1990
DOI: 10.1016/s0079-6638(08)70288-9
|View full text |Cite
|
Sign up to set email alerts
|

I Digital Holography – Computer-Generated Holograms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
57
0
3

Year Published

1993
1993
2017
2017

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 122 publications
(60 citation statements)
references
References 103 publications
0
57
0
3
Order By: Relevance
“…Because computer-generated holograms (CGHs) can produce wavefronts with any desired amplitude and phase distributions, they have yielded many applications since Lohmann et al [17,18] firstly demonstrated it several decades ago, such as optical interconnection [19], spatial filtering [20], three-dimensional display [21,22], and holographic optical manipulation [23]. Two steps are needed for the production of a Fourier hologram.…”
Section: Realizing Optical Storage By Methods Of Computer-generated Homentioning
confidence: 99%
“…Because computer-generated holograms (CGHs) can produce wavefronts with any desired amplitude and phase distributions, they have yielded many applications since Lohmann et al [17,18] firstly demonstrated it several decades ago, such as optical interconnection [19], spatial filtering [20], three-dimensional display [21,22], and holographic optical manipulation [23]. Two steps are needed for the production of a Fourier hologram.…”
Section: Realizing Optical Storage By Methods Of Computer-generated Homentioning
confidence: 99%
“…The present security system can be viewed as a generalization of the Fresnel computer-generated hologram. In this analogy, h 2 (ξ, η) plays the role of a generalized medium between h 1 (ξ, η) and the reconstructed output image A(x, y) in a fashion similar to the quadratic phase factor representing the free-space medium in the Fresnel hologram reconstruction [14]. The medium function can be used as a lock to expose an image but does not contain any information on the image, and therefore its size does not limit the image capacity that can be utilized by the system.…”
Section: Synthesis Of a Key Mask In The Jtcmentioning
confidence: 99%
“…However, the creation of laser hologram requires relatively complex equipment. Computers have also been used to design laser holograms [28]. Traditional holograms have also been used together with interactive computer graphics [29].…”
Section: Introductionmentioning
confidence: 99%