• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Is the storage of data in holograms more secure than the optical disc storage using interference patterns?

Extracts from this document...

Introduction

Extended Essay

Is the storage of data in holograms more secure than the optical disc storage using interference patterns?

Intro

Storage(importance)

Latest tech that has supported this storage reqt

Stored data needs security

2 forms of storage-optical then Holographic

  • Optical Disk storage: -

Optical disc is flat, circular, a polycarbonate disc whereon data is stored in the form of pits (or bumps) a sunken place for a apecific purpose of storage of data within a flat surface. This data is generally accessed when a special material on the disc often aluminum is illuminated with a laser. The reflected laser light is distorted by pits and the data is accessed. The numerical aperture of the optical pick-up head is 0.65, compared with 0.6 for DVD. Both of the new formats are likely to be backward compatible with DVDs and both employ the same video compression techniques. High Definition Digital Video Disk is a third generation data storage disk. It is also abbrevated as HD DVD.

HD DVD: -

HD DVD is a high-capacity rewritable optical disk, which can hold high definition video or other high definition data in a comparatively low memory space. There are two types of HD DVD disks a. One-sided disk b. Both-sided disk. Depending on the type of the disk, capacity of data storage on disk varies.

...read more.

Middle

Holographic memory is a technique that can store information at high density inside crystals or photopolymers known as holograms.Holography (from the Greek, Όλος-holos whole + γραφή-graphe writing) is the science of producing holograms, an advanced form of photography that allows an image to be recorded in three dimensions. The technique of holography can also be used to optically store and retrieve information.

Holograms: -

A hologram is a three-dimensional image, created with photographic projection. Unlike 3-D or virtual reality on a two-dimensional computer display, a hologram is a truly three-dimensional and freestanding image that does not simulate spatial depth or requires a special viewing device.

image03.jpg

Holographic data storage:-

Holographic data storage is a technique that can store information at high density inside crystals (à la HAL 9000) or photopolymers. As current storage techniques such as DVD reach the upper limit of possible data density (due to the diffraction limited size of the writing beams), holographic storage has the potential to become the next generation of storage media. The advantage of this type of data storage is that the volume of the recording media is used instead of just the surface.

Using currently available SLM's can produce about 1000 different images a second at 1024 × 1024 bit resolution. With the right type of media (probably polymers rather than something like LiNbO3), this would result in about 1 gigabit per second writing speed.

...read more.

Conclusion

For data retrieval, the laser (reference beam) is focused on the appropriate page according to the address generated. A photo detector array on the other side of the hologram records the image of that sub-hologram.

Problems with the Holographic storage system

A difficulty with the holostore technology had been the destructive readout. The re-illuminated reference beam (i.e. the read beam, see How holographic storage system works), used to retrieve the recorded information, also excites the donor electrons and disturbs the equilibrium of the space charge field in a manner that produces a gradual erasure of the recording. In the past, this has limited the number of reads that can be made before the signal-to -noise ratio becomes too low. Moreover, writes in the same fashion can degrade previous writes in the same region of the medium. This restricts the ability to use the three-dimensional capacity of a photo refractive for recording angle-multiplexed holograms.

The other challenge has been the geometry of the crystal medium. It is difficult to grow large crystals of good optical quality and of limited size. As a consequence of this problem, widespread application of the bulk photo refractive technology has not been occurred, despite an initial surge of development in the decade of the 1970s.

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Security in a computing world.

    The RST code bit is used to stop connections and free up the sequence numbers in use. The PSH code bit means that the TCP layer should flush the packet through the stack quickly, doesn't need to queue it up for later delivery.

  2. The project explains various algorithms that are exercised to recognize the characters present on ...

    The library functions available are highly optimized that can run code in real time and helps user to develop sophisticated vision application quickly. 5.2.1 Case 1: Clear Image and High Resolution This type of image provides the best results and serves as an ideal case for character recognition.

  1. Methods and technology used in Computer Forensics

    As it is such an exact science, and one whose success often carries with it serious criminal and civil consequences, simply opting for the most popular suite is not sufficient. The NIST CFTT has been developed so that those engaging in computer forensics, particularly law enforcement authorities, can test each application to ensure that it meets their requirements.

  2. Lifecycle Management Of Information Technology Project In Construction

    Any approach to the formal treatment of project view? mu?t allow thi? flexibility, thu? the wide variety of type? of project view? will be defined acro?? life?pan of project. (Gilb 2002:2)However, thi? work? again?t one of major goal? of formalizing treatment of view?, which i? to provide everyone with the unifying common per?pective of project information.

  1. Ubiquitous sensing spatial sensor networks

    In some cases, we agree that it has contributed positively in our environment. For instance, easy identification of product in shopping mall, the tracking objects and devices for credit card system control and a lot more. 2.2.2. Radio Frequency Identification (RFID)

  2. Intellectual Property

    After the (c) symbol, the year(s) of copyright are listed. If the work has been modified or updated (i.e., a new edition has been released) and re-copyrighted, there will be more than one year listed after the symbol. A copyright protects original works that fall under the categories of literature, dramatic, musical, artistic, and intellectual.

  1. Implementation of Path Finding Techniques in Homeland Security Robots

    Homeland security has also been discussed briefly. Chapter 1: Introduction.......................................................................1 1.1 Introduction...................................................................................1 1.2 Background...................................................................................1 1.3 Motivation......................................................................................2 1.4 Thesis Description.............................................................................2 1.5 Methodology.................................................................................2 1.6 Deliverables...................................................................................3 1.7 Thesis Foundation...........................................................................3 1.7.1 Time/Schedule...................................................................4 1.7.2 Technical Limitations..........................................................4 1.7.2 Potential Hazards...............................................................4 1.8 Report Guideline.............................................................................4 1.9 Summary......................................................................................5 Chapter 2: Relevant Theory and Analysis................................................6 2.1 Introduction...................................................................................6 2.2 Search Algorithm............................................................................6

  2. Random Access Memory

    It is faster than FPM memory because new access to the memory can begin before the last one finished. Its speed is just a little faster than FPM memory. EDO memory is not suitable for high-speed (75 MHz and higher)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work