Skip to main content

Optics and Photonics in Image Encryption, Anti-Counterfeiting, and Security Systems

  • Chapter
Applications of Photonic Technology 2
  • 38 Accesses

Abstract

The need for security and verification systems are diverse and there are many applications. One example is credit card fraud which is a serious problem facing many banks, businesses, and consumers. Reliable low cost systems are also needed to combat other types of fraud and counterfeiting. Counterfeit parts such as computer chips, machine tools, etc. are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly simple to reproduce pictures, logos, symbols, money bills, or patterns. Presently, credit cards and passports use holograms for security. The holograms are inspected by human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially available optical components. In practice, the holographic pattern can be easily acquired from a credit card (photographed or captured by a CCD camera) and then a new hologram synthesized.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. B. Javidi, and J. L. Horner, “Optical pattern recognition for validation and security verification,” Optical Engineering 33 (1994).

    Google Scholar 

  2. B. Javidi, J. L. Horner, and J. F. Walkup, “An optical pattern recognition system for validation and security verification,” Optics and Photonics News 5 (1994).

    Google Scholar 

  3. B. Javidi, G. Zhang, and J. Li, “Experimental demonstration of the random phase encoding technique for image encryption and security verification,” Optical Engineering 35 (Sept. 1996).

    Google Scholar 

  4. P. Refregier and B. Javidi, “Optical image encryption using input and fourier plane random phase encoding,” Optics Letters 20:767, (1995).

    Article  Google Scholar 

  5. B. Javidi, J. Li, and Q. Tang, “Optical implementation of neural networks for face recognition using a nonlinear joint transform correlator,” Applied Optics 34 (1995).

    Google Scholar 

  6. H. S. Li, Y. Qiao and D. Psaltis, “Optical network for real-time face recognition,” Applied Optics 32:5026 (1993).

    Article  Google Scholar 

  7. K. H. Fielding and J. L. Horner, “1-/binary joint transform correlator”, Optical Engineering 29:1081 (1990).

    Article  Google Scholar 

  8. B. Javidi and J. Wang, “2-D image correlation using a distortion invariant filter based 1-D space integrating optical processor,” Optical Engineering 35 (Sept. 1996).

    Google Scholar 

  9. B. Javidi and J. L. Horner, eds., Real-time Optical Information Processing, Academic Press (1994).

    Google Scholar 

  10. B. Javidi, “Nonlinear joint power spectrum based optical correlation,” Applied Optics 28: 2358 (1989).

    Article  Google Scholar 

  11. B. Javidi and J. L. Horner, “Single SLM joint transform correlator,” Applied Optics 28:1027 (1989).

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer Science+Business Media New York

About this chapter

Cite this chapter

Javidi, B. (1997). Optics and Photonics in Image Encryption, Anti-Counterfeiting, and Security Systems. In: Lampropoulos, G.A., Lessard, R.A. (eds) Applications of Photonic Technology 2. Springer, Boston, MA. https://doi.org/10.1007/978-1-4757-9250-8_78

Download citation

  • DOI: https://doi.org/10.1007/978-1-4757-9250-8_78

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4757-9252-2

  • Online ISBN: 978-1-4757-9250-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics