Abstract
The need for security and verification systems are diverse and there are many applications. One example is credit card fraud which is a serious problem facing many banks, businesses, and consumers. Reliable low cost systems are also needed to combat other types of fraud and counterfeiting. Counterfeit parts such as computer chips, machine tools, etc. are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly simple to reproduce pictures, logos, symbols, money bills, or patterns. Presently, credit cards and passports use holograms for security. The holograms are inspected by human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially available optical components. In practice, the holographic pattern can be easily acquired from a credit card (photographed or captured by a CCD camera) and then a new hologram synthesized.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
B. Javidi, and J. L. Horner, “Optical pattern recognition for validation and security verification,” Optical Engineering 33 (1994).
B. Javidi, J. L. Horner, and J. F. Walkup, “An optical pattern recognition system for validation and security verification,” Optics and Photonics News 5 (1994).
B. Javidi, G. Zhang, and J. Li, “Experimental demonstration of the random phase encoding technique for image encryption and security verification,” Optical Engineering 35 (Sept. 1996).
P. Refregier and B. Javidi, “Optical image encryption using input and fourier plane random phase encoding,” Optics Letters 20:767, (1995).
B. Javidi, J. Li, and Q. Tang, “Optical implementation of neural networks for face recognition using a nonlinear joint transform correlator,” Applied Optics 34 (1995).
H. S. Li, Y. Qiao and D. Psaltis, “Optical network for real-time face recognition,” Applied Optics 32:5026 (1993).
K. H. Fielding and J. L. Horner, “1-/binary joint transform correlator”, Optical Engineering 29:1081 (1990).
B. Javidi and J. Wang, “2-D image correlation using a distortion invariant filter based 1-D space integrating optical processor,” Optical Engineering 35 (Sept. 1996).
B. Javidi and J. L. Horner, eds., Real-time Optical Information Processing, Academic Press (1994).
B. Javidi, “Nonlinear joint power spectrum based optical correlation,” Applied Optics 28: 2358 (1989).
B. Javidi and J. L. Horner, “Single SLM joint transform correlator,” Applied Optics 28:1027 (1989).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1997 Springer Science+Business Media New York
About this chapter
Cite this chapter
Javidi, B. (1997). Optics and Photonics in Image Encryption, Anti-Counterfeiting, and Security Systems. In: Lampropoulos, G.A., Lessard, R.A. (eds) Applications of Photonic Technology 2. Springer, Boston, MA. https://doi.org/10.1007/978-1-4757-9250-8_78
Download citation
DOI: https://doi.org/10.1007/978-1-4757-9250-8_78
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-9252-2
Online ISBN: 978-1-4757-9250-8
eBook Packages: Springer Book Archive