SlideShare une entreprise Scribd logo
1  sur  30
Seminar
On
Optical Camouflage
TECHNOLOGY OF INVISIBILITY
WHAT
WHEN
HOW
WHERE
CONCLUSION
OUTLINE
 Process to create the illusion of invisibility by covering
with something that projects the scene directly behind
that object is called OPTICAL CAMOUFLAGE.
 It displays an image of the scene on the side opposite the
viewer on it, so that the viewer can "see through" the
wearer, rendering the wearer invisible.
 Although optical is a term that technically refers to all
forms of light, most proposed forms of optical
camouflage would only provide invisibility in the visible
portion of the spectrum.
WHAT
 Prototype examples and proposed designs of
optical camouflage devices range back to the late
eighties at least, and the concept began to appear in
fiction in the late nineties.
 In 2003, three professors at University of Tokyo
Susumu Tachi, Masahiko Inami and Naoki
Kawakami created a prototypical camouflage
system in which a video camera takes a shot of the
background and displays it on a cloth using an
external projector. The same year Time magazine
named it the coolest invention of 2003
 In 2006, Duke University achieved enveloping and
"disappearing" an object in the microwave range
using Metamaterials
WHEN
It is done in two ways
TOKYO METHOD
&
DUKE METHOD
HOW
TOKYO METHOD
 Optical camouflage doesn't work by way of magic. It
works by taking advantage of something called
Augmented-reality technology
 Augmented-reality systems add computer-generated
information to a user's sensory perceptions
 Most augmented-reality systems require that users
look through a special viewing apparatus to see a
real-world scene enhanced with synthesized
graphics. They also require a powerful computer.
Optical camouflage requires these things, as well,
but it also requires several other components
 A garment made from retro-reflective material
 A video camera
 A computer
 A projector
 A special, half-silvered mirror called a combiner
Here's everything needed to make a person appear invisible
Uniqueness of Retro-Reflection
• A ‘Rough surface’ creates a diffused reflection because
the incident (incoming) light rays get scattered in many
different directions.
• A ‘Perfectly smooth’ surface, like that of a mirror, creates
what is known as a specular reflection, a reflection in
which incident light rays and reflected light rays form
the exact same angle with the mirror surface.
• In ‘Retro-reflection’ the glass beads act like prisms,
bending the light rays by a process known as refraction.
This causes the reflected light rays to travel back along
the same path as the incident light rays. The result: An
observer situated at the light source receives more of
the reflected light and therefore sees a brighter
reflection
THE COMPLETE SYSTEM
MUTUAL TELEXISTENCE
 The weak point of this technique is that the observer
needs to look through a half-mirror. The current system
needs a half-mirror and projectors, which were fixed on
the ground
 It is little bit slow because we have to setup and adjust
everything
LIMITATIONS
DUKE METHOD
 Rely on product called metamaterial
 Meta in Greek means “beyond”…
 Therefore the term “metamaterial” means to create
something that doesn't exist in nature
 Metamaterials (MTMs) are a class of artificially
engineered composite materials having
extraordinary electromagnetic properties
 Depending on the structure , metamaterials may
have refractive index less than 1 and even negative
 Metamaterials having negative refractive index are
called Left Handed Metamaterials
 it is possible to design metamaterial "cloak" so that it
guides light around some region, rendering it invisible over
a certain band of wavelengths.
 The Duke team used metamaterials to make their cloaking
device have gradually varying refractive indices - from 1 on
the outside of the device, decreasing to zero in the centre .
The result is that microwave light subtly bends around the
device and is able to reform on the other side, although
with some detectable distortion .
 Due to limitation on size ,still its not possible to make a
cloak device for operating wavelength in visible band
 Current devices work only for one wavelength but visible
light has many wavelength
 People inside a cloaked area wouldn't be able to see out
because all visible light would be bending around where
they are positioned. They'd be invisible, but they'd be
blind, too
LIMITATIONS
Medical Aviation Automotive Home
Improvement
WHERE
 Patient centered design rooms
Improve the psychological well-being
of people in closed environments
 Surgery
Doctors performing surgery could use
‘invisibility’ to see through their hands
and instruments to the underlying
tissue more ‘visible’
MEDICAL
 Pilots landing a plane could use this
technology to make cockpit floors
transparent
 This would enable them to see the
runway and the landing gear simply
by glancing down
AVIATION
 Drivers backing up cars
could benefit one day from
optical camouflage. A quick
glance backward through a
transparent rear hatch or
tailgate would make it easy
to know when to stop
AUTOMOTIVE
 More fanciful applications like
transparent ceiling to provide a
view of the outside
 Transparent door replaces peep
hole
HOME IMPROVEMENT
Now all of us have had a small tour of the world of optical
camouflage
A lot of interesting thing have been done and already we have
seen that anyone can be almost invisible with this technology
But the future promises us a lot more
Research work is going on and soon we will have even more
astonishing results
CONCLUSION
www.en.wikepedia.org
www.ijettjournal.org
www.howstuffworks.com
www.Viewzone.com
REFERENCES
Thank You...
QUERIES PLEASE ?

Contenu connexe

Tendances

Bionic eye
Bionic eyeBionic eye
Bionic eye
Maitri
 
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKALAll about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
georgekurianpottackal
 

Tendances (20)

Night vision technology
Night vision technologyNight vision technology
Night vision technology
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGY
 
Invisible technology
Invisible technologyInvisible technology
Invisible technology
 
Night Vision Technology
Night Vision TechnologyNight Vision Technology
Night Vision Technology
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology ppt
 
Bionic eye
Bionic eyeBionic eye
Bionic eye
 
Invisibility ppt
Invisibility pptInvisibility ppt
Invisibility ppt
 
Bionic eye
Bionic eyeBionic eye
Bionic eye
 
Nightvision
NightvisionNightvision
Nightvision
 
Thermal imaging camera
Thermal imaging cameraThermal imaging camera
Thermal imaging camera
 
Night vision technology
Night vision technology Night vision technology
Night vision technology
 
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKALAll about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
 
Visual prosthesis
Visual prosthesisVisual prosthesis
Visual prosthesis
 
Computer clothing
Computer clothingComputer clothing
Computer clothing
 
Wearable Electronics
Wearable ElectronicsWearable Electronics
Wearable Electronics
 
optical computers
optical computersoptical computers
optical computers
 
Optical Computer
Optical ComputerOptical Computer
Optical Computer
 
Night vision technology
Night vision technologyNight vision technology
Night vision technology
 
Intelligent wireless video monitoring system using computer111111
Intelligent wireless video monitoring system using computer111111Intelligent wireless video monitoring system using computer111111
Intelligent wireless video monitoring system using computer111111
 
Smart memories
Smart memoriesSmart memories
Smart memories
 

En vedette

Camouflage for the patriot
Camouflage for the patriotCamouflage for the patriot
Camouflage for the patriot
IF109
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
mmubashirkhan
 
Optical Camouflage Technology Latest 2
Optical Camouflage Technology Latest 2Optical Camouflage Technology Latest 2
Optical Camouflage Technology Latest 2
neopreety56prateek
 
Cloaking making visible things into invisible
Cloaking  making visible things into invisibleCloaking  making visible things into invisible
Cloaking making visible things into invisible
PraDeep Reddy
 
Fieldcraft B Gl 392 009 Fp 001
Fieldcraft   B Gl 392 009 Fp 001Fieldcraft   B Gl 392 009 Fp 001
Fieldcraft B Gl 392 009 Fp 001
Edward Dobson
 

En vedette (18)

Camouflage for the patriot
Camouflage for the patriotCamouflage for the patriot
Camouflage for the patriot
 
OPTICAL CAMOUFLAGE
OPTICAL CAMOUFLAGEOPTICAL CAMOUFLAGE
OPTICAL CAMOUFLAGE
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Optical Camouflage Technology Latest 2
Optical Camouflage Technology Latest 2Optical Camouflage Technology Latest 2
Optical Camouflage Technology Latest 2
 
Invisibility
InvisibilityInvisibility
Invisibility
 
Optical camouflage
Optical camouflageOptical camouflage
Optical camouflage
 
Cloaking making visible things into invisible
Cloaking  making visible things into invisibleCloaking  making visible things into invisible
Cloaking making visible things into invisible
 
My presentation
My presentationMy presentation
My presentation
 
Final Project Report
Final Project ReportFinal Project Report
Final Project Report
 
Retina scan
Retina scanRetina scan
Retina scan
 
Optical camouflage-2
Optical camouflage-2Optical camouflage-2
Optical camouflage-2
 
Optical camouflage ....
Optical camouflage ....Optical camouflage ....
Optical camouflage ....
 
STEALTH AND CAMOUFLAGE: TECHNIQUES AND MATERIALS
STEALTH AND CAMOUFLAGE: TECHNIQUES AND MATERIALSSTEALTH AND CAMOUFLAGE: TECHNIQUES AND MATERIALS
STEALTH AND CAMOUFLAGE: TECHNIQUES AND MATERIALS
 
Biometric Technology And The Strategy Behind
Biometric Technology And The Strategy BehindBiometric Technology And The Strategy Behind
Biometric Technology And The Strategy Behind
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Fieldcraft B Gl 392 009 Fp 001
Fieldcraft   B Gl 392 009 Fp 001Fieldcraft   B Gl 392 009 Fp 001
Fieldcraft B Gl 392 009 Fp 001
 

Similaire à Optical camouflage by nva93

Camoflege
CamoflegeCamoflege
Camoflege
ppiyuu
 
BIOINSPIRATIONS FOR OPTICS, SENSORS AND PHOTONICS
BIOINSPIRATIONS FOR OPTICS, SENSORS AND PHOTONICSBIOINSPIRATIONS FOR OPTICS, SENSORS AND PHOTONICS
BIOINSPIRATIONS FOR OPTICS, SENSORS AND PHOTONICS
Ranjana Bali
 

Similaire à Optical camouflage by nva93 (20)

Invisible Cloak-1.pptx
Invisible Cloak-1.pptxInvisible Cloak-1.pptx
Invisible Cloak-1.pptx
 
Camoflege
CamoflegeCamoflege
Camoflege
 
Invisibility
Invisibility Invisibility
Invisibility
 
Camouflage
Camouflage Camouflage
Camouflage
 
BIOINSPIRATIONS FOR OPTICS, SENSORS AND PHOTONICS
BIOINSPIRATIONS FOR OPTICS, SENSORS AND PHOTONICSBIOINSPIRATIONS FOR OPTICS, SENSORS AND PHOTONICS
BIOINSPIRATIONS FOR OPTICS, SENSORS AND PHOTONICS
 
Microscopy
MicroscopyMicroscopy
Microscopy
 
optical-camouflage-5732-3BabssI.ppt
optical-camouflage-5732-3BabssI.pptoptical-camouflage-5732-3BabssI.ppt
optical-camouflage-5732-3BabssI.ppt
 
10.1.1.105.4855
10.1.1.105.485510.1.1.105.4855
10.1.1.105.4855
 
Invisible cloaking
Invisible cloakingInvisible cloaking
Invisible cloaking
 
DARK FIELD MICROSCOPY
DARK FIELD MICROSCOPYDARK FIELD MICROSCOPY
DARK FIELD MICROSCOPY
 
Optical Camouflage.pptx
Optical Camouflage.pptxOptical Camouflage.pptx
Optical Camouflage.pptx
 
Microscope
MicroscopeMicroscope
Microscope
 
Invisible cloak!!
Invisible cloak!!Invisible cloak!!
Invisible cloak!!
 
Uses-of-Mirrors-and-Lenses.pptx
Uses-of-Mirrors-and-Lenses.pptxUses-of-Mirrors-and-Lenses.pptx
Uses-of-Mirrors-and-Lenses.pptx
 
Slit lamp biomicroscopy.
Slit lamp biomicroscopy.Slit lamp biomicroscopy.
Slit lamp biomicroscopy.
 
Sl exam pt i
Sl exam pt iSl exam pt i
Sl exam pt i
 
Eye as an optical system.
Eye as an optical system.Eye as an optical system.
Eye as an optical system.
 
Phase contrast microscope
Phase contrast microscopePhase contrast microscope
Phase contrast microscope
 
Chapter 1 Microscopy
Chapter 1 MicroscopyChapter 1 Microscopy
Chapter 1 Microscopy
 
MICROSCOPY.pptx notes on microscopy of the
MICROSCOPY.pptx notes on microscopy of theMICROSCOPY.pptx notes on microscopy of the
MICROSCOPY.pptx notes on microscopy of the
 

Dernier

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Dernier (20)

Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 

Optical camouflage by nva93

  • 2.
  • 3.
  • 5.  Process to create the illusion of invisibility by covering with something that projects the scene directly behind that object is called OPTICAL CAMOUFLAGE.  It displays an image of the scene on the side opposite the viewer on it, so that the viewer can "see through" the wearer, rendering the wearer invisible.  Although optical is a term that technically refers to all forms of light, most proposed forms of optical camouflage would only provide invisibility in the visible portion of the spectrum. WHAT
  • 6.  Prototype examples and proposed designs of optical camouflage devices range back to the late eighties at least, and the concept began to appear in fiction in the late nineties.  In 2003, three professors at University of Tokyo Susumu Tachi, Masahiko Inami and Naoki Kawakami created a prototypical camouflage system in which a video camera takes a shot of the background and displays it on a cloth using an external projector. The same year Time magazine named it the coolest invention of 2003  In 2006, Duke University achieved enveloping and "disappearing" an object in the microwave range using Metamaterials WHEN
  • 7. It is done in two ways TOKYO METHOD & DUKE METHOD HOW
  • 8. TOKYO METHOD  Optical camouflage doesn't work by way of magic. It works by taking advantage of something called Augmented-reality technology  Augmented-reality systems add computer-generated information to a user's sensory perceptions  Most augmented-reality systems require that users look through a special viewing apparatus to see a real-world scene enhanced with synthesized graphics. They also require a powerful computer. Optical camouflage requires these things, as well, but it also requires several other components
  • 9.  A garment made from retro-reflective material  A video camera  A computer  A projector  A special, half-silvered mirror called a combiner Here's everything needed to make a person appear invisible
  • 10.
  • 11. Uniqueness of Retro-Reflection • A ‘Rough surface’ creates a diffused reflection because the incident (incoming) light rays get scattered in many different directions. • A ‘Perfectly smooth’ surface, like that of a mirror, creates what is known as a specular reflection, a reflection in which incident light rays and reflected light rays form the exact same angle with the mirror surface. • In ‘Retro-reflection’ the glass beads act like prisms, bending the light rays by a process known as refraction. This causes the reflected light rays to travel back along the same path as the incident light rays. The result: An observer situated at the light source receives more of the reflected light and therefore sees a brighter reflection
  • 12.
  • 15.  The weak point of this technique is that the observer needs to look through a half-mirror. The current system needs a half-mirror and projectors, which were fixed on the ground  It is little bit slow because we have to setup and adjust everything LIMITATIONS
  • 16. DUKE METHOD  Rely on product called metamaterial  Meta in Greek means “beyond”…  Therefore the term “metamaterial” means to create something that doesn't exist in nature  Metamaterials (MTMs) are a class of artificially engineered composite materials having extraordinary electromagnetic properties
  • 17.  Depending on the structure , metamaterials may have refractive index less than 1 and even negative  Metamaterials having negative refractive index are called Left Handed Metamaterials
  • 18.  it is possible to design metamaterial "cloak" so that it guides light around some region, rendering it invisible over a certain band of wavelengths.  The Duke team used metamaterials to make their cloaking device have gradually varying refractive indices - from 1 on the outside of the device, decreasing to zero in the centre . The result is that microwave light subtly bends around the device and is able to reform on the other side, although with some detectable distortion .
  • 19.
  • 20.
  • 21.  Due to limitation on size ,still its not possible to make a cloak device for operating wavelength in visible band  Current devices work only for one wavelength but visible light has many wavelength  People inside a cloaked area wouldn't be able to see out because all visible light would be bending around where they are positioned. They'd be invisible, but they'd be blind, too LIMITATIONS
  • 22. Medical Aviation Automotive Home Improvement WHERE
  • 23.  Patient centered design rooms Improve the psychological well-being of people in closed environments  Surgery Doctors performing surgery could use ‘invisibility’ to see through their hands and instruments to the underlying tissue more ‘visible’ MEDICAL
  • 24.  Pilots landing a plane could use this technology to make cockpit floors transparent  This would enable them to see the runway and the landing gear simply by glancing down AVIATION
  • 25.  Drivers backing up cars could benefit one day from optical camouflage. A quick glance backward through a transparent rear hatch or tailgate would make it easy to know when to stop AUTOMOTIVE
  • 26.  More fanciful applications like transparent ceiling to provide a view of the outside  Transparent door replaces peep hole HOME IMPROVEMENT
  • 27. Now all of us have had a small tour of the world of optical camouflage A lot of interesting thing have been done and already we have seen that anyone can be almost invisible with this technology But the future promises us a lot more Research work is going on and soon we will have even more astonishing results CONCLUSION