Simple distortion-invariant optical identification tag based on encrypted binary-phase computer-generated hologram for real-time vehicle identification and verification

A simple distortion-invariant optical identification (ID) tag is presented for real-time vehicle identification and verification. The pro- posed scheme is composed of image encryption, ID tag creation, image decryption, and optical correlation for verification. To create the ID tag, a binary-phase computer-generated hologram (BPCGH) of a symbol image representing a vehicle is created using a simulated annealing algorithm. The BPCGH is then encrypted using an XOR operation and enlargement transformed into polar coordinates. The resulting ID tag is then attached to the vehicle. As the BPCGH consists of only binary phase values, it is robust to external distortions. To identify and verify the vehicle, sev- eral reverse processes are required, such as capturing the ID tag with a camera, extracting the ID tag from the captured image, transformation of the ID tag into rectangular coordinates, decryption, an inverse Fourier transform, and correlation. Computer simulation and experimental results confirm that the proposed optical ID tag is secure and robust to such distortions as scaling, rotation, cropping (scratches), and random noise. The ID tag can also be easily implemented, as it consists of only bi- nary phase components. C 2010 Society of Photo-Optical Instrumentation Engineers.

[1]  B. Javidi,et al.  Encrypting three-dimensional information with digital holography. , 2000, Applied optics.

[2]  Takanori Nomura Hybrid Optical Encryption of a 3D Object by Use of a Digital Holographic Technique , 2004 .

[3]  P Refregier Optimal trade-off filters for noise robustness, sharpness of the correlation peak, and Horner efficiency. , 1991, Optics letters.

[4]  Bahram Javidi Real-time Remote Identification and Verification of Objects Using Optical ID Tags , 2003 .

[5]  M. Karim,et al.  Improved correlation discrimination using an amplitude-modulated phase-only filter. , 1990, Applied optics.

[6]  Myrian Tebaldi,et al.  Multiplexing encrypted data by using polarized light , 2006 .

[7]  J. Goodman Introduction to Fourier optics , 1969 .

[8]  Bahram Javidi,et al.  Multifactor authentication reinforces optical security. , 2006, Optics letters.

[9]  Toyohiko Yatagai,et al.  A new method of three-dimensional measurement by differential interference contrast microscope , 2006 .

[10]  Eun-Soo Kim,et al.  Optical image encryption based on XOR operations , 1999 .

[11]  Bernie Mulgrew,et al.  Automatic target recognition , 2010 .

[12]  Bahram Javidi,et al.  Image Recognition and Classification: Algorithms, Systems, and Applications , 2002 .

[13]  Bahram Javidi,et al.  Near infrared multifactor identification tags. , 2007, Optics express.

[14]  Soo-Joong Kim,et al.  Optical information security system using an interference-based computer-generated hologram and BaTiO3 , 2006 .

[15]  Junji Ohtsubo,et al.  Fast Optimization of Binary Encrypted Hologram Based on Error Correction Method in Optical Security Systems , 2007 .

[16]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[17]  Arvind Kumar,et al.  Optical encryption and decryption using a sandwich random phase diffuser in the Fourier plane , 2007 .

[18]  Bahram Javidi,et al.  Optimum nonlinear composite filter for distortion-tolerant pattern recognition. , 2002, Applied optics.

[19]  Bahram Javidi,et al.  Scale and rotation Invariant optical ID tags for automatic vehicle identification and authentication , 2005, IEEE Transactions on Vehicular Technology.

[20]  Bahram Javidi,et al.  Noise performance of double-phase encryption compared to XOR encryption , 1999 .