• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Is the storage of data in holograms more secure than the optical disc storage using interference patterns?

Extracts from this document...

Introduction

Extended Essay

Is the storage of data in holograms more secure than the optical disc storage using interference patterns?

Intro

Storage(importance)

Latest tech that has supported this storage reqt

Stored data needs security

2 forms of storage-optical then Holographic

  • Optical Disk storage: -

Optical disc is flat, circular, a polycarbonate disc whereon data is stored in the form of pits (or bumps) a sunken place for a apecific purpose of storage of data within a flat surface. This data is generally accessed when a special material on the disc often aluminum is illuminated with a laser. The reflected laser light is distorted by pits and the data is accessed. The numerical aperture of the optical pick-up head is 0.65, compared with 0.6 for DVD. Both of the new formats are likely to be backward compatible with DVDs and both employ the same video compression techniques. High Definition Digital Video Disk is a third generation data storage disk. It is also abbrevated as HD DVD.

HD DVD: -

HD DVD is a high-capacity rewritable optical disk, which can hold high definition video or other high definition data in a comparatively low memory space. There are two types of HD DVD disks a. One-sided disk b. Both-sided disk. Depending on the type of the disk, capacity of data storage on disk varies.

...read more.

Middle

Holographic memory is a technique that can store information at high density inside crystals or photopolymers known as holograms.Holography (from the Greek, Όλος-holos whole + γραφή-graphe writing) is the science of producing holograms, an advanced form of photography that allows an image to be recorded in three dimensions. The technique of holography can also be used to optically store and retrieve information.

Holograms: -

A hologram is a three-dimensional image, created with photographic projection. Unlike 3-D or virtual reality on a two-dimensional computer display, a hologram is a truly three-dimensional and freestanding image that does not simulate spatial depth or requires a special viewing device.

image03.jpg

Holographic data storage:-

Holographic data storage is a technique that can store information at high density inside crystals (à la HAL 9000) or photopolymers. As current storage techniques such as DVD reach the upper limit of possible data density (due to the diffraction limited size of the writing beams), holographic storage has the potential to become the next generation of storage media. The advantage of this type of data storage is that the volume of the recording media is used instead of just the surface.

Using currently available SLM's can produce about 1000 different images a second at 1024 × 1024 bit resolution. With the right type of media (probably polymers rather than something like LiNbO3), this would result in about 1 gigabit per second writing speed.

...read more.

Conclusion

For data retrieval, the laser (reference beam) is focused on the appropriate page according to the address generated. A photo detector array on the other side of the hologram records the image of that sub-hologram.

Problems with the Holographic storage system

A difficulty with the holostore technology had been the destructive readout. The re-illuminated reference beam (i.e. the read beam, see How holographic storage system works), used to retrieve the recorded information, also excites the donor electrons and disturbs the equilibrium of the space charge field in a manner that produces a gradual erasure of the recording. In the past, this has limited the number of reads that can be made before the signal-to -noise ratio becomes too low. Moreover, writes in the same fashion can degrade previous writes in the same region of the medium. This restricts the ability to use the three-dimensional capacity of a photo refractive for recording angle-multiplexed holograms.

The other challenge has been the geometry of the crystal medium. It is difficult to grow large crystals of good optical quality and of limited size. As a consequence of this problem, widespread application of the bulk photo refractive technology has not been occurred, despite an initial surge of development in the decade of the 1970s.

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. The project explains various algorithms that are exercised to recognize the characters present on ...

    The EVM is designed to work with TI's Code Composer Studio Development. Code Composer communicates with the board through the embedded emulator. Block diagram of this platform is shown in Figure 4.1. Figure 4.1 Block Diagram of EVM DM6437 [6] 4.2 Video Interfaces on TMS320DM6437 DVDP Texas Instruments DM6437 processor

  2. Methods and technology used in Computer Forensics

    operations, the forensic capabilities of standalone devices and integrated systems alone may not be sufficient to meet the technical requirements. With this in mind, forensic investigators and data analysts, looking to combine and share forensic resources to increase productivity, have developed forensic networks12.

  1. Ubiquitous sensing spatial sensor networks

    for information sharing, it is essential that an individual identity is given. There are two technology used for identification. These are Radio Frequency Identification (RFID) tags and Visual barcodes. (David Ley 2007) This technology has been useful in various ways in our daily activities.

  2. Intellectual Property

    These standards include elements such as 'skill', 'originality' and 'effort'. The copyright will expire after a set period of time, but maybe renewed by re-applying. When something is copyrighted, there is a small symbol that is placed along side it, which is internationally recognised. After the (c) symbol, the year(s)

  1. Implementation of Path Finding Techniques in Homeland Security Robots

    Homeland security has also been discussed briefly. Chapter 1: Introduction.......................................................................1 1.1 Introduction...................................................................................1 1.2 Background...................................................................................1 1.3 Motivation......................................................................................2 1.4 Thesis Description.............................................................................2 1.5 Methodology.................................................................................2 1.6 Deliverables...................................................................................3 1.7 Thesis Foundation...........................................................................3 1.7.1 Time/Schedule...................................................................4 1.7.2 Technical Limitations..........................................................4 1.7.2 Potential Hazards...............................................................4 1.8 Report Guideline.............................................................................4 1.9 Summary......................................................................................5 Chapter 2: Relevant Theory and Analysis................................................6 2.1 Introduction...................................................................................6 2.2 Search Algorithm............................................................................6

  2. Random Access Memory

    It is faster than FPM memory because new access to the memory can begin before the last one finished. Its speed is just a little faster than FPM memory. EDO memory is not suitable for high-speed (75 MHz and higher)

  1. So in order to understand what the main areas where organisation should be aware ...

    The purpose of footprinting to learn as much as you can about a system, it's remote access capabilities, its ports and services, and the aspects of its security." Its, just like knowing about your enemy before you try to attack.

  2. RFID (Radio Frequency Identification Devices)-

    These uses are seen as only the beginning, and as RFID is deployed across different sectors and services, increasing efficiency and visibility, several other applications and benefits may arise. [In-Stat, 2005. Online] The technology itself offers several improvements over its predecessor technologies - the barcode and magnetic stripe cards.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work