Holographic optical elements encoded security holograms with enhanced features
|
|
- Clemence Carter
- 6 years ago
- Views:
Transcription
1 Indian Journal of Pure & Applied Physics Vol. 44, December 2006, pp Holographic optical elements encoded security holograms with enhanced features Sushil K Kaura*, S P S Virdi # & A K Aggarwal Coherent Optics Division, Central Scientific Instruments Organisation, Chandiigarh * skkaura_22@rediffmail.com "Physics Department, Punjabi University, Patiala Received 3 August 2006; accepted 10 October 2006 A simple and cost-effective two-step method for forming encoded security holograms with enhanced features is described in this paper. These security holograms contain enhanced encoded/concealed anti-counterfeit security Features, which can only be decoded using a key hologram in the final reading process. The encoded key hologram and the security hologram are in the form of special encoded complex holographic optical elements. When the security hologram is illuminated with the decoding beam, specific moire-like fringe pattern's are formed on the security hologram and in addition several spatially separated bright focused spots are also generated from the security hologram. A careful spatial filtering of these bright spots results in specific moire patterns at different locations in the observation plane and moreover these patterns contain variable interferometric features. Further, these moire patterns disappear when the security hologram is perfectly repositioned and only the variable interferometric features are formed. Since these security holograms contain variable interferometric features in addition to the specific moire patterns and bright focused spots, thus making these holograms suitable for both visual and as well as machine inspection. Keywords: Security holograms, Holographic optical elements encoded holograms,' Concealed coded holograms, Optical security IPC Code: G03H " 1 Introduction Since the earliest days of market trade, counterfeit goods have existed. However, in recent years, the problem of counterfeit goods/documents has attained a serious dimension. Optical techniques are increasingly finding their usefulness in the fields of security and product authenticity verification. Optical security features can be inspected by either visual checking without using any special equipment or with the help of technical facilities for automatic inspection. In order to deter the counterfeiting, various optical validation and security verification techniques based on double random phase encoding and joint transform correlations have been widely investigated!". These techniques though excellent in their own right, are inherently complex and need specific and costly equipment to visualize or verify their security features. Embossed holograms are also used extensively as security seal on various products and documents to guard them against duplication and forgery but face a serious threat from counterfeiters, as the holographic pattern/image can be acquired from a security hologram (photographed or captured with a CCD camera) and a new look alike hologram synthesized using.cornmercially available hologram producing equipment. [t is difficult, for a normal eye, to determine whether- such a' hologram is genuine or counterfeit. In ordel~to. -enhance the anti-counterfeit ability of security holograms, various methods based on phase encoding have been discussed'i". Encoding h h. / 9-11 t roug moire patterns lib tas a so een exp I oite. d to enhance the anti-counterfeit ability of security holograms for visual inspection. Recently, a method has been proposed in which both machine-readable and visual verifiable features are incorporated to increase the anti-counterfeit ability of the security holograms'<. Though this method increases the level of difficulty for the counterfeiter but it still offers limited security.features and there is a possibility that by knowing about the shape and number of fringes, these holograms could be regenerated by hit and trial method by an expert holographer. In order to further enhance the anti-counterfeit ability of security holograms, a simple and cost-effective method for making holographic optical elements encoded security holograms with enhanced features is described in this
2 KAURA et al.: HOLOGRAPHIC OPTICAL ELEMENTS ENCODED SECURITY HOLOGRAMS 897 paper. In this method, the enhanced/additional security features- have been incorporated in the security holograms by using multiple convergent object beams in the formation of encoded key hologram and the security hologram. The encoded key hologram and the security hologram are in the form of special encoded complex holographic optical elements. These security holograms contain enhanced and multifold encoded anti-counterfeit security features, which can only be decoded by using encoded keyhologram in the final reading process. 2 Principle ofthe Method The method reported in this paper is based on the formation of an,' encoded key hologram and the security hologramiwhich are in the form of a special encoded complex holographic optical elements) separately in two recording steps. The formation of encoded key hologram (Fig. 1) in turn involves two separate and independent holographic recordings 'on thesame recording plate. In the first recording case, a convergent object beam 0 1 is used in conjunction with a collimated reference beam R. Before making the second recording on the same plate, the converging lens, used for the generation of object beam 0 1, is given a minute movement in the transverse direction and a slightly different object beam O2 is generated. In the second recording, the object beam O2 is used in conjunction with the same reference beam R. This encoded key hologram (KH), when illuminated with a collimated beam, provides an encoded reference beam for the second recording step. The so generated encoded reference wave is used, in.two separate holographic exposures, in conjunction with two spatially separated convergent object waves S I and S2, respectively for the formation ofthe security hologram (Fig. 2). For further incorporation of enhanced security verification features in these security. holograms, each of these holographic recordings in turn involves two separate holographic exposures independently and on the same recording plate. In the first recording case, the convergent object wave SI is used in the first exposure. Before making thesecond exposure on the same plate, the converging lens, used for the generation of beam S I, is given a minute movement along the longitudinal direction and theso generated object beam S'I is used in the second exposure. Similarly, in the second recording case, the convergent object wave Sz is used in the first exposure. Prior to making the second exposure on the same plate, the converging lens, used for the L...,. """'-,0.. KH Fig. I-Schematic of experimental layout for recording encoded key holograms L 1 l'v\( BS )~1z M3 t Y 7L ~ X ~~ Fig. 2-Schematic of experimental layout for recording security holograms generation of beam S2, is given a minute movement along the transverse direction and the so generated object beam S'2 is used in the second exposure. When these security holograms are read through the encoded key hologram, specific moire-like pattern is formed. These moire patterns are formed due to the superposition of complex holographic sinusoidal phase diffraction grating patterns 13 of high spatial frequencies generated from key hologram and those recorded in security hologram. Further, several spatially separated bright focused spots also get generated as it is read through the key hologram. A careful spatial filtering of these bright focused spots results in spatially separated high contrast moire patterns at different locations in the observation plane. However these moire patterns in addition also contain variable interferometric features due to longitudinal
3 898 INDIAN J PURE & APPL PHYS, VOL 44, DECEMBER 2006 and transverse motion of the converging beams, respectively. By making careful adjustments, the moire-like patterns get disappeared (when security hologram is perfectly repositioned) as the complex diffraction patterns generated from key hologram completely overlap on those already recorded on the security hologram and only the variable interferometric features (circular and linear interference fringe patterns) are formed. For the sake of simplicity in mathematical formulations 0], O2, S], S\ S2 and S'2 have been taken as plane wavefronts. In the first recording case for forming KH, we take 0] propagating at an angle ao to the axis, O2 propagating at an angle ao + 8ao to the axis and R propagating along the axis. The complex amplitude distribution of 0], O2 and R can be considered as: 01 = Ao exp [-iax]; O2= Ao exp [-i (a + E) x] and R = A, exp [ikx] where a = k sin ao; a + E = k sin (ao + 8ao) and E = k (8ao) cos ao The amplitude transmittance of the processed KH is: same recording plate. The complex amplitude distribution of S], S'I, S2 and S'2 can be considered as: SI = A] exp [-ibx]; S'] = A] exp [-i (b + 11) x]; S2= A2 exp [-icx] and S'2 =A2 exp [-i (c + ~) x] After processing, the SH is repositioned at the same location at which it was recorded. The amplitude transmittance of the processed SH is: 2 2 t2-\0]+02+sd +\0]+02+S']\ +\0]+02+ S2\2+ \0]+ O2+ S'2\2... (4) As all the four terms on the right hand side of Eq. (4) are almost similar, so for the sake of simplicity in further mathematical formulations only the first term is considered. Thus, the amplitude transmittance'< of the processed SH is: t cos Ex + cos (a - b)x + cos (a + E - b)x] In this configuration, when KH is illuminated with a collimated beam, it provides two illuminating beams 01 and O2 for SH [Eq. (3)]. The irradiance at SH can be written as: (5) (1) \'P (x) \2- {l + cos 2n ).lox} (6) For forming the security hologram (SH) in the second recording step, KH is again illuminated with the same collimated reference beam R. The complex amplitude of the transmitted field from KH is: UI-R tl =R\Od2+R\R\2 +OdR\2 +01*R 2 +R\02\2 +R\R\2 +02\R\2 +02* R2 (2) We can consider \R\2 to be constant across KH, as a plane reference wave R is used for illumination of KH. Thus only 3 rd and 7th terms on the right-hand side of Eq. (2) are of interest to us as they represent two diffracted-orders of beams 01 and O2, i.e.... (3) These two generated beams (serving as encoded reference beam) are used, in two separate holographic exposures, in conjunction with two spatially separated convergent object beams SI and S2, respectively for the formation of the security hologram. Each of these holographic recordings in turn employs two separate holographic exposures {in the first case, using S I in the first exposure and S'] in the second exposure; and in the second case, using S2 in the first exposure and S'2 in the second exposure} independently and on the where ).lo= lid = (8ao) cos aol A During the final reading process" when SH is slightly misaligned by an angle 8 with respect to y- axis, then the amplitude transmittance'? of the SH is t'2 - [1 + cos 2n (ux -vy) + cos 2n (a - b)().lx -vy) + cos 2n (a + E - b)().lx -vy)],.... (7).,, where ).l = cos 8 Id and v = sin 81d.','. Thus, the complex amplitude distributionatsll is: t (x,y) = \'P (x) \2t'2-1 + cos 2n ().lx "vy)' +cos 2n (a - b)().lx -vy). +cos 2n (a + E - b)().lx -V y) + cos 2n /lox +cos 2n ).lo X cos 2n ().lx -vy) +cos 2n /lo X cos 2n (a - b)().lx-vy) +cos 2n ).lo x cos 2n (a + E - b)().lx -vy)... (8) It may now be seen that the 6 th ' term denotes the presence of a complex moire pattern 15 on the security hologram. Likewise, the resultant intensity distribution I(x,y) in the observation plane, due to misaligned SH, could be written as: I(x,y)= \'P (x) t'2\2-2cos 2n ).loxcos 2n().lX -vy) +[cos 2n ).loxcos 2n ().lx -vy)][cos 2n ().lx -vy)
4 KAURA et al.: HOLOGRAPHIC OPTICAL ELEMENTS ENCODED SECURITY HOLOGRAMS cos 2n (a - b)(j..lx-vy) + 2cos 2n (a + e - b)(/lx -vy)] + cos 2n).loX cos' 2n (a - b)().1x -vy) + cos 2n).lox cos 2 2n (a + E - b)().1x -vy) + 2cos 2n).loX cos 2n (a - b)().1x -vy) + 2 cos 2n).loX cos 2n(a + - b)().1x -vy) + 2 cos 2n).loX cos 2n (a - b)().1x -vy) X cos 2n (a + E - b)().1x -vy)... (9) where, the I" term denotes the presence of a complex moire pattern; the 2 nd to 4th terms indicate the modulation of the moire patterns -in the other beams emerging from SH; and the 5 th to 9 th terms depict the presence of extra noise terms. It is further seen that a careful spatial filtering of 'the 1 st term results in the generation of high contrast moire pattern in the observation plane. It is to be pointed that the Eq. (9) has been obtained by using only _ the first term (containing beam SI) on the right hand side ofeq. (4). Similarly by using the third term (containing beam S2) and following the same procedure results in the generation of a spatially separated high contrast moire pattern at a different location in the observation plane. It may be noted that, due to the standard holographic interferometry, interference fringe patterns with intensity distribution _4A 1 2 cos 2 (11/2) are additionally created due to the first and second terms on right hand side of Eq. (4). Similarly, the third and fourth terms result in additional different interference patterns with intensity distribution -4A/ cos" (~/2). Thus, the moire patterns observed in the observation plane has variable interferometric features due to longitudinal and transverse motion of the converging beams SI and S2, respectively. By making appropriate adjustments, the moire patterns would get disappeared when SH is perfectly repositioned (i.e., 8=0) and only the variable interferometric features (circular and linear interference fringe patterns) are formed. It is to be noted that in the proposed method, the use of converging beams instead of plane wavefronts in recording the key hologram and the security holograms are advantageous in terms of enhancing their anti-counterfeit ability as it additionally facilitates in the generation of several spatially separated bright focused verification spots from the security hologram in the reading process. 3 Experimental Details In our experimental' arrangement, a He-Ne laser (Coherent model , 35 mw output power, nm wavelength) was used in the recording of encoded key hologram, security hologram and in the final reading process of security holograms. The experimental layout for the first recording step of forming the encoded key hologram is schematically shown in Fig. 1. A variable beam splitter (BS) splits a laser (L) beam into two components. The reflected component from BS is used for the generation of a convergent object wave 0 1 through a beam expander (BEl) in conjunction with a combination of two collimating lenses CI (f/3.5; 100 mm-diameter) and C 2 (f/5; 100 mm-diameter). The transmitted component from BS, used for the generation of a collimated reference beam (R), is expanded and collimated by using a beam expander (BE 2 ) and a collimating lens C3 (f/4; 50 mm-diameter). These two beams (R and 0 1 ) are used to make the first recording on the hologram recoding plate (KH). Before making the second recording on the same recording plate (KH), the converging lens C2 is given a minute movement (-300 p,m) in the transverse direction. The so generated convergent object beam O 2 is used in conjunction with R for making the second recording on the same holographic plate (KH). The experimental layout for second recording step of making security holograms is schematically shown in Fig. 2. Light beam from the laser (L) is split through a variable beam splitter (BS I) into a reflected and a transmitted component. The transmitted component is further split into two parts by another variable beam splitter (BS2). The reflected component from BSI is used for the generation of a convergent object wave S I on the hologram recording plate SH through a beam expender (BEl) in conjunction with a combination of two collimating lenses CI (f/3.5; 100 mm-diameter) and C2 (f/5; 100 mm-diameter). The transmitted component from BS 2 is used for the generation of another convergent object wave S2 on the hologram recording plate SH through a beam expender (B~) in conjunction with a combination of two collimating lenses C3 (f/5; 100 mm-diameter) and C 4 (f/3.5; 100 mm-diameter). The reflected component from BS 2 is used for the generation of a conjugate reference beam for the KH through a beam expender (BE3) in conjunction with a collimating lens C 5 (f/4; 50 mm-diameter) and the real image derived from KH serves as the encoded reference wave in making the security hologram. The so generated encoded reference wave is made to interfere, in two separate holographic exposures, with the two spatially
5 900 INDIAN J PURE & APPL PHYS, VOL 44, DECEMBER 2006 separated convergent object waves S I and S2 on the hologram recording plate to form the security hologram (SH). However, each of these holographic exposures in the second recording step in turn involved two separate holographic exposures independently on the same recording plate. In the first case, the converging lens C2 is given a minute movement (-500 run) along the longitudinal direction (i.e. along the optical axis) between the two holographic exposures and whereas in the second case, the converging lens C 4 is given a minute movement (- 40 urn) in the transverse direction (i.e. perpendicular to the optical axis) between the two holographic exposures. Standard Kodak D-19 developer and R-9 bleach bath solutions are used with Slavich PFG-01 plates to give high efficiency and low noise encoded key holograms and security holograms. The experimental layout for the final reading process of these security holograms is schematically shown in Fig. 3. Here, a collimated beam [generated through a beam expander BE in conjunction with a collimating lens C (f/4; 50 mm-diameter)] is used as a conjugate reference beam to illuminate the KH, where the KH is placed at a predetermined fixed position. The real image derived from the KH serves as a decoding reconstructing beam for reading the SR. It is observed that when SH is slightly misaligned in it's repositioning, specific moire pattern gets formed on the security hologram (Fig. 4). In addition, several spatially separated bright focused spots are generated from the security hologram (Fig. 5). A careful spatial filtering of these bright focused spots results in the generation of spatially separated high contrast moire patterns at two different locations in the observation plane OP and these moire patterns in addition also contain variable interferometric features, i.e. typical op SF Fig. 3-Schematic of experimental layout for reading security holograms " Fig. 4- Typical moire pattern on security hologram Fig. 5-Photograph of spatiallyseparated bright focused spots circular and linear interference fringe patterns due to longitudinal and transverse motion of the converging beams S I and S2 (used for making the security hologram), respectively (Fig. 6). These specific moire patterns are obtained by giving a typical tilt of -3 degree in the vertical direction and linear movement of -1.2 mm along the horizontal direction to the security hologram in the reading process. Further, these specific moire patterns disappear as the security hologram is perfectly repositioned (where in this case, the complex diffraction patterns generated from key hologram completely overlap on those already recorded on the security hologram) and only the variable interferometric features, i.e. typical circular and linear interference fringe patterns are formed
6 KAURA et al.: HOLOGRAPHIC OPTICAL ELEMENTS ENCODED SECURITY HOLOGRAMS 901 Fig. 6- Typical moire patterns along with variable interferometric features due to spatially filtered bright focused spots Fig. 7- Typical variable interferometric features with perfectly repositioned SH (Fig. 7). It may be noted that the sensitivity 111 positioning of either KH or SH is not very critical. 4 Conclusions A simple and cost-effective method for making holographic optical elements encoded security holograms with enhanced features is discussed in this paper. These security holograms contain enhanced encoded/concealed anti-counterfeit security features, which can only be decoded by using an encoded key hologram in the final reading process. In this case, the encoded key hologram and the security hologram are in the form of special encoded complex holographic optical elements rather than binary patterns. In the final reading process, a specific moire pattern is formed on the security hologram only when the security hologram is illuminated by the decoding, reconstructing beam, generated from the encoded key hologram. These moire patterns are formed only in the case of an authentic security hologram and are visually verifiable. In addition, several spatially separated bright focused spots are generated from the security hologram. These bright focused spots, formed at a predetermined fixed location (angular and
7 902 INorAN J PURE & APPL PHYS, VOL 44, DECEMBER 2006 azimuth position), may be used advantageously for machine inspection by using a relatively simple machine-readable device. A careful spatial filtering of these bright focused spots results in spatially separated high contrast moire patterns at different locations in the observation plane and these moire patterns in addition also contain variable interferometric features, i.e. circular and linear interference patterns, respectively in them, and are used for visual inspection. When the security hologram is perfectly repositioned, the specific moire patterns disappear and only the variable interferometric features, i.e. circular and linear interference fringe patterns me formed and me available only in the case of an authentic security hologram. These variable interferometric features further facilitate in the visual inspection of the enhanced/additional security verification features contained in these security holograms. It is further observed that different specific moire verification pattern~ can be obtained by giving different tilt in the vertical direction and linear movement in the horizontal direction to the security hologram in the final reading process. It may be noted that these security holograms contain complex sinusoidal phase diffraction grating patterns, which makes them extremely difficult to counterfeit. Since the verification/identification patterns in these security holograms are variable interferometric features (i.e. circular and linear interference fringe patterns) in addition to the specific moire patterns and spatially separated bright focused spots, this type of security holograms are suitable for both visual and as well as machine inspection. It may further be seen that the anti-counterfeit ability of these security hologram is enhanced manifold by using multiple convergent object beams while making the encoded key hologram and the security hologram. This type of holograms can also be used as a security code for better protection against counterfeiting in embossed holograms. Acknowledgement The authors are grateful to Dr Paw an Kapur, Director, CSIO, Chandigarh, for his constant encouragement, support and permission to publish this work. They wish to thank the Department of Science and Technology, Govt of India, New Delhi, for the financial support for carrying out this work. References 1 Refregier P & Javidi B, Optics LeI!, 20 (1995) Wang R K, Watson I A & Chatwin C, Optical Engg, 3S (f996) Neto L G & Sheng Y, Optical Engg ; 35 (1996) ~ Weber D & Trolinger J, Optical Engg, 38 (1999) Javidi B & Horner J L, Optical Eugg ; 33 (1994) Lai S, Optical Engg, 35 (1996) Kaura S K, Chhachhia D P, Sharma A K & Aggarwal A K, Indian J Pure & Appl Phys, 41 (2003) Aggarwal A K, Kaura S K, Chhachhia D P & Sharma A K, J Optics A: Pure & Appl Optics, 6 (2004) Liu S, Zhang X & Lai H, Appl Optics, 34 (1995) Aggarwal A K, Kaura S K, Chhachhia D P & Sharma A K, Optics & Laser Tech, 38 (2006) Zhang X, Dalsgaard E, Liu S, Lai H & Chen J, Appl Optics, 36, Kaura S K, Chhachhia D P & Aggarwal A K, J Optics A: Pure & Appl Optics, 8 (2006) Santos PAM D, Nunes LCD S & Correa I, Appl Optics, 39 (2000) Sirohi R S & Chau F S (Ed), Optical methods of measurement (Marcel Dekker Inc, New York, USA) 1999, pp Sciarnmarella C A, Optical Engg, 21 (1982) 447.
Interferometric key readable security holograms with secrete-codes
PRAMANA c Indian Academy of Sciences Vol. 68, No. 3 journal of March 2007 physics pp. 443 450 Interferometric key readable security holograms with secrete-codes RAJ KUMAR 1, D MOHAN 2 and A K AGGARWAL
More informationTesting Aspherics Using Two-Wavelength Holography
Reprinted from APPLIED OPTICS. Vol. 10, page 2113, September 1971 Copyright 1971 by the Optical Society of America and reprinted by permission of the copyright owner Testing Aspherics Using Two-Wavelength
More informationLOS 1 LASER OPTICS SET
LOS 1 LASER OPTICS SET Contents 1 Introduction 3 2 Light interference 5 2.1 Light interference on a thin glass plate 6 2.2 Michelson s interferometer 7 3 Light diffraction 13 3.1 Light diffraction on a
More informationA novel tunable diode laser using volume holographic gratings
A novel tunable diode laser using volume holographic gratings Christophe Moser *, Lawrence Ho and Frank Havermeyer Ondax, Inc. 85 E. Duarte Road, Monrovia, CA 9116, USA ABSTRACT We have developed a self-aligned
More informationIn-line digital holographic interferometry
In-line digital holographic interferometry Giancarlo Pedrini, Philipp Fröning, Henrik Fessler, and Hans J. Tiziani An optical system based on in-line digital holography for the evaluation of deformations
More informationHolography as a tool for advanced learning of optics and photonics
Holography as a tool for advanced learning of optics and photonics Victor V. Dyomin, Igor G. Polovtsev, Alexey S. Olshukov Tomsk State University 36 Lenin Avenue, Tomsk, 634050, Russia Tel/fax: 7 3822
More information4-2 Image Storage Techniques using Photorefractive
4-2 Image Storage Techniques using Photorefractive Effect TAKAYAMA Yoshihisa, ZHANG Jiasen, OKAZAKI Yumi, KODATE Kashiko, and ARUGA Tadashi Optical image storage techniques using the photorefractive effect
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY. 2.71/2.710 Optics Spring 14 Practice Problems Posted May 11, 2014
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 2.71/2.710 Optics Spring 14 Practice Problems Posted May 11, 2014 1. (Pedrotti 13-21) A glass plate is sprayed with uniform opaque particles. When a distant point
More informationExp No.(8) Fourier optics Optical filtering
Exp No.(8) Fourier optics Optical filtering Fig. 1a: Experimental set-up for Fourier optics (4f set-up). Related topics: Fourier transforms, lenses, Fraunhofer diffraction, index of refraction, Huygens
More informationUse of Computer Generated Holograms for Testing Aspheric Optics
Use of Computer Generated Holograms for Testing Aspheric Optics James H. Burge and James C. Wyant Optical Sciences Center, University of Arizona, Tucson, AZ 85721 http://www.optics.arizona.edu/jcwyant,
More informationHolography. Casey Soileau Physics 173 Professor David Kleinfeld UCSD Spring 2011 June 9 th, 2011
Holography Casey Soileau Physics 173 Professor David Kleinfeld UCSD Spring 2011 June 9 th, 2011 I. Introduction Holography is the technique to produce a 3dimentional image of a recording, hologram. In
More informationlll lll a lldl DID lll DIII DD llll uui lll DIV 1101 lll ld ll Dl lli
lll lll a lldl DID lll DIII DD llll uui lll DIV 1101 lll ld ll Dl lli US 20130301093A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2013/0301093 Al Awatsuji et al. (43) Pub.
More information"Correlation System for Security Validation and Verification Using An Encoded Phase Mask"
"Correlation System for Security Validation and Verification Using An Encoded Phase Mask" FINAL SCIENTIFIC & TECHNICAL REPORT Contract Number: F30602-97-C-0354 Data Item No.: A009 POP: 12/17/97-12/31/00
More informationDiffractive optical elements based on Fourier optical techniques: a new class of optics for extreme ultraviolet and soft x-ray wavelengths
Diffractive optical elements based on Fourier optical techniques: a new class of optics for extreme ultraviolet and soft x-ray wavelengths Chang Chang, Patrick Naulleau, Erik Anderson, Kristine Rosfjord,
More informationChapter 4: Fourier Optics
Chapter 4: Fourier Optics P4-1. Calculate the Fourier transform of the function rect(2x)rect(/3) The rectangular function rect(x) is given b 1 x 1/2 rect( x) when 0 x 1/2 P4-2. Assume that ( gx (, )) G
More informationUsing double-exposure holographic techniques to evaluate the deformation of an aluminum can under stress
Using double-exposure holographic techniques to evaluate the deformation of an aluminum can under stress Maggie Lankford Physics Department, The College of Wooster, Wooster, Ohio 44691, USA (Dated: December
More informationMachine Readability and Automation of Holographic Authentication
Machine Readability and Automation of Holographic Authentication International Conference Asian Anti-counterfeiting Association Shenzhen, China, 2007 P.T. Ajith Kumar President and Leading Scientist Light
More informationPhysFest. Holography. Overview
PhysFest Holography Holography (from the Greek, holos whole + graphe writing) is the science of producing holograms, an advanced form of photography that allows an image to be recorded in three dimensions.
More informationImaging Systems Laboratory II. Laboratory 8: The Michelson Interferometer / Diffraction April 30 & May 02, 2002
1051-232 Imaging Systems Laboratory II Laboratory 8: The Michelson Interferometer / Diffraction April 30 & May 02, 2002 Abstract. In the last lab, you saw that coherent light from two different locations
More informationGerhard K. Ackermann and Jurgen Eichler. Holography. A Practical Approach BICENTENNIAL. WILEY-VCH Verlag GmbH & Co. KGaA
Gerhard K. Ackermann and Jurgen Eichler Holography A Practical Approach BICENTENNIAL BICENTENNIAL WILEY-VCH Verlag GmbH & Co. KGaA Contents Preface XVII Part 1 Fundamentals of Holography 1 1 Introduction
More informationCompensation of hologram distortion by controlling defocus component in reference beam wavefront for angle multiplexed holograms
J. Europ. Opt. Soc. Rap. Public. 8, 13080 (2013) www.jeos.org Compensation of hologram distortion by controlling defocus component in reference beam wavefront for angle multiplexed holograms T. Muroi muroi.t-hc@nhk.or.jp
More informationSection 2 ADVANCED TECHNOLOGY DEVELOPMENTS
Section 2 ADVANCED TECHNOLOGY DEVELOPMENTS 2.A High-Power Laser Interferometry Central to the uniformity issue is the need to determine the factors that control the target-plane intensity distribution
More information1.6 Beam Wander vs. Image Jitter
8 Chapter 1 1.6 Beam Wander vs. Image Jitter It is common at this point to look at beam wander and image jitter and ask what differentiates them. Consider a cooperative optical communication system that
More informationParticles Depth Detection using In-Line Digital Holography Configuration
Particles Depth Detection using In-Line Digital Holography Configuration Sanjeeb Prasad Panday 1, Kazuo Ohmi, Kazuo Nose 1: Department of Information Systems Engineering, Graduate School of Osaka Sangyo
More informationAsphere testing with a Fizeau interferometer based on a combined computer-generated hologram
172 J. Opt. Soc. Am. A/ Vol. 23, No. 1/ January 2006 J.-M. Asfour and A. G. Poleshchuk Asphere testing with a Fizeau interferometer based on a combined computer-generated hologram Jean-Michel Asfour Dioptic
More informationPhysics 3340 Spring Fourier Optics
Physics 3340 Spring 011 Purpose Fourier Optics In this experiment we will show how the Fraunhofer diffraction pattern or spatial Fourier transform of an object can be observed within an optical system.
More informationPhysics 3340 Spring 2005
Physics 3340 Spring 2005 Holography Purpose The goal of this experiment is to learn the basics of holography by making a two-beam transmission hologram. Introduction A conventional photograph registers
More informationCharacteristics of point-focus Simultaneous Spatial and temporal Focusing (SSTF) as a two-photon excited fluorescence microscopy
Characteristics of point-focus Simultaneous Spatial and temporal Focusing (SSTF) as a two-photon excited fluorescence microscopy Qiyuan Song (M2) and Aoi Nakamura (B4) Abstracts: We theoretically and experimentally
More informationFRAUNHOFER AND FRESNEL DIFFRACTION IN ONE DIMENSION
FRAUNHOFER AND FRESNEL DIFFRACTION IN ONE DIMENSION Revised November 15, 2017 INTRODUCTION The simplest and most commonly described examples of diffraction and interference from two-dimensional apertures
More informationChapter 7. Optical Measurement and Interferometry
Chapter 7 Optical Measurement and Interferometry 1 Introduction Optical measurement provides a simple, easy, accurate and reliable means for carrying out inspection and measurements in the industry the
More informationLab Report 3: Speckle Interferometry LIN PEI-YING, BAIG JOVERIA
Lab Report 3: Speckle Interferometry LIN PEI-YING, BAIG JOVERIA Abstract: Speckle interferometry (SI) has become a complete technique over the past couple of years and is widely used in many branches of
More informationFourier Transformation Hologram Experiment using Liquid Crystal Display. Kenji MISUMI, Yoshikiyo KASHII, Mikio MIMURA (Received September 30, 1999)
Mem. Fac. Eng., Osaka City Univ., Vol. 40, pp. 85-91 (1999) Fourier Transformation Hologram Experiment using Liquid Crystal Display Kenji MISUMI, Yoshikiyo KASHII, Mikio MIMURA (Received September 30,
More informationRecording and reconstruction of holograms
Recording and reconstruction of holograms LEP Related topics Dispersion, reflection, object beam, reference beam, real and virtual image, volume hologram, Lippmann-Bragg hologram, Bragg reflection. Principle
More informationDynamic beam shaping with programmable diffractive optics
Dynamic beam shaping with programmable diffractive optics Bosanta R. Boruah Dept. of Physics, GU Page 1 Outline of the talk Introduction Holography Programmable diffractive optics Laser scanning confocal
More informationCardinal Points of an Optical System--and Other Basic Facts
Cardinal Points of an Optical System--and Other Basic Facts The fundamental feature of any optical system is the aperture stop. Thus, the most fundamental optical system is the pinhole camera. The image
More informationParallel Digital Holography Three-Dimensional Image Measurement Technique for Moving Cells
F e a t u r e A r t i c l e Feature Article Parallel Digital Holography Three-Dimensional Image Measurement Technique for Moving Cells Yasuhiro Awatsuji The author invented and developed a technique capable
More informationRotation/ scale invariant hybrid digital/optical correlator system for automatic target recognition
Rotation/ scale invariant hybrid digital/optical correlator system for automatic target recognition V. K. Beri, Amit Aran, Shilpi Goyal, and A. K. Gupta * Photonics Division Instruments Research and Development
More informationAutomatic inspection system for measurement of lens field curvature by means of computer vision
Indian Journal of Pure & Applied Physics Vol. 47, October 2009, pp. 708-714 Automatic inspection system for measurement of lens field curvature by means of computer vision Chern-Sheng Lin 1, Jung-Ming
More informationLaser Telemetric System (Metrology)
Laser Telemetric System (Metrology) Laser telemetric system is a non-contact gauge that measures with a collimated laser beam (Refer Fig. 10.26). It measure at the rate of 150 scans per second. It basically
More informationDesign of a digital holographic interferometer for the. ZaP Flow Z-Pinch
Design of a digital holographic interferometer for the M. P. Ross, U. Shumlak, R. P. Golingo, B. A. Nelson, S. D. Knecht, M. C. Hughes, R. J. Oberto University of Washington, Seattle, USA Abstract The
More informationBEAM HALO OBSERVATION BY CORONAGRAPH
BEAM HALO OBSERVATION BY CORONAGRAPH T. Mitsuhashi, KEK, TSUKUBA, Japan Abstract We have developed a coronagraph for the observation of the beam halo surrounding a beam. An opaque disk is set in the beam
More informationUSE OF COMPUTER- GENERATED HOLOGRAMS IN OPTICAL TESTING
14 USE OF COMPUTER- GENERATED HOLOGRAMS IN OPTICAL TESTING Katherine Creath College of Optical Sciences University of Arizona Tucson, Arizona Optineering Tucson, Arizona James C. Wyant College of Optical
More informationComputer Generated Holograms for Testing Optical Elements
Reprinted from APPLIED OPTICS, Vol. 10, page 619. March 1971 Copyright 1971 by the Optical Society of America and reprinted by permission of the copyright owner Computer Generated Holograms for Testing
More informationPhD Thesis. Balázs Gombköt. New possibilities of comparative displacement measurement in coherent optical metrology
PhD Thesis Balázs Gombköt New possibilities of comparative displacement measurement in coherent optical metrology Consultant: Dr. Zoltán Füzessy Professor emeritus Consultant: János Kornis Lecturer BUTE
More informationReconstruction of Fresnel holograms using partial wave front information
Reconstruction of Fresnel holograms using partial wave front information R. Tudela, E. Martín-Badosa, I. Labastida, S. Vallmitjana and A. Carnicer Departament de Física Aplicada i Òptica. Universitat de
More informationBe aware that there is no universal notation for the various quantities.
Fourier Optics v2.4 Ray tracing is limited in its ability to describe optics because it ignores the wave properties of light. Diffraction is needed to explain image spatial resolution and contrast and
More informationComputer Generated Holograms for Optical Testing
Computer Generated Holograms for Optical Testing Dr. Jim Burge Associate Professor Optical Sciences and Astronomy University of Arizona jburge@optics.arizona.edu 520-621-8182 Computer Generated Holograms
More informationHolography (A13) Christopher Bronner, Frank Essenberger Freie Universität Berlin Tutor: Dr. Fidder. July 1, 2007 Experiment on July 2, 2007
Holography (A13) Christopher Bronner, Frank Essenberger Freie Universität Berlin Tutor: Dr. Fidder July 1, 2007 Experiment on July 2, 2007 1 Preparation 1.1 Normal camera If we take a picture with a camera,
More information9. Microwaves. 9.1 Introduction. Safety consideration
MW 9. Microwaves 9.1 Introduction Electromagnetic waves with wavelengths of the order of 1 mm to 1 m, or equivalently, with frequencies from 0.3 GHz to 0.3 THz, are commonly known as microwaves, sometimes
More informationAnalysis of phase sensitivity for binary computer-generated holograms
Analysis of phase sensitivity for binary computer-generated holograms Yu-Chun Chang, Ping Zhou, and James H. Burge A binary diffraction model is introduced to study the sensitivity of the wavefront phase
More informationFabrication of large grating by monitoring the latent fringe pattern
Fabrication of large grating by monitoring the latent fringe pattern Lijiang Zeng a, Lei Shi b, and Lifeng Li c State Key Laboratory of Precision Measurement Technology and Instruments Department of Precision
More informationCompound Holographic Optical Element System for Splitting and Concentrating Solar Spectrum on Laterally- Arranged Multiple Band Gap Solar Cells
International Journal of Physics and Applications. ISSN 0974-3103 Volume 5, Number 3 (2013), pp. 115-120 International Research Publication House http://www.irphouse.com Compound Holographic Optical Element
More informationAberrations and adaptive optics for biomedical microscopes
Aberrations and adaptive optics for biomedical microscopes Martin Booth Department of Engineering Science And Centre for Neural Circuits and Behaviour University of Oxford Outline Rays, wave fronts and
More informationLaser Beam Analysis Using Image Processing
Journal of Computer Science 2 (): 09-3, 2006 ISSN 549-3636 Science Publications, 2006 Laser Beam Analysis Using Image Processing Yas A. Alsultanny Computer Science Department, Amman Arab University for
More informationEE119 Introduction to Optical Engineering Spring 2003 Final Exam. Name:
EE119 Introduction to Optical Engineering Spring 2003 Final Exam Name: SID: CLOSED BOOK. THREE 8 1/2 X 11 SHEETS OF NOTES, AND SCIENTIFIC POCKET CALCULATOR PERMITTED. TIME ALLOTTED: 180 MINUTES Fundamental
More information7. Michelson Interferometer
7. Michelson Interferometer In this lab we are going to observe the interference patterns produced by two spherical waves as well as by two plane waves. We will study the operation of a Michelson interferometer,
More informationADVANCED OPTICS LAB -ECEN Basic Skills Lab
ADVANCED OPTICS LAB -ECEN 5606 Basic Skills Lab Dr. Steve Cundiff and Edward McKenna, 1/15/04 Revised KW 1/15/06, 1/8/10 Revised CC and RZ 01/17/14 The goal of this lab is to provide you with practice
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science
Student Name Date MASSACHUSETTS INSTITUTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science 6.161 Modern Optics Project Laboratory Laboratory Exercise No. 3 Fall 2005 Diffraction
More informationDesign Description Document
UNIVERSITY OF ROCHESTER Design Description Document Flat Output Backlit Strobe Dare Bodington, Changchen Chen, Nick Cirucci Customer: Engineers: Advisor committee: Sydor Instruments Dare Bodington, Changchen
More informationLaser Speckle Reducer LSR-3000 Series
Datasheet: LSR-3000 Series Update: 06.08.2012 Copyright 2012 Optotune Laser Speckle Reducer LSR-3000 Series Speckle noise from a laser-based system is reduced by dynamically diffusing the laser beam. A
More informationDifrotec Product & Services. Ultra high accuracy interferometry & custom optical solutions
Difrotec Product & Services Ultra high accuracy interferometry & custom optical solutions Content 1. Overview 2. Interferometer D7 3. Benefits 4. Measurements 5. Specifications 6. Applications 7. Cases
More informationBeam shaping for holographic techniques
Beam shaping for holographic techniques Alexander Laskin a, Vadim Laskin a, Aleksei Ostrun b a AdlOptica GmbH, Rudower Chaussee 29, 12489 Berlin, Germany b St. Petersburg National Research University of
More informationWill contain image distance after raytrace Will contain image height after raytrace
Name: LASR 51 Final Exam May 29, 2002 Answer all questions. Module numbers are for guidance, some material is from class handouts. Exam ends at 8:20 pm. Ynu Raytracing The first questions refer to the
More informationDisplacement fields (U, W) obtained simultaneously by moire interferometry
Displacement fields (U, W) obtained simultaneously by moire interferometry Michael L. Basehore and Daniel Post A high-frequency phase grating on a specimen surface is illuminated symmetrically by two oblique
More information3B SCIENTIFIC PHYSICS
3B SCIENTIFIC PHYSICS Equipment Set for Wave Optics with Laser 1003053 Instruction sheet 06/18 Alf 1. Safety instructions The laser emits visible radiation at a wavelength of 635 nm with a maximum power
More informationEffects of Photographic Gamma on Hologram Reconstructions*
1650 JOURNAL OF THE OPTICAL SOCIETY OF AMERICA VOLUME 59. NUMBER 12 DECEMBER 1969 Effects of Photographic Gamma on Hologram Reconstructions* J AMES C. WYANT AND M. PA RKER G IVENS The Institute of Optics,
More informationHolography. Introduction
Holography Introduction Holography is the technique of using monochromatic light sources to produce 3D images on photographic film or specially designed plates. In this experiment you will learn about
More informationPolarization Experiments Using Jones Calculus
Polarization Experiments Using Jones Calculus Reference http://chaos.swarthmore.edu/courses/physics50_2008/p50_optics/04_polariz_matrices.pdf Theory In Jones calculus, the polarization state of light is
More informationLarge scale rapid access holographic memory. Geoffrey W. Burr, Xin An, Fai H. Mokt, and Demetri Psaltis. Department of Electrical Engineering
Large scale rapid access holographic memory Geoffrey W. Burr, Xin An, Fai H. Mokt, and Demetri Psaltis Department of Electrical Engineering California Institute of Technology, MS 116 81, Pasadena, CA 91125
More informationREAL TIME THICKNESS MEASUREMENT OF A MOVING WIRE
REAL TIME THICKNESS MEASUREMENT OF A MOVING WIRE Bini Babu 1, Dr. Ashok Kumar T 2 1 Optoelectronics and communication systems, 2 Associate Professor Model Engineering college, Thrikkakara, Ernakulam, (India)
More informationOptical Information Processing. Adolf W. Lohmann. Edited by Stefan Sinzinger. Ch>
Optical Information Processing Adolf W. Lohmann Edited by Stefan Sinzinger Ch> Universitätsverlag Ilmenau 2006 Contents Preface to the 2006 edition 13 Preface to the third edition 15 Preface volume 1 17
More informationExposure schedule for multiplexing holograms in photopolymer films
Exposure schedule for multiplexing holograms in photopolymer films Allen Pu, MEMBER SPIE Kevin Curtis,* MEMBER SPIE Demetri Psaltis, MEMBER SPIE California Institute of Technology 136-93 Caltech Pasadena,
More informationSPECKLE INTERFEROMETRY WITH TEMPORAL PHASE EVALUATION: INFLUENCE OF DECORRELATION, SPECKLE SIZE, AND NON-LINEARITY OF THE CAMERA
SPECKLE INTERFEROMETRY WITH TEMPORAL PHASE EVALUATION: INFLUENCE OF DECORRELATION, SPECKLE SIZE, AND NON-LINEARITY OF THE CAMERA C. Joenathan*, P. Haible, B. Franze, and H. J. Tiziani Universitaet Stuttgart,
More informationDevelopment of innovative fringe locking strategies for vibration-resistant white light vertical scanning interferometry (VSI)
Development of innovative fringe locking strategies for vibration-resistant white light vertical scanning interferometry (VSI) Liang-Chia Chen 1), Abraham Mario Tapilouw 1), Sheng-Lih Yeh 2), Shih-Tsong
More information3B SCIENTIFIC PHYSICS
3B SCIENTIFIC PHYSICS Equipment Set for Wave Optics with Laser U17303 Instruction sheet 10/08 Alf 1. Safety instructions The laser emits visible radiation at a wavelength of 635 nm with a maximum power
More informationDevelopment of a new multi-wavelength confocal surface profilometer for in-situ automatic optical inspection (AOI)
Development of a new multi-wavelength confocal surface profilometer for in-situ automatic optical inspection (AOI) Liang-Chia Chen 1#, Chao-Nan Chen 1 and Yi-Wei Chang 1 1. Institute of Automation Technology,
More informationEE119 Introduction to Optical Engineering Spring 2002 Final Exam. Name:
EE119 Introduction to Optical Engineering Spring 2002 Final Exam Name: SID: CLOSED BOOK. FOUR 8 1/2 X 11 SHEETS OF NOTES, AND SCIENTIFIC POCKET CALCULATOR PERMITTED. TIME ALLOTTED: 180 MINUTES Fundamental
More informationUnit-23 Michelson Interferometer I
Unit-23 Michelson Interferometer I Objective: Study the theory and the design of Michelson Interferometer. And use it to measure the wavelength of a light source. Apparatus: Michelson interferometer (include
More informationThe following article is a translation of parts of the original publication of Karl-Ludwig Bath in the german astronomical magazine:
The following article is a translation of parts of the original publication of Karl-Ludwig Bath in the german astronomical magazine: Sterne und Weltraum 1973/6, p.177-180. The publication of this translation
More informationOptical sectioning using a digital Fresnel incoherent-holography-based confocal imaging system
Letter Vol. 1, No. 2 / August 2014 / Optica 70 Optical sectioning using a digital Fresnel incoherent-holography-based confocal imaging system ROY KELNER,* BARAK KATZ, AND JOSEPH ROSEN Department of Electrical
More informationInterference [Hecht Ch. 9]
Interference [Hecht Ch. 9] Note: Read Ch. 3 & 7 E&M Waves and Superposition of Waves and Meet with TAs and/or Dr. Lai if necessary. General Consideration 1 2 Amplitude Splitting Interferometers If a lightwave
More informationSecurity Based Variable Holographic Data Encryption using Spatial Light Modulator
Security Based Variable Holographic Data Encryption using Spatial Light Modulator Aswathy.J.R 1, Sajan Ambadiyil 2, Helen Mascreen 3 1 PG Scholar, Optoelectronics and Communication Systems, ECE Department,
More informationComputer Generated Hologram used as an aberration corrector
Computer Generated Hologram used as an aberration corrector Computer Generated Hologram used as an aberration corrector Oded Arnon, Steve Bloomberg, Dan Ophir Oded Arnon, Steve Bloomberg, Dan Ophir El
More informationWave optics and interferometry
11b, 2013, lab 7 Wave optics and interferometry Note: The optical surfaces used in this experiment are delicate. Please do not touch any of the optic surfaces to avoid scratches and fingerprints. Please
More informationA STUDY ON THE VIBRATION CHARACTERISTICS OF CFRP COMPOSITE MATERIALS USING TIME- AVERAGE ESPI
A STUDY ON THE VIBRATION CHARACTERISTICS OF CFRP COMPOSITE MATERIALS USING TIME- AVERAGE ESPI Authors: K.-M. Hong, Y.-J. Kang, S.-J. Kim, A. Kim, I.-Y. Choi, J.-H. Park, C.-W. Cho DOI: 10.12684/alt.1.66
More informationStudy of self-interference incoherent digital holography for the application of retinal imaging
Study of self-interference incoherent digital holography for the application of retinal imaging Jisoo Hong and Myung K. Kim Department of Physics, University of South Florida, Tampa, FL, US 33620 ABSTRACT
More informationDynamic Phase-Shifting Electronic Speckle Pattern Interferometer
Dynamic Phase-Shifting Electronic Speckle Pattern Interferometer Michael North Morris, James Millerd, Neal Brock, John Hayes and *Babak Saif 4D Technology Corporation, 3280 E. Hemisphere Loop Suite 146,
More informationExperiment 4: Holography
Physics 570 Experimental Techniques in Physics (Spring 018) Experiment 4: Holography The purpose of this lab is to understand the basic principles of holography, and to make an actual hologram in our lab.
More informationSpatial-Phase-Shift Imaging Interferometry Using Spectrally Modulated White Light Source
Spatial-Phase-Shift Imaging Interferometry Using Spectrally Modulated White Light Source Shlomi Epshtein, 1 Alon Harris, 2 Igor Yaacobovitz, 1 Garrett Locketz, 3 Yitzhak Yitzhaky, 4 Yoel Arieli, 5* 1AdOM
More informationStereoscopic Hologram
Stereoscopic Hologram Joonku Hahn Kyungpook National University Outline: 1. Introduction - Basic structure of holographic display - Wigner distribution function 2. Design of Stereoscopic Hologram - Optical
More informationThree-dimensional quantitative phase measurement by Commonpath Digital Holographic Microscopy
Available online at www.sciencedirect.com Physics Procedia 19 (2011) 291 295 International Conference on Optics in Precision Engineering and Nanotechnology Three-dimensional quantitative phase measurement
More informationHOLOGRAPHY EXPERIMENT 25. Equipment List:-
EXPERIMENT 25 HOLOGRAPHY Equipment List:- (a) (b) (c) (d) (e) (f) (g) Holography camera and plate holders Laser/beam lamp and assembly Shutter on stand Light meter Objects to make holographs of Holographic
More informationAn Arduino based automated procedure for measuring refractive indices of optical materials for educational purposes using Michelson s interferometer
An Arduino based automated procedure for measuring refractive indices of optical materials for educational purposes using Michelson s interferometer Abstract George Mitsou 1 and Ioannis Sianoudis 2 1.
More informationDepartment of Mechanical and Aerospace Engineering, Princeton University Department of Astrophysical Sciences, Princeton University ABSTRACT
Phase and Amplitude Control Ability using Spatial Light Modulators and Zero Path Length Difference Michelson Interferometer Michael G. Littman, Michael Carr, Jim Leighton, Ezekiel Burke, David Spergel
More informationA progressive wave of frequency 150 Hz travels along a stretched string at a speed of 30 m s 1.
1. progressive wave of frequency 150 Hz travels along a stretched string at a speed of 30 m s 1. What is the phase difference between two points that are 50 mm apart on the string? zero 90 180 360 2 Which
More informationEXPRIMENT 3 COUPLING FIBERS TO SEMICONDUCTOR SOURCES
EXPRIMENT 3 COUPLING FIBERS TO SEMICONDUCTOR SOURCES OBJECTIVES In this lab, firstly you will learn to couple semiconductor sources, i.e., lightemitting diodes (LED's), to optical fibers. The coupling
More informationInvited Paper. recording. Yuri N. Denisyuk, Nina M. Ganzherli and Irma A. Maurer
Invited Paper Thick-layered light-sensitive dichromated gelatin for 3D hologram recording Yuri N. Denisyuk, Nina M. Ganzherli and Irma A. Maurer loffe Physico-Technical Institute of the Academy of Sciences
More informationA laser speckle reduction system
A laser speckle reduction system Joshua M. Cobb*, Paul Michaloski** Corning Advanced Optics, 60 O Connor Road, Fairport, NY 14450 ABSTRACT Speckle degrades the contrast of the fringe patterns in laser
More information3.0 Alignment Equipment and Diagnostic Tools:
3.0 Alignment Equipment and Diagnostic Tools: Alignment equipment The alignment telescope and its use The laser autostigmatic cube (LACI) interferometer A pin -- and how to find the center of curvature
More informationReal-time optical subtraction of photographic imagery for difference detection
Real-time optical subtraction of photographic imagery for difference detection John F. Ebersole and James C. Wyant Interferometric techniques described in this paper permit real-time optical image subtraction
More information