holographic reconstruction
Recently Published Documents


TOTAL DOCUMENTS

202
(FIVE YEARS 43)

H-INDEX

23
(FIVE YEARS 5)

2022 ◽  
Author(s):  
ZHAO Zhi-xiong ◽  
ZHANG Hua ◽  
Kuang Qing-yun ◽  
Li Bo ◽  
Hu Lin

Abstract A method is proposed for phase conjecture based on the intensity curve of a two-dimensional(2D) image by computing a polynomial equation. The intensity values of the 2D image, which represents the distance between the image detectors and the three-dimensional(3D) scene is converted to phase information by our method. The results of numerical calculation with phase conjecture are analyzed. And what’s more, the numerical reconstruction results with phase information obtained as initial phase factors of a complex object for Fresnel kinoform and dynamic pseudorandom-phase tomographic computer holography(DPP-TCH) are compared. The peak signal-to-noise ratio(PSNR) and correlation coefficient (CC) between the reconstructed images and original object are analyzed. An experimental system is designed for photoelectric holographic reconstruction based on phase-only liquid crystal spatial light modulator(LC-SLM) and mist screen. The electro-optical experimental results indicate that suppressed the speckle noise 3D images that can be observed with naked eye have been obtained.


2021 ◽  
Author(s):  
Chen Wang ◽  
NingMei Yu ◽  
ChengXing Yang ◽  
Dian Tian ◽  
GuangLin Zhou ◽  
...  

Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 4977
Author(s):  
Ji-Won Kang ◽  
Jae-Eun Lee ◽  
Jang-Hwan Choi ◽  
Woosuk Kim ◽  
Jin-Kyum Kim ◽  
...  

This paper proposes a method to embed and extract a watermark on a digital hologram using a deep neural network. The entire algorithm for watermarking digital holograms consists of three sub-networks. For the robustness of watermarking, an attack simulation is inserted inside the deep neural network. By including attack simulation and holographic reconstruction in the network, the deep neural network for watermarking can simultaneously train invisibility and robustness. We propose a network training method using hologram and reconstruction. After training the proposed network, we analyze the robustness of each attack and perform re-training according to this result to propose a method to improve the robustness. We quantitatively evaluate the results of robustness against various attacks and show the reliability of the proposed technique.


2021 ◽  
pp. 127220
Author(s):  
Shuai Yuan ◽  
Hanchen Cui ◽  
Yong Long ◽  
Jigang Wu

Sign in / Sign up

Export Citation Format

Share Document