Review Papers | Electronics & Communication Engineering | India | Volume 4 Issue 4, April 2015
Security Based Variable Holographic Data Encryption using Spatial Light Modulator
Aswathy.J.R, Sajan Ambadiyil, Helen Mascreen
Holographic data storage (HDS) has been considered as a promising data storage technology. The level of security can be increased, if it is possible to record variable data, such as 1D and 2D barcode, in the same hologram. Then holograms will be different for each other provided the same general security features for all. This level security can also be verified by using a system, contain a laser source, detector array and barcode reader, which will reduce counterfeiting. Also the difficulty in producing an original hologram which is expensive and time consuming can be overcome by mass produced replicas from the original which are relatively inexpensive.
Keywords: Hologram, Holographic Data Storage HDS, Laser, Interference, Data Security
Edition: Volume 4 Issue 4, April 2015
Pages: 2663 - 2667
How to Cite this Article?
Aswathy.J.R, Sajan Ambadiyil, Helen Mascreen, "Security Based Variable Holographic Data Encryption using Spatial Light Modulator", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153751, Volume 4 Issue 4, April 2015, 2663 - 2667
Similar Articles with Keyword 'Laser'
A Brief Review of Biomedical Optical Imaging towards Clinical Applications
Trinh Quang Duc, Trung Dang Thanh, Kien Nguyen Phan, Hoang Chu Duc
Investigations of Bit rates in Optical Intersatellite Wireless Links
Resmi R. S., Rafeekha M. J.
Similar Articles with Keyword 'Interference'
Review on CNN based Sign Language Recognition Methods
Akash Vijayan, Sajeena .A
A Review Based on Effects of Change in Thickness and Number of Layers on Microwave Absorbing Materials
Harsroop Kaur, Gagan Deep Aul
Similar Articles with Keyword 'Data Security'
Implementation of Secured Data Transmission System on Customized Zynq SoC
D. Dhanalaxmi, V. Roopa Reddy
Security Enhanced Communication Scheme with Compression on Encrypted Cipher Block
Asha R Pillai, Chithra M