최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0603580 (2000-06-26) |
발명자 / 주소 |
|
출원인 / 주소 |
|
인용정보 | 피인용 횟수 : 581 인용 특허 : 97 |
A remote monitoring system includes transducers, a transducer control module, a communications device, a monitoring system and end-user display terminals. The transducers are disposed on the property and/or equipment in a manner to measure specific characteristics or parameters and communicate with
A remote monitoring system includes transducers, a transducer control module, a communications device, a monitoring system and end-user display terminals. The transducers are disposed on the property and/or equipment in a manner to measure specific characteristics or parameters and communicate with the transducer control module via a wireless communication protocol. The transducer control module receives and analyzes transducer measurements and detects alarm conditions. The transducer control module communicates with the monitoring system via a wide area network and the communications device. The monitoring system receives, stores and analyzes information received from the transducer control module and reports the information to the end-user terminals via a wide area network, such as the Internet, in response to user requests.
A remote monitoring system includes transducers, a transducer control module, a communications device, a monitoring system and end-user display terminals. The transducers are disposed on the property and/or equipment in a manner to measure specific characteristics or parameters and communicate with
A remote monitoring system includes transducers, a transducer control module, a communications device, a monitoring system and end-user display terminals. The transducers are disposed on the property and/or equipment in a manner to measure specific characteristics or parameters and communicate with the transducer control module via a wireless communication protocol. The transducer control module receives and analyzes transducer measurements and detects alarm conditions. The transducer control module communicates with the monitoring system via a wide area network and the communications device. The monitoring system receives, stores and analyzes information received from the transducer control module and reports the information to the end-user terminals via a wide area network, such as the Internet, in response to user requests. 9741000, Crosby; US-3914877, 19751000, Hines; US-3922074, 19751100, Ikegami et al.; US-3971917, 19760700, Maddox et al.; US-3982064, 19760900, Barnaby; US-3984624, 19761000, Waggener; US-4025851, 19770500, Haselwood et al.; US-4225967, 19800900, Miwa et al.; US-4230990, 19801000, Lert, Jr. et al.; US-4231113, 19801000, Blasbalg; US-4237484, 19801200, Brown et al.; US-4238849, 19801200, Gassmann; US-4252995, 19810200, Schmidt et al.; US-4262329, 19810400, Bright et al.; US-4313197, 19820100, Maxemchuk; US-4367488, 19830100, Leventer et al.; US-4379947, 19830400, Warner; US-4380027, 19830400, Leventer et al.; US-4389671, 19830600, Posner et al.; US-4395600, 19830700, Lundy et al.; US-4423415, 19831200, Goldman; US-4425642, 19840100, Moses et al.; US-4425661, 19840100, Moses et al.; US-4476468, 19841000, Goldman; US-4495620, 19850100, Steele et al.; US-4528588, 19850700, Lofberg; US-4532508, 19850700, Ruell; US-4547804, 19851000, Greenberg; US-4553261, 19851100, Froessl; US-4590366, 19860500, Rothfjell; US-4595950, 19860600, Lofberg; US-4637051, 19870100, Clark; US-4639779, 19870100, Greenberg; US-4644582, 19870200, Morishita et al.; US-4647974, 19870300, Butler et al.; US-4654867, 19870300, Labedz et al.; US-4660221, 19870400, Dlugos; US-4663518, 19870500, Borror et al.; US-4665431, 19870500, Cooper; US-4672605, 19870600, Hustig et al.; US-4675746, 19870600, Tetrick et al.; US-4677435, 19870600, D'Agraives et al.; US-4677466, 19870600, Lert, Jr. et al.; US-4682794, 19870700, Margolin; US-4697209, 19870900, Kiewit et al.; US-4703476, 19871000, Howard; US-4712103, 19871200, Gotanda; US-4718106, 19880100, Weinblatt; US-4739377, 19880400, Allen; US-4750173, 19880600, Bluthgen; US-4765656, 19880800, Becker et al.; US-4775901, 19881000, Nakano; US-4776013, 19881000, Kafri et al.; US-4805020, 19890200, Greenberg; US-4807031, 19890200, Broughton et al.; US-4811357, 19890300, Betts et al.; US-4811408, 19890300, Goldman; US-4820912, 19890400, Samyn; US-4827508, 19890500, Shear; US-4835517, 19890500, van der Gracht et al.; US-4855827, 19890800, Best; US-4864618, 19890900, Wright et al.; US-4866771, 19890900, Bain; US-4874936, 19891000, Chandler et al.; US-4876617, 19891000, Best et al.; US-4879747, 19891100, Leighton et al.; US-4884139, 19891100, Pommier; US-4885632, 19891200, Mabey et al.; US-4903301, 19900200, Kondo et al.; US-4908836, 19900300, Rushforth et al.; US-4908873, 19900300, Philibert et al.; US-4920503, 19900400, Cook; US-4921278, 19900500, Shiang et al.; US-4939615, 19900700, Adelson; US-4941150, 19900700, Iwasaki; US-4943973, 19900700, Werner; US-4943976, 19900700, Ishigaki; US-4944036, 19900700, Hyatt; US-4963998, 19901000, Maufe; US-4965827, 19901000, McDonald; US-4967273, 19901000, Greenberg; US-4969041, 19901100, O'Grady et al.; US-4972471, 19901100, Gross et al.; US-4972476, 19901100, Nathans; US-4977594, 19901200, Shear; US-4979210, 19901200, Nagata et al.; US-4993068, 19910200, Piosenka et al.; US-4996530, 19910200, Hilton; US-5010405, 19910400, Schreiber et al.; US-5027401, 19910600, Soltesz; US-5036513, 19910700, Greenblatt; US-5050213, 19910900, Shear; US-5063446, 19911100, Gibson; US-5073899, 19911200, Collier et al.; US-5075773, 19911200, Pullen; US-5077608, 19911200, Dubner; US-5077795, 19911200, Rourke et al.; US-5079648, 19920100, Maufe; US-5083224, 19920100, Hoogendoorn et al.; US-5086469, 19920200, Gupta et al.; US-5091966, 19920200, Bloomberg et al.; US-5095196, 19920300, Miyata; US-5103459, 19920400, Gilhousen et al.; US-5113437, 19920500, Best; US-5128525, 19920700, Stearns et al.; US-5134496, 19920700, Schwab et al.; US-5144660, 19920900, Rose; US-5146457, 19920900, Veldhuis et al.; US-5148498, 19920900, Resnikoff; US-5150409, 19920900, Elsner; US-5161210, 19921100, Druyvesteyn et al.; US-5166676, 19921100, Milheiser; US-5168146, 19921200, Bloomberg; US-5181786, 19930100, Hujink; US-5185736, 19930200, Tyrrell et al.; US-5199081, 19930300, Saito et al.; US-5200822, 19930400, Bronfin et al.; US-5200993, 19 930400, Wheeler et al.; US-5212551, 19930500, Conanan; US-5213337, 19930500, Sherman; US-5228056, 19930700, Schilling; US-5243423, 19930900, DeJean et al.; US-5245165, 19930900, Zhang; US-5245329, 19930900, Gokcebay; US-5247364, 19930900, Banker et al.; US-5253078, 19931000, Balkanski et al.; US-5257199, 19931000, Funada et al.; US-5258998, 19931100, Koide; US-5259025, 19931100, Monroe; US-5267334, 19931100, Normille et al.; US-5278400, 19940100, Appel; US-5280537, 19940100, Sugiyama et al.; US-5293399, 19940300, Hefti; US-5295203, 19940300, Krause et al.; US-5299019, 19940300, Pack et al.; US-5305400, 19940400, Butera; US-5315098, 19940500, Tow; US-5315448, 19940500, Ryan; US-5319453, 19940600, Copriviza; US-5319724, 19940600, Blonstein et al.; US-5319735, 19940600, Preuss et al.; US-5325167, 19940600, Melen; US-5327237, 19940700, Gerdes et al.; US-5337361, 19940800, Wang; US-5337362, 19940800, Gormish et al.; US-5349655, 19940900, Mann; US-5351302, 19940900, Leighton et al.; US-5374976, 19941200, Spannenburg; US-5379345, 19950100, Greenberg; US-5387941, 19950200, Montgomery et al.; US-5394274, 19950200, Kahn; US-5396559, 19950300, McGrew; US-5398283, 19950300, Virga; US-5404160, 19950400, Schober et al.; US-5404377, 19950400, Moses; US-5408542, 19950400, Callahan; US-5410598, 19950400, Shear; US-5418853, 19950500, Kanota et al.; US-5422963, 19950600, Chen et al.; US-5422995, 19950600, Aoki et al.; US-5425100, 19950600, Thomas et al.; US-5428606, 19950600, Moskowitz; US-5428607, 19950600, Hiller et al.; US-5432542, 19950700, Thibadeau et al.; US-5432870, 19950700, Schwartz; US-5436653, 19950700, Ellis et al.; US-5444779, 19950800, Daniele, 380/003; US-5446273, 19950800, Leslie; US-5449895, 19950900, Hecht et al.; US-5450122, 19950900, Keener; US-5450490, 19950900, Jensen et al.; US-5453968, 19950900, Velhuis et al.; US-5461426, 19951000, Limberg et al.; US-5469506, 19951100, Berson et al.; US-5473631, 19951200, Moses; US-5479168, 19951200, Johnson et al.; US-5481294, 19960100, Thomas et al.; US-5488664, 19960100, Shamir; US-5499294, 19960300, Friedman; US-5500856, 19960300, Nagase et al.; US-5509074, 19960400, Choudhury et al.; US-5510900, 19960400, Shirochi et al.; US-5513011, 19960400, Matsumoto et al.; US-5513260, 19960400, Ryan; US-5515081, 19960500, Vasilik; US-5521372, 19960500, Hecht et al.; US-5524933, 19960600, Kunt et al.; US-5524936, 19960600, Kunt et al.; US-5526427, 19960600, Thomas et al.; US-5530751, 19960600, Morris; US-5530759, 19960600, Braudaway et al.; US-5530852, 19960600, Meske, Jr. et al.; US-5532920, 19960700, Hartrick et al.; US-5537216, 19960700, Yamashita et al.; US-5537223, 19960700, Curry; US-5539471, 19960700, Mhyrvold et al.; US-5539735, 19960700, Moskowitz; US-5541662, 19960700, Adams et al.; US-5541741, 19960700, Suzuki; US-5544255, 19960800, Smithies et al.; US-5548646, 19960800, Aziz et al.; US-5557333, 19960900, Jungo et al.; US-5559559, 19960900, Jungo et al.; US-5568179, 19961000, Diehl et al.; US-5568268, 19961000, Tsuji et al.; US-5568570, 19961000, Rabbani; US-5572010, 19961100, Petrie; US-5572247, 19961100, Montgomery; US-5574787, 19961100, Ryan; US-5576532, 19961100, Hecht; US-5579124, 19961100, Aijala et al.; US-5581800, 19961200, Fardeau et al.; US-5582103, 19961200, Tanaka et al.; US-5587743, 19961200, Montgomery; US-5590197, 19961200, Chen et al.; US-5602920, 19970200, Bestler et al.; US-5606609, 19970200, Houser et al.; US-5611575, 19970300, Petrie; US-5612943, 19970300, Moses et al.; US-5613004, 19970300, Cooperman et al.; US-5613012, 19970300, Hoffman et al.; US-5614940, 19970300, Cobbley et al.; US-5617148, 19970400, Montgomery; US-5627655, 19970500, Okamoto et al.; US-5629770, 19970500, Brassil; US-5629980, 19970500, Stefik et al.; US-5636292, 19970600, Rhoads; US-5638443, 19970600, Stefik et al.; US-5638446, 19970600, Rubin; US-5646997, 19970700, Barton; US-5647017, 19970700, Smithies et al.; US-5649054, 19970700, Oomen et al.; US-5652626, 19970700, Kawakami et al.; US-5659 613, 19970800, Copeland; US-5659726, 19970800, Sandford, II et al.; US-5659732, 19970800, Kirsch; US-5661574, 19970800, Kawana; US-5663766, 19970900, Sizer, II; US-5664018, 19970900, Leighton; US-5666487, 19970900, Goodman et al.; US-5671277, 19970900, Ikenoue et al.; US-5680223, 19971000, Cooper et al.; US-5687191, 19971100, Lee et al.; US-5689587, 19971100, Bender et al.; US-5689623, 19971100, Pinard; US-5709932, 19980100, Glez et al.; US-5710834, 19980100, Rhoads; US-5712920, 19980100, Spille; US-5719937, 19980200, Warren et al.; US-5719984, 19980200, Yamagata et al.; US-5721788, 19980200, Powell et al.; US-5727092, 19980300, Sandford, II et al.; US-5734752, 19980300, Knox; US-5737025, 19980400, Dougherty et al.; US-5737026, 19980400, Lu et al.; US-5739864, 19980400, Copeland; US-5745569, 19980400, Moskowitz et al.; US-5745604, 19980400, Rhoads; US-5748763, 19980500, Rhoads; US-5748783, 19980500, Rhoads; US-5761686, 19980600, Bloomberg; US-5764763, 19980600, Jensen et al.; US-5764770, 19980600, Schipper et al.; US-5765152, 19980600, Erickson; US-5765176, 19980600, Bloomberg; US-5768426, 19980600, Rhoads; US-5774452, 19980600, Wolosewicz; US-5778102, 19980700, Sandford, II et al.; US-5781629, 19980700, Haber et al.; US-5784461, 19980700, Shaffer et al.; US-5796785, 19980800, Spiero; US-5799081, 19980800, Kim et al.; US-5799082, 19980800, Murphy et al.; US-5809139, 19980900, Girod et al., 380/005; US-5819289, 19981000, Sanford, II et al.; US-5822360, 19981000, Lee et al.; US-5822432, 19981000, Moskowitz et al.; US-5825892, 19981000, Braudway et al., 380/051; US-5826227, 19981000, Jayant; US-5826892, 19981000, Braudaway et al.; US-5828325, 19981000, Wolosewicz et al.; US-5835639, 19981100, Honsinger et al.; US-5845281, 19981200, Benson; US-5848155, 19981200, Cox; US-5850249, 19981200, Massetti et al.; US-5857038, 19990100, Owada et al.; US-5859920, 19990100, Daly et al.; US-5862218, 19990100, Steinberg; US-5878010, 19990300, Okamoto et al.; US-5889868, 19990300, Moskowitz et al.; US-5892900, 19990400, Ginter et al.; US-5893067, 19990400, Bender et al.; US-5901178, 19990500, Lee et al.; US-5901224, 19990500, Hecht, 380/004; US-5905505, 19990500, Lesk; US-5905819, 19990500, Daly; US-5907443, 19990500, Hirata; US-5915027, 19990600, Cox et al.; US-5929920, 19990700, Sizer, II; US-5930369, 19990700, Cox et al.; US-5937000, 19990800, Lee et al.; US-5940134, 19990800, Wirtz; US-5943422, 19990800, Van Wie et al.; US-5960151, 19990900, Takahashi; US-5970140, 19991000, Sandford, II et al.; US-5987127, 19991100, Ikenoue et al., 380/007; US-5987459, 19991100, Swanson et al.; US-5991500, 19991100, Kanota et al.; US-6000621, 19991200, Hecht et al.; US-6031914, 20000200, Tewfik et al.; US-6061793, 20000500, Tewfik et al.; US-6069914, 20000500, Cox; US-6078664, 20000600, Moskowitz et al.; US-6086706, 20000700, Brassil et al.; US-6131161, 20001000, Linnartz Correspondence, dated Oct. 30, 1995. Johhnson, "Steganography," Dec. 10, 1995, 32 pages. Aura, "Invisible Communication," Helskinki University of Technology, Digital Systems, Laboratory, Nov. 5, 1995, 13 pages. Digimarc presentation at RSA Conference, approximately Jan. 17, 1996, 4 pages. Bartlett, et al., "An Overview of High Water FBI Technology," Posted on Internet Mar. 22, 1996, 12 pages. Brassil et al., "Hiding Information in Document Images," Nov., 1995, 7 pages. Bors et al., "Embedding Parametric Digital Signatures in Images," EUSIPCO-96, Trieste, Italy, accepted for publication, Sep. 1996 (Published on internet Apr. 9, 1996, (http://poseidon.csd.auth.gr/papers/confers.1.sub--ind.html), 4 pages. Nikolaidis et al., "Copyright Protection of Images Using Robust Digital Signatures," IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP-96), accepted for publication, May 1996 (Published on internet Apr. 9, 1996, (http://poseidon.csd.auth.gr/papers/confers.1.sub--ind.html)), 4 pages. (Also published 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings, May 7-10, 1996, vol. 4, pp. 2168-2171). Pitas, "A Method for Signature Casting on Digital Images," 1996 IEEE International Conference on Image Processing (ICIP'96), Lausanne, Switzerland, accepted for publication, Sep. 16-19, 1996 (Published on internet Apr. 9, 1996, (http://poseidon.csd.auth.gr/papers/confers.1.sub--ind.html)), 4 pages. Voyatzis, et al., Chaotic Mixing of Digital Images and Applications To Watermarking, European Conference on Multimedia Applications, Services and Techniques (ECMAST'96), Louvain-la-Neuve, Belgium, accepted for publications, May 1996 (Published on internet Apr. 9, 1996, (http://poseidon.csd.auth.gr/papers/confers.1.sub--ind.html)), 9 pages. Koch et al., "Digital Copyright Labeling: Providing Evidence of Misuse and Tracking Unauthorized Distribution of Copyrighted Materials," Oasis Magazine, Dec. 1995, 3 pages. Boney et al., "Digital Watermarks for Audio Signals," Proceedings of Multimedia '96, 1996 IEEEE, pp. 473-480. Boucqueau et al., Equitable Conditional Access and Copyright Protection for Image Based on Trusted Third Parties, Teleservices & Multimedia Communications, 2nd Int. Cost 237 Workshop, Second International Cost 237 Workshop, Nov., 1995; published 1996, pp. 229-243. Delaigle et al., "Digital Watermarking," Proc. SPIE--Int. Soc. Opt. Eng., vol. 2659, pp. 99-110, 1996. Dautzenberg, "Watermarking Images," Department of Microelectronics and Electrical Engineering, Trinity College Dublin, 47 pages, Oct. 1994. van Schyndel et al., "Towards a Robust Digital Watermark," ACCV '95, vol. 2, Dec., 1995, pp. 504-508. Lesk, "Digital Libraries Meet Electronic Commerce: On-Screen Intellectual Property," Proceedings of the Third Forum on Research and Technology Advances in Digital Libraries--ADL--'96--(Cat No. 96TB100053), 1996, pp. 58-64. Chudy, "Handcuff Digital Thieves," Byte Magazine, Apr., 1996, 4 pages. New Product Information, "FBI at AppleExpo" (Olympia, London), Nov., 1995, 2 pages. ORuanaidh et al, "Watermarking Digital Images for Copyright Protection," http://www.kalman.mee.tcd.ie/people/jjr/eva--pap.html, Feb. 2, 1996, 8 pages. (Also published Aug., 1996, IEE Proceedings--Vision, Image and Signal Processing, vol. 143, No. 4, pp. 250-256. Dice Digital Watermark System, Q&A, Dec., 1995, 12 pages. Ohnishi et al., Embedding a Seal into a Picture Under Orthogonal Wavelet Transform, Proceedings of Multimedia '96, 1996, IEEE, pp. 514-521. Arazi, et al., "Intuition, Perception, and Secure Communication," IEEE Transactionson Systems, Man, and Cybernetics, vol. 19, No. 5, Sep./Oct. 1989, pp. 1016-1020. Bruyndonckx et al., "Spatial Method for Copyright Labeling of Digital Images," 1994, 6 pages. Craver et al., "Can Invisible Watermarks Resolve Rightful Ownerships?" IBM Technical Report RC 20509, Jul. 25, 1996, pp. 1-21. (also published Proc . SPIE--Int. Soc. Opt. Eng. vol. 3022, pp. 310-321, conf. Feb. 13-14, 1997). "Watermarking & Digital Signature: Protect Your Work!" Published on Internet 1996, http://ltswww.epfl.ch/jordan/watermarking.html. Gabor, et al., "Theory of Communication," J. Inst. Elect. Eng. 93, 1946, pp. 429-441. Bruyndonckx et al., Neural Network Post-Processing of Coded Images Using Perceptual Masking, 1994, 3 pages. Pickholtz et al., "Theory of Spread-Spectrum Communications--A Tutorial," Transactions on Communications, vol. COM-30, No. 5, May, 1982, pp. 855-884. Sklar, "A Structured Overview of Digital Communications--a Tutorial Review--Part I," IEEE Communications Magazine, Aug., 1983, pp. 1-17. Sklar, "A Structured Overview of Digital Communications--a Tutorial Review--Part II," IEEE Communications Magazine, Oct., 1983, pp. 6-21. Tirkel et al., "A Two-Dimensional Digital Watermark," 1995, 6 pages. #192 appears more complete. Delaigle et al., "A Psychovisual Approach for Digital Picture Watermarking," 1995, 20 pages. Fimmerstad, "The Virtual Art Museum," Ericsson Connexion, Dec., 1995, pp. 29-31. Brandt et al., "Representations that Uniquely Characterize Images Modulo Translation, Rotation, and Scaling," Pattern Recognition Letters, Aug. 1, 1996, pp. 1001-1015. Mintzer et al., "Toward on-line, Worldwide Access to Vatican Library Materials," IBM J. Res. Develop. vol. 40 No. 2, Mar., 1996, pp. 139-162. Hartung et al., Digital Watermarking of Raw and Compressed Video, Proc. SPIE 2952, Digital Compression Technologies and Systems for Video Communications, Oct., 1996, pp. 205-213. Cox et al., "A Secure, Imperceptable Yet Perceptually Salient, Spread Spectrum Watermark for Multimedia," IEEE, Southcon/96, Conference Record, pp. 192-197, 1996. Cox et al., "Secure Spread Spectrum Watermarking for Multimedia," NEC Research Institute Technical Report, Dec. 5, 1995, 33 pages. Voyatzis et al., "Applications of Total Automorphisms in Image Watermarking," 1996 IEEE International Conference on Image Processing (ICIP'96), Lausanne, Switzerland, Part vol. 2, pp. 237-240, Sep. 16-19, 1996 (Published on internet Apr. 9, 1996, (http://poseidon.csd.auth.gr/papers/confers.1.sub--ind.html)), 4 pages, 1996 IEEE, Sep. 16-19, 1996, Lausanne, Switzerland, pp. 237-239. Szepanski, "A Signal Theoretic Method for Creating Forgery-Proof Documents for Automatic Verification," Proceedings 1979 Carnahan Conference on Crime Countermeasures, May 16, 1979, pp. 101-109. Proceedings, Technological Strategies for Protecting Intellectual Property in the Networked Multimedia Environment, Coalition for Networked Information, Interactive Multimedia Association, John F. Kennedy School of Government, Science, Technology & Public Policy Program, Massachusetts Institute of Technology, Program on Digital Open High-Resolution Systems, vol. 1, Issue 1, Jan. 1994, 265 pages. Hecht, "Embedded Data Glyph Technology for Hardcopy Digital Documents," SPIE vol. 2717, Feb. 1994, pp. 341-352. Roberts, "Picture Coding Using Pseudorandom Noise," IRE Trans. on Information Theory, vol. 8, No. 2, Feb., 1962, pp. 145-154. Pitas et al., "Applying Signatures on Digital Images," IEEE Workshop on Nonlinear Image and Signal Processing, Neos Marmaras, Greece, pp. 460-463, Jun., 1995. Rindfray, "Towards an Equitable System for Access Control and Copyright Protection in Broadcast Image Services: The Equicrypt Approach," Intellectual Property Rights and New Technologies, Proc. of the Conference, R. Oldenbourgh Verlag Wein Munchen 1995, 12 pages. Choudhury, et al., "Copyright Protection for Electronic Publishing over Computer Networks," IEEE Network Magazine, Jun. 1994, 18 pages. Moller, et al., "Rechnergestutzte Steganographie: Wie sie Funktioniert und warum folglich jede Reglementierung von Verschlusselung unsinnig ist," DuD, Datenschutz und Datensicherung, 18/6 (1994) 318-326. Pennebaker et al., JPEG Still Image Data Compression Standard, Chapter 3, "Aspects of the Human Visual System," pp. 2 3-27, 1993, Van Nostrand Reinhold, New York. Castro et al., "Registration of Translated and Rotated Images Using Finite Fourier Transforms," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. PAMI-9, No. 5, Sep. 1987, pp. 700-703. Weber et al., "Correlative Image Registration," Seminars in Nuclear Medicine, vol. XXIV, No. 4, Oct., 1994, pp. 311-323. Toga et al., "Registration Revisited," Journal of Neuroscience Methods, 48 (1993), pp. 1-13. Sheng et al., "Experiments on Pattern Recognition Using Invariant Fourier-Mellin Descriptors," Journal of Optical Society of America, vol. 3, No. 6, Jun., 1986, pp. 771-776. Kurak et al., "A Cautionary Note On Image Downgrading," 1992 IEEE, pp. 153-159. Wagner, "Fingerprinting," 1983 IEEE, pp. 18-22. Sandford II, et al., "The Data Embedding Method," SPIE vol. 2615, Oct. 23, 1995, pp. 226-259. "Copyright Protection for Digital Images, Digital Fingerprinting from FBI," Highwater FBI brochure, 1995, 4 pages. "High Water FBI Limited Presentation Image Copyright Protection Software," FBI Ltd brochure, Jul., 1995, 17 pages. Boland et al, "Watermarking Digital Images for Copyright Protection," Fifth International Conference on Image Processing and its Applications, Conference Date Jul. 4-6, 1995, Conf. Publ. No. 410, pp. 326-330. Clarke, "Invisible Code Tags Electronic Images," Electronic Engineering Times, Jun. 12, 1995, n. 852, p. 42. "The Copyright Can of Worms Opened Up By The New Electronic Media," Computergram Internations, pCGN07170006, Jul. 17, 1995 and "The Copyright Can of Worms Opened Up By The New Electronic Media--2," Computergram Internations, pCGN07210008, Jul. 21, 1995, 3 pages total. "Access Control and COpyright Protection for Images, WorkPackage 1: Access Control and Copyright Protection for Images Need Evaluation," Jun., 1995, 21 pages. "Access Control and COpyright Protection for Images, Conditional Access and Copyright Protection Based on the Use of Trusted Third Parties," 1995, 43 pages. Luc, "Analysis of Spread Spectrum System Parameters for Design for Hidden Transmission," Radioengineering, vol. 4, No. 2, Jun. 1995, pp. 26-29. Macq, "Cryptology for Digital TV Broadcasting," Proceedings of the IEEE, vol. 83, No. 6, Jun. 1995, pp. 944-957. Caronni, "Assuring Ownership Rights for Digital Images," Published in the Proceedings of `Reliable IT Systems`VIS '95, HH. Bruggemann and W. Gerhardt-Hackl (Ed.), Vieweg Publishing Company, Germany, 1995, Jun. 14, 1994, 10 pages. Tirkel et al, "Electronic Water Mark," DICTA-93, Macquarie University, Sydney, Australia, Dec., 1993, pp. 666-673. Koch et al., "Copyright Protection for Multimedia Data," Fraunhofer Institute for Computer Graphics, Dec. 16, 1994, 15 pages. "Access Control and COpyright Protection for Images, WorkPackage 8: Watermarking," Jun. 30, 1995, 46 pages. "Access Control and COpyright Protection for Images, WorkPackage 3: Evaluation of Existing Systems," Apr. 19, 1995, 68 pages. Boneh, "Collusion-Secure Fingerprinting for Digital Data," Department of Computer Science, Princeton University, 1995, 31 pages. Friedman, "The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image," IEEE Transactions on Consumer Electronics, vol. 39, No. 4, Nov., 1993, pp. 905-910. "Cyphertech Systems: Introduces Digital Encoding Device to Prevent TV Piracy," Hollywood Reporter, Oct. 20, 1993, p. 23. "NAB--Cypertech Starts Anti-Piracy Broadcast Tests," Newsbytes, NEW03230023, Mar. 23, 1994. Humphrey, "Stamping Out Crime," Hollywood Reporter, Jan. 26, 1994, p. S48. Koch et al., "Toward Robust and Hidden Image Copyright Labeling," Proc. of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, Jun. 20-22, 1995, 4 pages. Matsui et al., "Video-Steganography: How to Secretly Embed a Signature in a Picture," IMA Intellectual Property Project Proceedings, Jan. 1994, vol. 1, Issue 1, pp. 187-205. Tanaka et al., "Embedding Secret Information Into a Dithered Multi-Level Image," Proc. IEEE Military Comm. Conf., Sep. 1990, pp. 216-220. Tanaka et al., "New Integrated Coding Schemes for Computer-Aided Facsimile," Proc. IEEE Int'l Conf. on Sys. Integration, Apr. 1990, pp. 275-281. Schreiber et al., "A Compatible High-Definition Television System Using the Noise-Margin Method of Hiding Enhancement Information," SMPTE Journal, Dec. 1989, pp. 873-879. Short, "Steps Toward Unmasking Secure Communications," International Journal of Bifurcation and Chaos, vol. 4, No. 4, 1994, pp. 959-977. Tanaka, "Embedding the Attribute Information Into a Dithered Image," Systems and Computers in Japan, vol. 21, No. 7, 1990, pp. 43-50. Nakamura et al., "A Unified Coding Method of Dithered Image and Text Data Using Micropatterns," Electronics and Communications in Japan, Part 1, vol. 72, No. 4, 1989, pp. 50-56. Simmons, "Subliminal Channels; Past and Present," ETT, vol. 5, No. 4, Jul.-Aug. 1994, pp. 45-59. Nakamura et al., "A Unified Coding Method of Image and Text Data Using Discrete Orthogonal Transform," Systems and Computers in Japan, vol. 21, No. 3, 1990, pp. 87-92. Tanaka et al., "A Visual Retrieval System with Private Information for Image Database," Proceeding International Conferece on DSP Applications and Technology, Oct. 1991, pp. 415-421. Sapwater et al., "Electronic Copyright Protection," Photo>Electronic Imaging, vol. 37, No. 6, 1994, pp. 16-21. JPEG Group's JPEG Software (release 4), ftp.csua.berekeley.edu/pub/cypherpunks/applications/jsteg/jpec.announcement.gz, Jun. 7, 1993, 2 pages. Brown, "S-Tools for Windows, Verizon 1.00, .COPYRGT.1994 Andy Brown, What is Steganography," Internet reference, Mar. 6, 1994, 6 pages. shaggy@phantom.com, "Hide and Seek v.4.0," Internet reference, Apr. 10, 1994, 3 pages. Wise, "The History of Copyright, Photographers' Rights Span Three Centuries," Photo>Electronic Imaging, vol. 37, No. 6, 1994. Kassam, Signal Detection in Non-Gaussian Noise, Dowden & Culver, 1988, pp. 1-96. Brassil et al., Electronic Marking and Identification Techniques to Discourage Document Copying, Proceedings of INFOCOM '96 Conference on Computer, IEEE Commun. Soc Conference, Jun. 12-16, 1994, pp. 1278-1287. Jain, "Imaging Coding Via a Nearest Neighbors Image Model," IEEE Transactions on Communications, vol. COM-23, No. 3, Mar. 1975, pp. 318-331. Arthur, "Digital Fingerprints Protect Artwork," New Scientist, Nov. 12, 1994, p. 24. Matthews, "When Seeing is Not Believing," New Scientist, Oct. 16, 1993, pp. 13-15. Bender et al., "Techniques for Data Hiding," Massachusetts Institute of Technology, Media Laboratory, Jan. 1995, 10 pages. Walton, "Image Authentication for a Slippery New Age," Dr. Dobb's Journal, Apr. 1995, pp. 18-26, 82-87. Port, "Halting Highway Robbery on the Internet," Business Week, Oct. 17, 1994, p. 212. "Foiling Card Forgers With Magnetic `Noise, `" Wall Street Journal, Feb. 8, 1994. Fitzgerald, "Invisible Digital Copyright ID," Editor & Publisher, Jun. 25, 1994, p. 62. van Schyndel et al., "A Digital Watermark," IEEE International Conference on Image Processing, Nov. 13-16, 1994, pp. 86-90. Komatsu et al., "A Proposal on Digital Watermark in Document Image Communication and Its Application to Realizing a Signature," Electronics and Communications in Japan, Part 1, vol. 73, No. 5, 1990, pp. 22-33. Schneier, "Digital Signatures, Cryptographic Algorithms Can Create Nonforgeable Signatures for Electronic Documents, Making Them Valid Legal Instruments" Byte, Nov. 1993, pp. 309-312. Komatsu et al., "Authentication System Using Concealed Image in Telematics," Memoirs of the School of Science & Engineering, Waseda Univ., No. 52, 1988, pp. 45-60. Machado, "Announcing Stego 1.0a2, The First Steganography Tool for the Macintosh," Internet reference, No. 28, 1993, 3 pages. Arachelian, "White Noise Storm" Apr. 11, 1994, Internet reference, 13 pages. Dautzenberg, "Watermarking Images," Department of Microelectronics and Electrical Engineering, Trinity College Dublin, 47 pages. Oct. 1994. Horak, "From `Steganographia` to Subliminal Communication," "Communications and Multimedia Security," Sep., 1995, pp. 205-213. Bors et al., "Image Watermarking Using DCT Domain Constraints," Proc. Int. Conf. on Image Processing, Sep. 16, 1996, vol. 3, pp. 231-234. Bors et al., "Embedding Parametric Digital Signatures in Images," Proc. of EUSIPCO-96, Eighth European Signal Proc. Conf., Sep. 10, 1996, vol. 3, pp. 1701-1704. Schneider et al., A Robust Content Based Digital Sig Proc. Int. Conf. on Image Processing, Sep. 16-19, 1996, Part vol. 3, pp. 227-230. Cox et al., "Secure Spread Spectrum Watermarking for Images, Audio and Video," Proc. Int. Conf. on Image Processing, Sep. 16-19, 1996, Part vol. 3, pp. 243-246. Hsu, "Hidden Signatures in Images," Proc. Int. Conf. on Image Processing, Sep. 16-19, 1996, Part vol. 3, pp. 223-226. Swanson et al., "Robust Data Hiding in Images," 1996 IEEE Digital Signal Processing Workshop, Loen, Norway, Sep. 1996, pp. 37-40. Puate et al., "Using Fractal Compression Scheme to Embed a Digital Signature Into An Image," 1997, Proc. SPIE--Int. Soc. Opt. Eng., vol. 2915, pp. 108-118. McKenzie, M., "Copyright Protection: Understanding Your Options," Seybold Report on Internet Publishing, vol. 1, No. 4, Dec., 1996, pp. 6-14. Cox et al., A Secure, Robust Watermark for Multimedia, Information Hiding, First Int. Workshop Proc. May 30-Jun. 1, 1996, pp. 185-206. Ogihara et al., "Data Embedding Into Pictorial Images with Less Distortion Using Discrete Cosine Transform," Aug. 25-29, 1996, Proc. 13thInt. Conf. on Pattern Recognition, Part vol. 2, pp. 675-679. O'Gorman et al., "Photo-Image Authentication by Pattern Recognition and Cryptography," Aug. 25-29, 1996, Proc. of the 13thInternational Conf. on Pattern Recognition, Part vol. 3, pp. 949-953. Tirkel, et al "Image Watermarking-A Spread Spectrum Application" Proc. IEEE, ISSSTA '96, Mainz, Germany, Sep. 22-25, 1996, vol. II, pp. 785-789. Langelaar et al., "Copyright Protection for Multimedia Data based on Labeling Techniques," Jun. 1996, 9 pages. Wolfgang et al., "A Watermark for Digital Images," preprint obtained Jul. 12, 1996. Proc. IEEE Int'l Conference on Image Processing, Sep. 16-19, 1996, 4 pages. Smith et al., "Modulation and Information Hiding in Images," presented at Workshop on Information Hiding, May 30-Jun. 1, 1996, Isaac Newton Institute, Cambridge, U.K., 16, pages. Berghel et al., "Protecting Ownership Rights Through Digital Watermaking," Computer, pp. 101-103, Jul. 1996. Zhu et al., "Transparent Robust Authentication and Distortion Measurement Technique for Images," 1996 IEEE Digital Signal Processing Workshop, Loen, Norway, Sep. 1996, pp. 45-48. Swanson et al., Transparent Robust Image Watermarking, Proc. of the 1996 IEEE Int. Conf. on Image Processing, Lausanne, Switzerland, Sep. 1996, pp. 211-214. Macq, "Cryptology for Digital TV Broadcasting," Proceedings of the IEEE, vol. 83, No. 6, Jun. 1995, pp. 944-957. "Steganography," Intellectual Property and the National Information Infrastructure The Report of the Working Group on Intellectual Property Rights, Sep. 1995, pp. 212-213. Koch et al., "Copyright Protection for Multimedia Data," Proc. of the International Conference on Digital Media and Electronic Publishing, Dec. 6-8, 1994, Leeds, U.K., 15 pages. Proudler, Graeme J., "Authentication and Display of Signatures on Electronic Documents," 2244 Research Disclosure, Feb., 1994, No. 358, Emsworth, GB, 1 page. Szepanski, "Compatibility Problems in Add-On Data Transmission for TV-Channels," 2d Symp. and Tech. Exh. On Electromagnetic Compatibility, Jun. 28, 1977, pp. 263-268. Szepanski, "Optimization of Add-On Signals by Means of a Modified Training Algorithm for Linear Classifiers," IEEE Int'l Symp. On Info. Theory, Oct. 10, 1977, pp. 27-28. Szepanski, "Binary Data Transmission Over Video Channels with Very Low Amplitude Data Signals," Fernseh- und Kino-Technik, vol. 32, No. 7, Jul., 1978, pp. 251-256. (German Text with full English translation.). Szepanski, Additive Binary Data Transmission for Video Signals, Conference of the Communciations Engineering Society, 1980, NTG Technical Reports, vol. 74, pp. 343-351. (German text with full English Translation.). Carronni, "Assuring Ownership Rights for Digital Images," Published in the Proceedings of `Reliable IT Systems`VIS '95, HH. Bruggemann and W. Gerhardt-Hackl (Ed.), Vieweg Publishing Company, Germany, 1995, Jun. 14, 1994, 10 pages. (Originally published as an ETH (Zurich) Technical Report, "Ermitteln Unauthorisierter Verteiler von Maschineenlesbaren Daten," 8/93. Franz et al., "Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography are Nonsense, at Best," Information Hiding, First Int. Workshop Proc, May 30-Jun. 1, 1996, pp. 7-21, (a counterpart was published in German by Steffen Moller et al in 1994). Gerzon, M.A., et al, "A High-Rate Buried-Data Channel for Audio CD," Journal of the Audio Engineering Society, vol. 43, No. 1-2, pp. 3-22, Jan.-Feb., 1995. Oomen, A. et al, "A Variable-Bit Rate Buried-Data Channel for Compact Disc," Journal of the Audio Engineering Society vol. 43, No. 1-2, pp. 23-28, Jan.-Feb., 1995. Bender et al., "Techniques for Data Hiding," Massachusetts Institute of Technology, Media Laboratory, Draft Preprint, Apr. 13, 1995, 10 pages. Cha et al., "A Solution to the On-Line Image Downgrading Problem," Proc. 11thAnnual Computer Security Applications Conf., Dec. 11, 1995, pp. 108-112. Braudaway et al., "Protecting Publicly-Available Images with a Visible Image Watermark," SPIE vol. 2659, Feb. 1, 1996, pp. 126-133. Zhao, "A WWW Service to Embed and Prove Digital Copyright Watermarks," In Proc. of the European Conf. on Multimedia Applications, Services and Techniques, Louvain-La-Neuve, Belgium, May 1996, 14 pages. Anderson, "Stretching the Limits of Steganography," Information Hiding, First International Workshop Proc., May 30-Jun. 1, 1996, pp. 39-48. Aura, "Practical Invisibility in Digital Communication," Information Hiding, First Int. Workshop Proc. May 30-Jun. 1, 1996, pp. 265-278. Stone, Analysis of Attacks on Image Watermarks with Randomized Coefficients, May 17, 1996, pp. 1-27. Bruckstein, A.M.; Richardson, T.J., A holographic transform domain image watermarking method, Circuits, Systems, and Signal Processing vol. 17, No. 3 pp. 361-389, 1998. This paper includes an appendix containing an internal memo of Bell Labs, which according to the authors of the paper, was dated Sep. 1994. id training means includes a processor for calculating said parameters from said plurality of said templates and kernels, said parameters being intervals of values that relate to an image characteristic of said templates. 4. The system of claim 1 wherein said training means includes a kernel selector and a template selector, said kernel and templates selectors being configured to select said kernels and said templates, respectively. 5. The system of claim 4 wherein said kernel selector of said training means is configured to select one of universal kernels and customized kernels, said universal kernels being independent of said templates, said customized kernels being dependent on said templates. 6. The system of claim 4 wherein said template selector of said training means is configured to select one of kernel-dependent templates and kernel-independent templates. 7. The system of claim 1 wherein said detecting means includes a linear match filter that operates to perform a convolution on said input image to produce projection values, said projection values being used to determine whether a particular portion of said input image is a template match candidate, said template match candidate being a portion of said input image that is preliminarily determined to correlate with one of said templates of said restricted-document image. 8. The system of claim 7 wherein said detecting means further includes a thresholder, said thresholder being configured to compare an image characteristic value of said particular portion of said input image with a corresponding parameter derived by said training means, said image characteristic value being related to said projection values produced by said linear match filter. 9. The system of claim 1 wherein said host apparatus being one of a copy machine, a scanner, a printer and a computer, said input image being a scanned image of a document generated by said host apparatus. 10. A method of detecting counterfeiting activities comprising steps of: receiving an input image; projecting portions of said input image with predefined kernels to produce projection values relating to at least one image characteristic, said predefined kernels having a rotation-invariant convolution property; thresholding said projection values with predefined values that relate to said at least one image characteristic of a restricted-document image, so as to select template match candidates from said portions of said input image, said template match candidates being image portions of said input image that resemble at least one of templates of said restricted-document image; comparing relative positions of said template match candidates in said input image with relative positions of corresponding templates in said restricted-document image to determine whether said input image is a duplicate of said restricted-document image; and transmitting a signal when a determination is made that said input image is a duplicate of said restricted-document image. 11. The method of claim 10 further comprising steps of: selecting said predefined kernels having said rotation-invariant convolution property; selecting said templates extracted from said restricted-document image; and computing said predefined values from said kernels and said templates. 12. The method of claim 11 wherein said step of selecting said predefined kernels includes a step of computing universal kernels, said universal kernels being independent of said templates. 13. The method of claim 11 wherein said step of selecting said templates includes a step of extracting said templates from said restricted-document image that are dependent on said predefined kernels. 14. The method of claim 11 wherein said step of computing said predefined values includes a step of defining an interval of values that relate to said at least one image characteristic of said templates of said restricted document. 15. The method of claim 10 further comprising a step of execut ing a preventive action in response to said signal in order to prevent counterfeiting of said restricted document. 16. A method of detecting counterfeiting activities comprising steps of: deriving parameters from a plurality of templates and a plurality of kernels, said templates being selected portions of a restricted document that is to be protected from counterfeiting, said kernels having a rotation-invariant convolution characteristic; and determining whether an input image closely resembles said restricted document by correlating portions of said input image with said templates of said restricted document using said kernels to derive projection values, including comparing said projection values with said parameters, said comparison of said projection values with said parameters being a factor for said determination of whether said input image closely resembles said restricted document, said determining including geometrically comparing relative positions of template match candidates in said input image with relative positions of said templates in said restricted document, each of said template match candidates being a particular portion of said input image that is preliminarily determined to correlate with one of said templates of said restricted document. 17. The method of claim 16 wherein said step of deriving said parameters includes a step of defining at least one interval of values that relates to an image characteristic of said templates of said restricted document. 18. The method of claim 17 wherein said step of defining said at least one interval is a step of defining said values so as to relate to color, intensity and angular orientation. 19. The method of claim 17 wherein said step of comparing said projection values includes a step of thresholding an image characteristic value with said interval, said image characteristic value being related to said projection values derived from said portions of said input image. 20. The method of claim 16 further comprising steps of: selecting said kernels that are used in said step of deriving said parameters; and selecting said templates that are used with said kernels in said step of deriving said parameters. 21. The method of claim 20 wherein said step of selecting said kernels includes a step of computing said kernels of a particular type selected from a group consisting of universal kernel and customized kernel, said universal kernels being independent of said templates, said customized kernels being dependent on said templates. 22. The method of claim 20 wherein said step of selecting said templates includes a step of extracting said templates from said restricted document, said templates being of a type selected from a group consisting of kernel-dependent templates and kernel-independent templates. 23. The method of claim 16 further comprising a step of transmitting a signal to a destination in response to a determination that said input image closely resembles said restricted document in order to prevent counterfeiting of said restricted document. 24. The method of claim 16 wherein said step of determining whether said input image closely resembles said restricted document is executed within an apparatus, said apparatus being one of a copy machine, a scanner, a printer and a computer. ed to group candidate object of interest pixels together into groups which are compared to blob parameters to identify candidate objects of interest which correspond to cells or other structures relevant to medical diagnosis of the biological specimen. The location coordinates of the objects of interest are stored and additional images of the candidate cell objects are acquired at high magnification. The high magnification images are analyzed in the same manner as the low magnification images to confirm the candidate objects of interest which are objects of interest. A high magnification image of each confirmed object of interest is stored for later review and evaluation by a pathologist. substantially perpendicular to the path of said optical signal. 8. An optical apparatus with arbitrarily low polarization mode dispersion, the optical apparatus comprising: one or more optical devices; and a tunable module in optical communication with said one or more optical devices, said tunable module comprising at least two optical elements, wherein at least one of said optical elements is a movable element such that an optical path length of an optical signal traversing through said module can be varied. 9. The optical apparatus of claim 8 wherein said one or more optical devices comprise an optical isolator. 10. The optical apparatus of claim 8 wherein said one or more optical devices comprise an optical circulator. 11. The optical apparatus of claim 8 where said one or more optical elements comprise birefrigent materials. 12. The optical apparatus of claim 11 wherein said birefrigent materials include calcite, rutile, lithium niobate, and YVO4based crystals. 13. The optical apparatus of claim 8 wherein said at least two optical elements are adjacent to each other. 14. The optical apparatus of claim 8 wherein said movable element is tapered. 15. The optical apparatus of claim 8 wherein said movable element is configured to have a gradient of index of refraction along a direction substantially perpendicular to the path of said optical signal. 16. The optical apparatus of claim 15 wherein said movable element comprises a stack of birefrigent materials with varying indices of refraction along a direction perpendicular to the path of said optical signal. 17. An optical apparatus for optical fibers comprising: a Faraday rotator disposed between a first polarizer and a second polarizer along an optical path, wherein said first polarizer and said second polarizer are arranged such that any light traveling from said second polarizer to said first polarizer will be effectively blocked; and a tunable module disposed in said optical path on either side of said Faraday rotator, comprising at least two optical elements, wherein at least one of said optical elements is a movable element such that an optical path length of an optical signal traversing through said module can be varied. 18. The optical apparatus of claim 17 wherein said first polarizer comprises a birefrigent material selected from the group consisting of calcite, rutile, lithium niobate, and YVO4based crystals. 19. The optical apparatus of claim 17 wherein said second polarizer comprises a birefrigent material selected from the group consisting of calcite, rutile, lithium niobate, and YVO4based crystals. 20. The optical apparatus of claim 17 wherein said one or more optical elements comprise one or more birefrigent materials selected from the group consisting of calcite, rutile, lithium niobate, and YVO4based crystals. 21. The optical apparatus of claim 17 wherein said first polarizer, said second polarizer, and said tunable module are formed from the same birefrigent material selected from the group consisting of calcite, rutile, lithium niobate, and YVO4based crystals. 22. The optical apparatus of claim 17 wherein said at least two optical elements are adjacent to each other. 23. The optical apparatus of claim 17 wherein said movable element is tapered. 24. The optical apparatus of claim 17 wherein said movable element is configured to have a gradient of index of refraction along a direction substantially perpendicular to the path of said optical signal. 25. The optical apparatus of claim 24 wherein said movable element comprises a stack of birefrigent materials with varying indices of refraction along a direction substantially perpendicular to the path of said optical signal. 26. The optical apparatus of claim 17 wherein said tunable module is disposed on the right side of said Faraday rotator. 27. The optical apparatus of claim 17 wherein said tunable module is disposed on the left side of said Far aday rotator. 28. The optical apparatus of claim 17 wherein said second polarizer is disposed between said Faraday rotator and said tunable module. 29. The optical apparatus of claim 17 wherein said first polarizer is disposed between said tunable module and said Faraday rotator. 30. The optical apparatus of claim 17 wherein said Faraday rotator is a 45° Faraday rotator, and wherein said first polarizer and said second polarizer are birefrigent polarizers, arranged such that an optical axis of said second polarizer is oriented at 45° relative to an optical axis of said first polarizer. 31. The optical apparatus of claim 17 is further disposed between a first optical transmission assembly and a second optical transmission assembly. 32. The optical apparatus of claim 31 wherein said first optical transmission assembly comprises an optical fiber and a GRIN lens. 33. The optical apparatus of claim 31 wherein said second optical transmission assembly comprises an optical fiber and a GRIN lens. 34. An optical apparatus for optical fibers comprising: a) a Faraday rotator disposed between a first polarizer and a second polarizer along an optical path, wherein said first polarizer and said second polarizer are arranged such that any light traveling from said second polarizer to said first polarizer will be effectively blocked, and wherein at least one of said polarizers is a movable polarizer such that an optical path length of an optical signal traversing through said movable polarizer can be varied; and b) a compensation plate disposed in said optical path on either side of said Faraday rotator. 35. The optical apparatus of claim 34 wherein said first polarizer comprises a birefrigent material selected from the group consisting of calcite, rutile, lithium niobate, and YVO4based crystals. 36. The optical apparatus of claim 34 wherein said first polarizer is tapered. 37. The optical apparatus of claim 34 wherein said second polarizer comprises a birefrigent material selected from the group consisting of calcite, rutile, lithium niobate, and YVO4based crystals. 38. The optical apparatus of claim 34 wherein said second polarizer is tapered. 39. The optical apparatus of claim 34 wherein said compensation plate comprises a birefrigent material selected from the group consisting of calcite, rutile, lithium niobate, and YVO4based crystals. 40. The optical apparatus of claim 34 wherein said first polarizer, said second polarizer, and said compensation plate are formed from the same birefrigent material selected from the group consisting of calcite, rutile, lithium niobate, and YVO4based crystals. 41. The optical apparatus of claim 34 wherein said compensation plate has a predetermined thickness along the path of said optical signal. 42. A method for tuning an optical apparatus, comprising: a) disposing an optical device in the path of an optical signal; b) disposing a tunable module comprising at least two optical elements in the path of said optical signal, wherein at least one of said optical elements is a movable element such that an optical path length of said optical signal traversing through said module can be varied; and c) adjusting the position of said movable element so to vary said optical path length of said optical signal, while monitoring a characteristic of said optical signal using a detection means, until said characteristic falls within a predetermined range, wherein said characteristic of said optical signal is polarization mode dispersion. 43. The method of claim 42 wherein said optical device is an optical isolator. 44. The method of claim 42 wherein said optical device is an optical circulator. 45. The method of claim 42 wherein said one or more optical elements comprise birefrigent materials. 46. The method of claim 45 wherein said birefrigent materials include calcite, rutile, lithium niobate, and YVO4based crystals. 47. The method of claim 42 wherei
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.