: the scalar theory" J. Opt. Soc.

[16] Andrey S. Ostrovsky, Gabriel Martinez Niconoff and Julio C. Ramirez San-Juan,

[17] Gabriel Martinez Niconoff, Julio C. Ramirez San-Juan, Patricia Martinez Vara, Adrian

[18] Jianping Yin, Weijian Gao and YifunZhu, "Generation of dark hollow beams and their

[19] Andrey S. Ostrovsky, Gabriel Martinez Niconoff, Julio C. Ramirez San Juan, "Coherent

[20] Hariharan, P., "Optical Holography: Principles, Techniques, and Applications".

[21] K. Patorski, "The self Imaging phenomenon and its applications" Progress in Optics

Cambridge University Press., New York, USA, 1984, pp 23-25

Vol. 27 Chapter 1, pp 3-108 Elsevier Science 1990 North Holland.

[12] R.W. Boyd, "Nonlinear Optics", 3rd ed. (Academic press, 2008)

guide", Opt. Comm., 214, 247-254 (2002)

Am. A, Vol 4, 651-654 (1987)

using a Bessel light beam", Opt. Comm, 197, 239-245 (2001)

of the Optical Society, 6,1109(2011)

Verlag, Ney York, 2007).

Vol. 28, 4, (1996), 277-284

(2009)

1998).

131-138

(2004)

Holland.

34

Dominguez "Partially coherent surface plasmon modes" Journal of the European

scattering and nanoscale surface roughness", Ed. A. A. Maradudin (Springer-

surface enhanced second harmonic generation of light from a randomly rough

mixing stopped light in hot atomic rubidium vapour", Nature photonics 3,103

"Guiding a cold atomic beam along a co-propagating and oblique hollow light

"Generation of light string and light capillary beams", Opt. Comm., 207, (2002),

Carbajal Dominguez and Andrey S. Ostrovsky., "Generation of partially coherent diffraction free fields with tunable geometry", J. Opt. Soc. Am. A, Vol. 21, No. 4,

applications", Progress in Optics 45, Elsevier Science 2003, Chapter 3,pp 119. North

Mode representation of propagation-invariant fields", Opt. Comm., 195 (2001), 27-

**14** 

*Japan* 

Junji Ohtsubo *Shizuoka University* 

**Optimization of Hologram for** 

Optical pattern recognition for validation and security verifications has been one of the important issues of optical image processing for the past decade. As one technique, a method of joint transform correlation (JTC) has frequently been used for optical security systems for identification of biometric images. In that method, an image such as a fingerprint pattern is encrypted by a random key mask, and the joint Fourier transform of the image to be encrypted and the key pattern conforms an encrypted hologram. The hologram is printed on a card or a document for authenticity, such as a credit card or a passport. The hologram is read when and where necessary and decoded by using the same key that is used for the encryption. In practical optical security systems, a digital technique is used for the image encryption, since the time required to calculate an encryption pattern is not a critical factor and the encryption of an image and printing of the encrypted hologram on a card may be done offline. On the other hand, fast processing is required to decode an encrypted image and verify it. Accordingly, the

 In this chapter, we discuss optical security systems suitable for the use of holograms. For the congeniality of the method with real optical systems, binary holograms are frequently used in those systems. By the binarization of hologram, the reconstructed hologram is greatly degraded and, therefore, the optimization of hologram is required for the identification of a reference image. We study the method of the optimization of binary holograms based on a simulated annealing technique. The method of the simulated annealing usually takes a long time to reach a correct estimate, so that the fast optimization for binary hologram is applied. We also demonstrate an image decryption by the optimization of a binary hologram when both the hologram and the key for decryption are embedded in real electronic displays with periodic lattice structures. Finally, we discuss a technique to obtain an exact decryption image based on a phase-encoding technique, which enables easier realization for the practical applications in optical security systems. Even in this technique, the optimization of phase-encoded hologram plays an important role to

In this section, we discuss a fundamental optical security system treated throughout this chapter. The optical security system under consideration is shown in Fig. 1 (Yamazaki &

**1. Introduction** 

optical technique is very suitable for such processing.

obtain a good image-reconstruction.

**2. Optical security systems** 

**Security Applications** 
