Optics and Photonics in Image Encryption, Anti-Counterfeiting, and Security Systems
The need for security and verification systems are diverse and there are many applications. One example is credit card fraud which is a serious problem facing many banks, businesses, and consumers. Reliable low cost systems are also needed to combat other types of fraud and counterfeiting. Counterfeit parts such as computer chips, machine tools, etc. are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly simple to reproduce pictures, logos, symbols, money bills, or patterns. Presently, credit cards and passports use holograms for security. The holograms are inspected by human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially available optical components. In practice, the holographic pattern can be easily acquired from a credit card (photographed or captured by a CCD camera) and then a new hologram synthesized.
KeywordsCredit Card Image Encryption Phase Mask Fourier Plane Input Plane
Unable to display preview. Download preview PDF.
- 1.B. Javidi, and J. L. Horner, “Optical pattern recognition for validation and security verification,” Optical Engineering 33 (1994).Google Scholar
- 2.B. Javidi, J. L. Horner, and J. F. Walkup, “An optical pattern recognition system for validation and security verification,” Optics and Photonics News 5 (1994).Google Scholar
- 3.B. Javidi, G. Zhang, and J. Li, “Experimental demonstration of the random phase encoding technique for image encryption and security verification,” Optical Engineering 35 (Sept. 1996).Google Scholar
- 5.B. Javidi, J. Li, and Q. Tang, “Optical implementation of neural networks for face recognition using a nonlinear joint transform correlator,” Applied Optics 34 (1995).Google Scholar
- 8.B. Javidi and J. Wang, “2-D image correlation using a distortion invariant filter based 1-D space integrating optical processor,” Optical Engineering 35 (Sept. 1996).Google Scholar
- 9.B. Javidi and J. L. Horner, eds., Real-time Optical Information Processing, Academic Press (1994).Google Scholar