Optics and Photonics in Image Encryption, Anti-Counterfeiting, and Security Systems

  • Bahram Javidi


The need for security and verification systems are diverse and there are many applications. One example is credit card fraud which is a serious problem facing many banks, businesses, and consumers. Reliable low cost systems are also needed to combat other types of fraud and counterfeiting. Counterfeit parts such as computer chips, machine tools, etc. are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly simple to reproduce pictures, logos, symbols, money bills, or patterns. Presently, credit cards and passports use holograms for security. The holograms are inspected by human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially available optical components. In practice, the holographic pattern can be easily acquired from a credit card (photographed or captured by a CCD camera) and then a new hologram synthesized.


Credit Card Image Encryption Phase Mask Fourier Plane Input Plane 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    B. Javidi, and J. L. Horner, “Optical pattern recognition for validation and security verification,” Optical Engineering 33 (1994).Google Scholar
  2. 2.
    B. Javidi, J. L. Horner, and J. F. Walkup, “An optical pattern recognition system for validation and security verification,” Optics and Photonics News 5 (1994).Google Scholar
  3. 3.
    B. Javidi, G. Zhang, and J. Li, “Experimental demonstration of the random phase encoding technique for image encryption and security verification,” Optical Engineering 35 (Sept. 1996).Google Scholar
  4. 4.
    P. Refregier and B. Javidi, “Optical image encryption using input and fourier plane random phase encoding,” Optics Letters 20:767, (1995).CrossRefGoogle Scholar
  5. 5.
    B. Javidi, J. Li, and Q. Tang, “Optical implementation of neural networks for face recognition using a nonlinear joint transform correlator,” Applied Optics 34 (1995).Google Scholar
  6. 6.
    H. S. Li, Y. Qiao and D. Psaltis, “Optical network for real-time face recognition,” Applied Optics 32:5026 (1993).CrossRefGoogle Scholar
  7. 7.
    K. H. Fielding and J. L. Horner, “1-/binary joint transform correlator”, Optical Engineering 29:1081 (1990).CrossRefGoogle Scholar
  8. 8.
    B. Javidi and J. Wang, “2-D image correlation using a distortion invariant filter based 1-D space integrating optical processor,” Optical Engineering 35 (Sept. 1996).Google Scholar
  9. 9.
    B. Javidi and J. L. Horner, eds., Real-time Optical Information Processing, Academic Press (1994).Google Scholar
  10. 10.
    B. Javidi, “Nonlinear joint power spectrum based optical correlation,” Applied Optics 28: 2358 (1989).CrossRefGoogle Scholar
  11. 11.
    B. Javidi and J. L. Horner, “Single SLM joint transform correlator,” Applied Optics 28:1027 (1989).CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 1997

Authors and Affiliations

  • Bahram Javidi
    • 1
  1. 1.Department of Electrical & Systems EngineeringUniversity of Connecticut, U-157StorrsUSA

Personalised recommendations