Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Javidi B and Horner J. (1994). “Optical pattern recognition system for security verification.” Opt. Eng., 33:6.
Refregier P and Javidi B. (1995). “Optical image encryption using input and Fourier plane random phase encoding.” Opt. Lett., 20(7):767–769.
Javidi B. (2003). “Real-time remote identification and verification of objects using optical ID tags.” Opt. Eng., 42:8.
Javidi B. (1997). “Encrypting information with optical technologies.” Phys. Today, 50:3.
Matoba O and Javidi B. (2000). “Encrypted optical memory systems based on multidimensional keys for secure data storage and communications.” IEEE Circuits Devices Magazine, 16(5):8–15.
Rosen J and Javidi B. (2001). “Optical encryption using embedded images.” Appl. Opt., 40(20):3346–3351.
Javidi B and Nomura T. (2000). “Polarization encoding for optical security systems.” Opt. Eng., 39:2439–2443.
Goudail F, Bollaro F, Refregier P, and Javidi B. (1998). “Influence of perturbation in a double phase encoding system.” J. Opt. Soc. Am. A., (JOSA A), 15:2629–2638.
Goodman JW. (1996). Introduction to Fourier Optics. McGraw-Hill.
Javidi B., ed. (2002). Image Recognition and Classification: Algorithms, Systems, and Applications. Marcel-Dekker, New York.
Hong S and Javidi B. (2002). “Optimum nonlinear composite filter for distortion tolerant pattern recognition.” App. Opti., 41:2172–2178.
Chan F, Towghi N, Pan L, and Javidi B. (2000). “Distortion tolerant minimum mean squared error filter for detecting noisy targets in environmental degradations.” Opti. Eng., 39:2092–2100.
Towghi N, Javidi B, and Li J. (1998). “Generalized optimum receiver for pattern recognition with multiplicative, additive, and nonoverlapping noise.” J. Opt.l Soc. Am. A., (JOSA A), 15(6):1557–1565.
Yamaguchi I and Zhang T. (1997). “Phase-shifting digital holography.” Opt. Lett., 22(16):1268–1270.
Matoba O and Javidi B. (2002). “Optical retrieval of encrypted digital holograms for secure real-time display.” Opt. Lett., 27(5):321–323.
Matoba O, Naughton T, Frauel Y, Bertaux N, and Javidi B. (2002). “Real-time three-dimensional object reconstruction using a phase-encoded digital hologram.” Appl. Opt., 41(29):6187–6192.
Frauel Y and Javidi B. (2001). “Neural networks for three dimensional object recognition based on digital holography.” Opt. Lett., 26(9):1478–1480.
Javidi B and Tajahuerce E. (2000). “Three-dimensional image recognition using digital holography.” Opt. Lett., 25.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
Javidi, B. (2006). Real-time Remote Identification and Verification of Objects Using Optical ID Tags. In: Javidi, B. (eds) Optical Imaging Sensors and Systems for Homeland Security Applications. Advanced Sciences and Technologies for Security Applications, vol 2. Springer, New York, NY. https://doi.org/10.1007/0-387-28001-4_9
Download citation
DOI: https://doi.org/10.1007/0-387-28001-4_9
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-26170-6
Online ISBN: 978-0-387-28001-1
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)