a biometric encryption system for the self-exclusion

Upload: swarup-sagar-swain

Post on 07-Apr-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/4/2019 A Biometric Encryption System for the Self-Exclusion

    1/15

    1

    ABSTRACT

    The processing speed of electronic digital computers is inherently

    limited by the interconnection bottleneck. Even with the introduction of

    parallel computer architectures, the processing speed is still restricted

    by bus constraints and channel bandwidth. During the past two

    decades, researchers in the optics community extensively studied

    parallel digitalopticalcomputing systems to fully utilize the ultra-high

    processing speed, massive parallelism and non-interfering

    interconnection capability offered by optics. Opticalshadow-casting

    (OSC) technique has shown excellent potential for opticallyimplementing two-operand parallel logic gates and array logic

    operations. The 16 logic functions for two binary patterns (variables)

    are optically realizable in parallel by properly configuring an array of

    22 light emitting diodes. In this paper, we propose an enhanced OSC

    technique for implementing four-operand parallel logic gates. The

    proposed system is capable of performing 216

    logic functions by simply

    programming the switching mode of an array of 44 light emittingdiodes in the input plane. This leads to an efficient and compact

    realization scheme when compared to the conventional two-operand

    OSC system.

    Keywords: Parallel optical computing; Shadow-casting; Four-operand;

    Overlapping pattern

  • 8/4/2019 A Biometric Encryption System for the Self-Exclusion

    2/15

    2

    INTRODUCTION

    WHAT IS OPTICAL COMPUTING:

    The procedure of calculating or determining something by

    mathematical or logical methods is known as computing. In

    other words the branch of engineering science that studies

    (with the aid of computers) computable processes and

    structures is called computing.

    Optical computing refers to achieve the objective of

    computing with the use of optical systems

    WHY OPTICAL COMPUTING:

    Due to the rapid progress towards an information-oriented

    society in recent years, there are strong demands for massive

    information processing in various fields, such as real-time

    processing, image processing, database searching, and scientific

    applications.

    However, drastic improvement in the performance of

    conventional electronic computing systems cannot be expected

    owing to the problems caused by extreme integration, high wiring

    density, signal delay, electromagnetic interference, and so on.

    Optical technology is expected to provide significant advantages

    in massive information processing. The effective use of lights

    attractive physical properties, such as parallelism high speed, and

    crosstalk-free interconnects, has the potential to solve the

    problems currently experienced in massive data communication,

    interconnects, and computing. For this reason, optical technology

    is presently widely used in optical communication, and opticalinterconnects are actively being researched for future computer

    systems.

  • 8/4/2019 A Biometric Encryption System for the Self-Exclusion

    3/15

    3

    HOW TO IMPLEMENT:

    Optical interconnects are fundamental building block of parallel

    optical computers, and therefore, efficient optical interconnection

    technologies must be developed before next-generation optical

    computers can be realized.Several paradigms have been proposed for parallel digital optical

    computing, such as Optical shadow casting

    symbolic substitution

    binary image algebra image logic algebra

    optical array logic (OAL)

    These paradigms are commonly based on discrete correlation

    between a binary input image and a two-dimensional pattern

    consisting of points.

    Here only the optical shadow casting technique is discussed in

    detail for implementing 2-operand and 4-operand parallel digital

    optical computing. The OSC technique offers ultrafast parallel processing capability

    with a simple lens less setup as well as programming capability via

    the configuration of light sources.

    In OSC system, by controlling the switching modes of the LEDs,

    different logic operations of the input can be performed

    simultaneously with a decoding mask.

  • 8/4/2019 A Biometric Encryption System for the Self-Exclusion

    4/15

  • 8/4/2019 A Biometric Encryption System for the Self-Exclusion

    5/15

    5

    For each polygon in a scene, another polygon is created to

    act as its shadow. The vertices of the shadow polygon will all

    lie on the plane. The algorithm goes like this.

    For each vertex:

    Construct a vector from the light source to the vertex.

    Lengthen that vector so that it touches the plane.

    Add that vector to the position of the light source, and you

    have the position for this vertex of the shadow polygon.

    In the above picture, the polygon A,B,C is casting a shadow from

    the light source L onto the plane to create polygon Sa,Sb,Sc. The

    plane in this case is totally horizontal, i.e. parallel to the X and Z

    axes. I'll start with vertex A and cast it's shadow Sa.

    Construct a vector from the light source to the vertex.

    V = A - L

    Lengthen that vector so that it touches the plane.

    V = V * ((y1+y2) / y1)

    y1+y2 is the distance from the light source to the plane.

    y2 is the distance from the point A to the plane.

    Because this plane is horizontal, and passes through the origin,

    the values ofy1 and y2 are easy to calculate.

  • 8/4/2019 A Biometric Encryption System for the Self-Exclusion

    6/15

    6

    y2 is the Y coordinate of the vertex A, and (y1+y2) is the Y

    coordinate of the point L.

    Add that vector to the position of the light source, and you have

    the position for this vertex of the shadow polygon.

    Sa = L + V

    The same procedure is applied for the other two vertices B and C to

    create Sb and Sc. Then the polygon Sa, Sb, Sc can be drawn.

    OPTICAL SHADOW CASTING FOR IMPLEMENTING 2-

    OPERAND LOGIC SYSTEMS:

    The principle of shadow casting technique for implementing two-operand optical parallel logic gates has been reported by Ichioka

    and Tanida.

    Fig. 1(a) shows the schematic diagram of an OSC system for

    realizing two-operand logic gates. The two binary variables are

    spatially encoded into two types of coded binary objects as shown

    in Fig 1(b).

    Fig 1. Lens less shadow-casting system for implementing parallel optical

    logic gates(a) schematic diagram (b) coding for the binary variables.

    This system is capable of performing the 16 logic Functions

    associated with two binary variables as shown in Table 1.

  • 8/4/2019 A Biometric Encryption System for the Self-Exclusion

    7/15

    7

    The two binary variables are spatially encoded into two types of

    coded binary objects as shown in Fig 1(b). The spatially coded

    input patterns are introduced input plane via spatial light

    modulators (SLMs) or via transparencies and are intimately placed

    with each other to generate a superimposed or overlapped

    pattern.

    The overlapped pattern in the input plane is illuminated by four

    light-emitting diodes (LEDs), which are arranged in the form of a

    square array in the source plane, to yield multiple shadow grams

    of the coded input variables onto the output plane.

    A decoding mask (DM) is then applied to the output detector

    screen to yield the result for two-operand arithmetic and logical

    operations. The 16 switching modes generated by the

    combinations of the four LEDs are used to generate the 16 logic

    Functions associated with twobinary variables as shown in table 1

    Table 1. Two-operand conventional logical functions

    The close relationship between the operation of an OSC system

    used for implementing optical parallel logic operations and that of

  • 8/4/2019 A Biometric Encryption System for the Self-Exclusion

    8/15

    8

    array logic used in digital computers has potential application in

    parallel optical digital processing.

    Arithmetic operations optical multiprocessor and all-optical

    versions of parallel array logic systems have been implemented

    using the OSC technique.

    In the proposed OSC techniques, we only need to consider the

    state of the central subcell i.e., whether it is opaque (false) or

    transparent (true).To compensate for this limitation, in this paper,

    the concept of OSC is used to implement parallel multi-operand

    logic gates.

    By increasing the size of the LED array from 22 to 44, the

    number of realizable logic functions can be increased from 16 (24)

    in two-operand functions to 65 536 (216

    ) four-operand functions.

    Thus, employing a 44 LED array provides more flexibility for

    realizing a wide range of arithmetic and logic functions compared

    to that obtained from conventional OSC system incorporating 22

    LED array.

    4 OPERAND OSC SYSTEM:

    Fig. 2 shows a schematic diagram of the proposed OSC systemcapable of performing four-operand parallel optical logic

    functions. In Fig. 2, the source plane contains an array of 44LEDs

    (or other inexpensive light source) arranged in the form of a

    square array.

    The four input binary variables A, B, C and D are spatially encoded

    by using an orthogonal dual-rail encoding scheme. Each of the

    spatially encoded input variables is then introduced into

    corresponding SLMs in the input plane.

    The four SLMs are set in parallel, physically close to one another,

    in the input plane to form the superimposed overlapped input as

    shown in Fig. 2. The light beam emanating from the LEDs

  • 8/4/2019 A Biometric Encryption System for the Self-Exclusion

    9/15

    9

    illuminates the superimposed inputs and projectsmultiple

    shadowgrams onto a output detector screen.

    The output is obtained by decoding the interlaced shadowgrams

    by using a decoding mask with square window in the output

    plane. The 216 switching modes associated with the LEDs generate

    216

    logic functions.

    Fig. 2. Schematic diagram of an optical shadow-casting system for implementing four-

    operand arithmetic and logical functions.

    Fig3.Four

    operandOSCsystem(a)source map and (b) coding format.

  • 8/4/2019 A Biometric Encryption System for the Self-Exclusion

    10/15

    10

    Fig. 3(a) shows the source-map which illustrates the location of

    each LED in the source plane along with the minterm projected on

    the screen when the LED is ON. The map contains four rows and

    four columns. The rows correspond to the minterms , , ,

    andAB, respectively. The columns correspond to minterms having

    , , , and CD, respectively.

    The decimal numbers shown in the 44 source map ofFig. 3(a)

    are obtained by converting the binary numbers representing the

    minterms for each subcell of the source map, and are used to

    label the LEDs. For example, the LED in position (1,3) i.e., LED

    number 2 of the source plane, yields the minterm when it is

    ON and therefore it is represented by LED2.

    To encode the four binary input variablesA, B, C, and D, a quad

    rail coding scheme involving four horizontal or vertical opaque

    (logic 0) and transparent (logic 1) strips are used as shown inFig.

    3(b). The coding format ofFig. 3(b) is deduced from the source

    map ofFig. 3(a).

    For example, if the input variableA under observation is logic 1

    (transparent), the locations of the transparent or white strips in

    the encoded pattern correspond to the locations of the LEDshavingA in their minterms. If the input variableA under

    observation is logic 0 (opaque), the locations of the opaque or

    black strips in the encoded pattern correspond to the locations of

    the LEDs having in their minterms. Coding format for the

    remaining three inputs, B, C, and D can be obtained in a similar

    manner as depicted inFig. 3(b).

    Using the coding format ofFig. 3(b), a typical cell of the

    overlapped or superimposed pattern corresponding to the fourinput variables may be obtained as shown inFig. 4. Fig. 4shows

    that the each overlap pattern corresponding to each minterm of

    the source map ofFig. 3(a) consists of 44 subcells involving 16

    unique patterns where 15 subcells are opaque and only 1 subcell

    is transparent.

    http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig4http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig4http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig4http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig4http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig4http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig4http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig4http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig3
  • 8/4/2019 A Biometric Encryption System for the Self-Exclusion

    11/15

    11

    The location of the transparent subcell corresponds to the

    location of the LED whose minterm is identical to that obtained by

    an AND operation for the four input variables. For example, if we

    consider minterm (i.e.,A=0, B=1, C=1, and D=0), the

    superimposed encoded cell will have a transparent subcell at

    location (2,3) as shown inFig. 4. Fig. 4shows the superimposed

    patterns corresponding to 16 combinations of the input variables

    A, B, C, and D.

    Fig 4. Superimposed or overlapped patterns corresponding to different

    combinations of the input variablesA, B, C, and D.

    http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig4http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig4http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig4http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig4http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig4http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig4http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig4
  • 8/4/2019 A Biometric Encryption System for the Self-Exclusion

    12/15

    12

    Fig. 5. Four-operand OSC system, (a) geometrical configuration, (b) shadowgram corresponding

    to input variablesA, B, C, and D projected on the output detector screen, and (c) decoding

    mask.

    Fig. 5(a) illustrates the geometric configuration of the proposed

    four operand OSC system, while 5(b) depicts the process of

    overlapping the shadowgrams and the formation of the output

    pattern.Fig. 5(c) shows the decoding mask used for retrieving the

    output. The system operates satisfactory when the following

    conditions are satisfied:

    (1a)

    (1b)

    http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig5http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig5http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig5http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig5http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig5http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig5
  • 8/4/2019 A Biometric Encryption System for the Self-Exclusion

    13/15

    13

    where 4b and 4dare dimensions of the square cells used for

    encoding the input variables and the projected patterns.L1 represents the distance from the source plane to the input

    plane.

    L2 represents the distance from the input plane to the output

    detector screen.

    s represents the spacing between individual LEDs in vertical and

    horizontal directions in the source plane.

    Under these conditions, the shadowgram generated from a

    typical input cell when one of the LEDs is in the ON state,

    generates a square cell of dimension 4d4don the output plane.

    The shadowgrams of the input cell generated by turning the 16LEDs ON overlap on the output detector screen, shifted from one

    another by a distance dalong the vertical and horizontal

    directions as shown inFig. 5(b).

    The 16 shadowgrams cover an area of dimension 7d7don the

    output plane with the center subcell, located at position (4,4)

    yielding the desired logic function output. The central subcell

    becomes bright (logic 1) or dark (logic 0) according to the

    combinations of switching states of the 16 LEDs. When the LEDshave equal brightness, the light intensity (P) of the central subcell

    can be expressed as

    (2)

    where Sican take a value of 1 or 0 depending on the state of the ith

    LED, Mi is the ith minterm, and . and + represents the AND and OR

    operations, respectively

    http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig5http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig5http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig5http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04%2F30%2F2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda#fig5
  • 8/4/2019 A Biometric Encryption System for the Self-Exclusion

    14/15

    14

    4. CONCLUSION AND DISCUSSION:

    The OSC technique can be extended to implement parallel logic

    functions involving more than four operands. This can be achieved by

    increasing the number of LEDs on the source plane. By employing anLED array consisting ofN=2

    melements, arranged in Nrrows and

    Nc=N/Nrcolumns, 2N

    logic functions involving m operands can be

    implemented the following results can be obtained. The operation of

    such a generalized system is described below.

    Each input object cell is spatially into (NrNc) subcells. The encoded

    cell has either Nrhorizontal strips or Nc vertical strips. Half of the strips

    are dark (opaque) and the other half is bright (transparent). The N shadowgrams of the superimposed cell projected on the screen

    will interlace and cover (2Nr1)(2Nc1) subcells. The central subcell

    i.e., the (Nr,Nc) subcell of the projection pattern or output detector

    screen generates the output of the desired logic function.

    In this paper, an OSC based system for optically implementing four-operand logic functions was presented. With this technique, 2

    16or

    65 536 logic functions can be optically implemented compared to the

    16 in the two-operand system. The paper provides the designer a

    flexible and programmable tool for realizing four-operand logic

    functions in a compact and efficient manner.

  • 8/4/2019 A Biometric Encryption System for the Self-Exclusion

    15/15

    15

    REFERENCES:

    1.Y. Ichioka and J. Tanida, Opticalparallel logic gates using a

    shadow-casting system for opticaldigital computing.Proc IEEE72

    7 (1984)

    2. J. Tanida, T. Konishi and Y. Ichioka, P-OPALS: pure optical-parallel

    array logic system. Proc IEEE82 11 (1994)

    3.R.S. Fyatha, S.A. Alia, M.S. Alam ,Proc sciencedirectOptics & Laser

    Technology 37 (2005) 251257

    4.

    Naoki Nishimuraa,YasuhiroAwatsujib,Toshihiro Kubotaa Procsciencedirect64 (2004) 1027 1040

    5.K.W. Wong, L.M. Cheng and M.C. Poon, Design of digital-optical

    processors by using both intensity and polarization-encoding

    schemes.Appl Opt31 17 (1992).

    6.J. Tanida and Y. Ichioka, Opticallogic array processor using

    shadowgrams: parallel neighborhood operations and an

    architecture of an opticaldigital computingsystems.J Opt Soc Am

    A2 (1985) .7.H.F. Jordan, V.P. Heuring and R. Feuerstein, Optoelectronic time-

    of-flight design and demonstration of an all optical stored

    program digital computer. Proc IEEE82 11 (1994), pp. 16781689.

    http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04/30/2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acdahttp://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04/30/2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acdahttp://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04/30/2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acdahttp://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04/30/2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acdahttp://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04/30/2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acdahttp://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04/30/2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acdahttp://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04/30/2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acdahttp://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04/30/2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acdahttp://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04/30/2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acdahttp://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04/30/2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acdahttp://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04/30/2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acdahttp://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04/30/2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acdahttp://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V4H-4CHHR27-2&_user=9124175&_coverDate=04/30/2005&_alid=1420576439&_rdoc=2&_fmt=high&_orig=search&_cdi=5759&_sort=r&_docanchor=&view=c&_ct=49240&_acct=C000110338&_version=1&_urlVersion=0&_userid=9124175&md5=eeeb33dac148f4d68b07a892e7f5acda