SlideShare a Scribd company logo
1 of 9
Holography through walls using
Wi-fi to overcome hostage crisis
[ Computer Graphics ]
Holography
Definition:
Holography is a photographic technique which records the light
scattered from the object and then creates a 3D image of the object using
the recorded information.
Holograms can be created by recording light scattered through objects using
Sound waves, X-rays, gamma rays, neutrons and cold atoms but use of Wi-fi
radiation is quite an elusive area.
Holography of Wi-fi Radiations
On 5th May 2017, a research paper was published by German
researchers Philipp Holl and Friedemann Reinhard which says that
holography can be also performed by bandwidth that is used for Wi-fi.
That means radiations from Wi-fi routers stores information
regarding 3D images of its surroundings. This information can be used
to create the 3D hologram.
Paper on Holography using Wi-fi .pdf
Holography of Wi-fi Radiations
Process:
(1) When the radiations generated by Wi-fi router propagates, the radiation
have data about the object at its wave front. Group of such radiations can
be used to create the 2D image of the object.
(2) Analysing the same wave front at different point of time can be used to
generate the 3D hologram.
Holography of Wi-fi Radiations
According to Philipp Holl, The Process can be implemented using
arrays of antennas or drones. Large number of data receiving antennas
make the 3D reconstruction process faster and easier. This way a 3D
hologram of objects within a building can be generated in 20 to 30 seconds.
The video here may help us understand a few points:
Applications
The method can be useful for many purposes like ..
(1) Analysing presence and movement of living beings or object for
security enforcement
(2) Creating responsive holograms to understand properties of objects
(3) Understanding the propagation of Wi-fi signals to make its usage
more effective
Security Enforcement
Brett Scharringhausen, the technology scout with Central Command
[ The group which oversees US military operations for the Department
of Defence in 20 countries located throughout the Middle East, northern
Africa, and parts of Asia. ] has taken interest in this holography technology.
Mr. Scharringhausen wants to share the technology with US armed
forces to enforce security.
Our Idea .. !!
The 3D hologram which is generated after the data processing can
only be seen on the devices having specific software. If we are able to show
the same hologram using glasses then it can be quite useful for armed forces
to deal the situations like hostage crisis, terrorist attacks, etc.
To implement the idea the hologram should be modified according to
viewer’s perspective. Directions, accuracy and processing speed is still a big
challenge.
Dependencies
(1) Looking at the current scenario, the idea is not much economical
(2) Adjusting viewer’s perspective is also a hurdle.
(3) Time taken for processing cannot show real time image.

More Related Content

Similar to Holography through walls using Wi-fi

Introduction to holography
Introduction to holographyIntroduction to holography
Introduction to holographyVaishali Rathore
 
Holograpic technology
Holograpic technologyHolograpic technology
Holograpic technologyRamesh Reddy
 
An Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking TechniqueAn Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking TechniqueCSCJournals
 
PPT on 3D Holographic Projection Technology ( Hologram)
PPT on 3D Holographic Projection Technology ( Hologram)PPT on 3D Holographic Projection Technology ( Hologram)
PPT on 3D Holographic Projection Technology ( Hologram)SafwanSadi
 
3D Display: A Multi-dimensional view of the future
3D Display: A Multi-dimensional view of the future3D Display: A Multi-dimensional view of the future
3D Display: A Multi-dimensional view of the futureCIO Look Magazine
 
Seeing Through Walls Using Wi-Vi
Seeing Through Walls Using Wi-ViSeeing Through Walls Using Wi-Vi
Seeing Through Walls Using Wi-ViIRJET Journal
 
Seminar report of 3D Holographic Projection Technology (Hologram).
Seminar report of 3D Holographic Projection Technology (Hologram).Seminar report of 3D Holographic Projection Technology (Hologram).
Seminar report of 3D Holographic Projection Technology (Hologram).SafwanSadi
 
SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...
SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...
SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...cscpconf
 
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...csandit
 
Are Drones our best friends?
Are Drones our best friends?Are Drones our best friends?
Are Drones our best friends?Codemotion
 
Holography and its applications in defence
Holography and  its applications in defenceHolography and  its applications in defence
Holography and its applications in defenceSiddhant Shirguppe
 
Seminar presentation
Seminar presentationSeminar presentation
Seminar presentationBrij Kishore
 

Similar to Holography through walls using Wi-fi (20)

Introduction to holography
Introduction to holographyIntroduction to holography
Introduction to holography
 
whatsapp.pptx
whatsapp.pptxwhatsapp.pptx
whatsapp.pptx
 
Holograpic technology
Holograpic technologyHolograpic technology
Holograpic technology
 
An Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking TechniqueAn Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking Technique
 
Holography
HolographyHolography
Holography
 
Hologram
Hologram Hologram
Hologram
 
PPT on 3D Holographic Projection Technology ( Hologram)
PPT on 3D Holographic Projection Technology ( Hologram)PPT on 3D Holographic Projection Technology ( Hologram)
PPT on 3D Holographic Projection Technology ( Hologram)
 
3D Display: A Multi-dimensional view of the future
3D Display: A Multi-dimensional view of the future3D Display: A Multi-dimensional view of the future
3D Display: A Multi-dimensional view of the future
 
Seeing Through Walls Using Wi-Vi
Seeing Through Walls Using Wi-ViSeeing Through Walls Using Wi-Vi
Seeing Through Walls Using Wi-Vi
 
Seminar report of 3D Holographic Projection Technology (Hologram).
Seminar report of 3D Holographic Projection Technology (Hologram).Seminar report of 3D Holographic Projection Technology (Hologram).
Seminar report of 3D Holographic Projection Technology (Hologram).
 
SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...
SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...
SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...
 
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
 
Holography and Virtual Reality
Holography and Virtual RealityHolography and Virtual Reality
Holography and Virtual Reality
 
Holographic
HolographicHolographic
Holographic
 
Recent technology in it
Recent technology in itRecent technology in it
Recent technology in it
 
Are Drones our best friends?
Are Drones our best friends?Are Drones our best friends?
Are Drones our best friends?
 
augmented_reality.ppt
augmented_reality.pptaugmented_reality.ppt
augmented_reality.ppt
 
Holography and its applications in defence
Holography and  its applications in defenceHolography and  its applications in defence
Holography and its applications in defence
 
Tele immersion
Tele immersionTele immersion
Tele immersion
 
Seminar presentation
Seminar presentationSeminar presentation
Seminar presentation
 

More from Keval Bhogayata

Message AUthentication Code
Message AUthentication CodeMessage AUthentication Code
Message AUthentication CodeKeval Bhogayata
 
Citation of Paper on "Troubleshooting software configurations"
Citation of Paper on "Troubleshooting software configurations"Citation of Paper on "Troubleshooting software configurations"
Citation of Paper on "Troubleshooting software configurations"Keval Bhogayata
 
Cryptolocker Ransomware Attack
Cryptolocker Ransomware AttackCryptolocker Ransomware Attack
Cryptolocker Ransomware AttackKeval Bhogayata
 
Insertion in singly linked list
Insertion in singly linked listInsertion in singly linked list
Insertion in singly linked listKeval Bhogayata
 
Recruitment Types & Process
Recruitment Types & ProcessRecruitment Types & Process
Recruitment Types & ProcessKeval Bhogayata
 
Banking process gujarati
Banking process   gujaratiBanking process   gujarati
Banking process gujaratiKeval Bhogayata
 

More from Keval Bhogayata (7)

Message AUthentication Code
Message AUthentication CodeMessage AUthentication Code
Message AUthentication Code
 
Citation of Paper on "Troubleshooting software configurations"
Citation of Paper on "Troubleshooting software configurations"Citation of Paper on "Troubleshooting software configurations"
Citation of Paper on "Troubleshooting software configurations"
 
Cryptolocker Ransomware Attack
Cryptolocker Ransomware AttackCryptolocker Ransomware Attack
Cryptolocker Ransomware Attack
 
Flow of Communication
Flow of CommunicationFlow of Communication
Flow of Communication
 
Insertion in singly linked list
Insertion in singly linked listInsertion in singly linked list
Insertion in singly linked list
 
Recruitment Types & Process
Recruitment Types & ProcessRecruitment Types & Process
Recruitment Types & Process
 
Banking process gujarati
Banking process   gujaratiBanking process   gujarati
Banking process gujarati
 

Recently uploaded

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Holography through walls using Wi-fi

  • 1. Holography through walls using Wi-fi to overcome hostage crisis [ Computer Graphics ]
  • 2. Holography Definition: Holography is a photographic technique which records the light scattered from the object and then creates a 3D image of the object using the recorded information. Holograms can be created by recording light scattered through objects using Sound waves, X-rays, gamma rays, neutrons and cold atoms but use of Wi-fi radiation is quite an elusive area.
  • 3. Holography of Wi-fi Radiations On 5th May 2017, a research paper was published by German researchers Philipp Holl and Friedemann Reinhard which says that holography can be also performed by bandwidth that is used for Wi-fi. That means radiations from Wi-fi routers stores information regarding 3D images of its surroundings. This information can be used to create the 3D hologram. Paper on Holography using Wi-fi .pdf
  • 4. Holography of Wi-fi Radiations Process: (1) When the radiations generated by Wi-fi router propagates, the radiation have data about the object at its wave front. Group of such radiations can be used to create the 2D image of the object. (2) Analysing the same wave front at different point of time can be used to generate the 3D hologram.
  • 5. Holography of Wi-fi Radiations According to Philipp Holl, The Process can be implemented using arrays of antennas or drones. Large number of data receiving antennas make the 3D reconstruction process faster and easier. This way a 3D hologram of objects within a building can be generated in 20 to 30 seconds. The video here may help us understand a few points:
  • 6. Applications The method can be useful for many purposes like .. (1) Analysing presence and movement of living beings or object for security enforcement (2) Creating responsive holograms to understand properties of objects (3) Understanding the propagation of Wi-fi signals to make its usage more effective
  • 7. Security Enforcement Brett Scharringhausen, the technology scout with Central Command [ The group which oversees US military operations for the Department of Defence in 20 countries located throughout the Middle East, northern Africa, and parts of Asia. ] has taken interest in this holography technology. Mr. Scharringhausen wants to share the technology with US armed forces to enforce security.
  • 8. Our Idea .. !! The 3D hologram which is generated after the data processing can only be seen on the devices having specific software. If we are able to show the same hologram using glasses then it can be quite useful for armed forces to deal the situations like hostage crisis, terrorist attacks, etc. To implement the idea the hologram should be modified according to viewer’s perspective. Directions, accuracy and processing speed is still a big challenge.
  • 9. Dependencies (1) Looking at the current scenario, the idea is not much economical (2) Adjusting viewer’s perspective is also a hurdle. (3) Time taken for processing cannot show real time image.