Optical security and authentication using nanoscale and thin-film structures

Authentication of encoded information is a popular current trend in optical security. Recent research has proposed the production of secure unclonable ID tags and devices with the use of nanoscale encoding and thin-film deposition fabrication techniques, which are nearly impossible to counterfeit but can be verified using optics and photonics instruments. Present procedures in optical encryption provide secure access to the information, and these techniques are improving daily. Nevertheless, a rightful recipient with access to the decryption key may not be able to validate the authenticity of the message. In other words, there is no simple way to check whether the information has been counterfeited. Metallic nanoparticles may be used in the fabrication process because they provide distinctive polarimetric signatures that can be used for validation. The data is encoded in the optical domain, which can be verified using physical properties with speckle analysis or ellipsometry. Signals obtained from fake and genuine samples are complex and can be difficult to distinguish. For this reason, machine-learning classification algorithms are required in order to determine the authenticity of the encoded data and verify the security of unclonable nanoparticle encoded or thin-film-based ID tags. In this paper, we review recent research on optical validation of messages, ID tags, and codes using nanostructures, thin films, and 3D optical codes. We analyze several case scenarios where optically encoded devices have to be authenticated. Validation requires the combined use of a variety of multi-disciplinary approaches in optical and statistical techniques, and for this reason, the first five sections of this paper are organized as a tutorial.

[1]  Osamu Matoba,et al.  Optical Techniques for Information Security , 2009, Proceedings of the IEEE.

[2]  Kort Travis,et al.  Polarization microscopy with stellated gold nanoparticles for robust monitoring of molecular assemblies and single biomolecules. , 2008, Optics express.

[3]  Oriol Arteaga,et al.  Mueller matrix polarimetry with four photoelastic modulators: theory and calibration. , 2012, Applied optics.

[4]  Mohak Shah,et al.  Evaluating Learning Algorithms: A Classification Perspective , 2011 .

[5]  Chad A Mirkin,et al.  Gold nanoparticles for biology and medicine. , 2010, Angewandte Chemie.

[6]  Myungjin Cho,et al.  Information authentication using photon-counting double-random-phase encrypted images. , 2011, Optics letters.

[7]  Myungjin Cho,et al.  Three-dimensional photon counting double-random-phase encryption. , 2013, Optics letters.

[8]  Naoya Tate,et al.  Optical nano artifact metrics using silicon random nanostructures , 2016, Scientific reports.

[9]  Bahram Javidi,et al.  Security authentication with a three-dimensional optical phase code using random forest classifier. , 2016, Journal of the Optical Society of America. A, Optics, image science, and vision.

[10]  Ayman Alfalou,et al.  Optical image compression and encryption methods , 2009 .

[11]  Jon Shlens,et al.  A TUTORIAL ON PRINCIPAL COMPONENT ANALYSIS Derivation , Discussion and Singular Value Decomposition , 2003 .

[12]  Senén Barro,et al.  Do we need hundreds of classifiers to solve real world classification problems? , 2014, J. Mach. Learn. Res..

[13]  Vincent M Rotello,et al.  Gold nanoparticles in delivery applications. , 2008, Advanced drug delivery reviews.

[14]  Bahram Javidi,et al.  Full-phase photon-counting double-random-phase encryption. , 2014, Journal of the Optical Society of America. A, Optics, image science, and vision.

[15]  Jeevan M. Meruga,et al.  Security printing of covert quick response codes using upconverting nanoparticle inks , 2012, Nanotechnology.

[16]  Aurélien Garivier,et al.  On the Complexity of Best-Arm Identification in Multi-Armed Bandit Models , 2014, J. Mach. Learn. Res..

[17]  Osamu Matoba,et al.  Secure holographic memory by double-random polarization encryption. , 2004, Applied optics.

[18]  Bahram Javidi,et al.  Optical encryption in the longitudinal domain of focused fields. , 2016, Optics express.

[19]  D. Edwards Data Mining: Concepts, Models, Methods, and Algorithms , 2003 .

[20]  Pierre Margot,et al.  Understanding and fighting the medicine counterfeit market. , 2014, Journal of pharmaceutical and biomedical analysis.

[21]  Arvind Kumar,et al.  Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions. , 2009, Optics letters.

[22]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[23]  Zahi A Fayad,et al.  Multifunctional gold nanoparticles for diagnosis and therapy of disease. , 2013, Molecular pharmaceutics.

[24]  B Javidi,et al.  Encrypted optical memory system using three-dimensional keys in the Fresnel domain. , 1999, Optics letters.

[25]  Peter E. Hart,et al.  Nearest neighbor pattern classification , 1967, IEEE Trans. Inf. Theory.

[26]  R. Azzam,et al.  Stokes-vector and Mueller-matrix polarimetry [Invited]. , 2016, Journal of the Optical Society of America. A, Optics, image science, and vision.

[27]  Bahram Javidi,et al.  Optical pattern recognition for validation and security verification , 1994 .

[28]  Bahram Javidi,et al.  Polarization encoding for optical security systems , 2000 .

[29]  Kort Travis,et al.  Polarization microscopy with stellated gold nanoparticles for robust, in-situ monitoring of biomolecules , 2008 .

[30]  Bahram Javidi,et al.  Optical encryption using photon-counting polarimetric imaging. , 2015, Optics express.

[31]  Kazuya Nakano,et al.  Evaluations of phase-only double random phase encoding based on key-space analysis. , 2013, Applied optics.

[32]  B Javidi,et al.  Optical security and encryption with totally incoherent light. , 2001, Optics letters.

[33]  Oriol Arteaga,et al.  Mueller matrix microscope with a dual continuous rotating compensator setup and digital demodulation. , 2014, Applied optics.

[34]  J. C. Dainty,et al.  I The Statistics of Speckle Patterns , 1977 .

[35]  Konstantins Jefimovs,et al.  Linear and nonlinear optical responses influenced by broken symmetry in an array of gold nanoparticles. , 2004, Optics express.

[36]  Miguel Figueroa,et al.  Competitive learning with floating-gate circuits , 2002, IEEE Trans. Neural Networks.

[37]  Bahram Javidi,et al.  Authentication of gold nanoparticle encoded pharmaceutical tablets using polarimetric signatures. , 2016, Optics letters.

[38]  Monic Shah,et al.  Biological applications of gold nanoparticles. , 2014, Journal of nanoscience and nanotechnology.

[39]  D. Bansal,et al.  Anti-Counterfeit Technologies: A Pharmaceutical Industry Perspective , 2012, Scientia pharmaceutica.

[40]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[41]  Rasheed M. A. Azzam,et al.  Propagation of partially polarized light through anisotropic media with or without depolarization: A differential 4 × 4 matrix calculus , 1978 .

[42]  A. Stergachis,et al.  Technologies for Detecting Falsified and Substandard Drugs in Low and Middle-Income Countries , 2014, PloS one.

[43]  Bahram Javidi,et al.  Security authentication using phase-encoded nanoparticle structures and polarized light. , 2015, Optics letters.

[44]  Kouichi Nitta,et al.  Secure data storage by three-dimensional absorbers in highly scattering volume medium , 2008 .

[45]  Hiroyuki Suzuki,et al.  Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack. , 2010, Optics express.

[46]  Chih-Jen Lin,et al.  A comparison of methods for multiclass support vector machines , 2002, IEEE Trans. Neural Networks.

[47]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[48]  E. F. FAHY,et al.  Optical Properties of ‘Cellophane’ , 1956, Nature.

[49]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[50]  Xudong Chen,et al.  Optical image encryption based on diffractive imaging. , 2010, Optics letters.

[51]  R. Shukla,et al.  Biocompatibility of gold nanoparticles and their endocytotic fate inside the cellular compartment: a microscopic overview. , 2005, Langmuir : the ACS journal of surfaces and colloids.

[52]  Naveen K. Nishchal,et al.  Flexible optical encryption with multiple users and multiple security levels , 2011 .

[53]  Bahram Javidi,et al.  Advances in optical security systems , 2014 .

[54]  Xiang Peng,et al.  Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.

[55]  Jesús Lancis,et al.  Optical encryption based on computational ghost imaging. , 2010, Optics letters.

[56]  Bahram Javidi,et al.  Optical security verification by synthesizing thin films with unique polarimetric signatures. , 2015, Optics letters.

[57]  Bahram Javidi,et al.  Optical encryption in the axial domain using beams with arbitrary polarization , 2017 .

[58]  F. Aussenegg,et al.  Optical dichroism of lithographically designed silver nanoparticle films. , 1996, Optics letters.

[59]  Naveen K Nishchal,et al.  An optical encryption and authentication scheme using asymmetric keys. , 2014, Journal of the Optical Society of America. A, Optics, image science, and vision.

[60]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[61]  Naoya Tate,et al.  Optical security based on near-field processes at the nanoscale , 2012 .

[62]  Kouichi Nitta,et al.  Optical authentication method using a three-dimensional phase object with various wavelength readouts. , 2008, Applied optics.

[63]  François Goudail,et al.  Optimal configuration of static polarization imagers for target detection. , 2016, Journal of the Optical Society of America. A, Optics, image science, and vision.

[64]  A. Stern,et al.  Phase-Modulated Optical System With Sparse Representation for Information Encoding and Authentication , 2013, IEEE Photonics Journal.

[65]  Tian Ming,et al.  Strong polarization dependence of plasmon-enhanced fluorescence on single gold nanorods. , 2009, Nano letters.

[66]  O Matoba,et al.  Secure optical memory system with polarization encryption. , 2001, Applied optics.

[67]  Boris Skoric,et al.  Quantum-secure authentication of a physical unclonable key , 2014, CLEO 2015.

[68]  F. Massey The Kolmogorov-Smirnov Test for Goodness of Fit , 1951 .

[69]  Elodie Boisselier,et al.  Gold nanoparticles in nanomedicine: preparations, imaging, diagnostics, therapies and toxicity. , 2009, Chemical Society reviews.

[70]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[71]  Oriol Arteaga,et al.  Useful Mueller matrix symmetries for ellipsometry , 2014 .

[72]  Bahram Javidi,et al.  Photon-counting double-random-phase encoding for secure image verification and retrieval , 2012 .

[73]  Wen Chen,et al.  Ghost imaging for three-dimensional optical security , 2013 .

[74]  Tom Dowling,et al.  Introducing secure modes of operation for optical encryption. , 2008, Journal of the Optical Society of America. A, Optics, image science, and vision.

[75]  J. Horner,et al.  Phase-only matched filtering. , 1984, Applied optics.

[76]  Myrian Tebaldi,et al.  Multiplexing encrypted data by using polarized light , 2006 .

[77]  Enric Bertran,et al.  Anisotropic surface properties of micro/nanostructured a-C:H:F thin films with self-assembly applications , 2012 .

[78]  Bahram Javidi,et al.  Optical encryption using a joint transform correlator architecture , 2000 .

[79]  Bahram Javidi,et al.  Roadmap on optical security , 2016 .

[80]  Marco Zanella,et al.  Biological applications of gold nanoparticles. , 2008, Chemical Society reviews.

[81]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[82]  Tao Shaohua All-optical encrypted movie based on fractional Fourier transform , 2013 .

[83]  B. Javidi,et al.  Encrypted optical storage with wavelength-key and random phase codes. , 1999, Applied optics.

[84]  Rasit Turan,et al.  Effect of particle properties and light polarization on the plasmonic resonances in metallic nanoparticles. , 2010, Optics express.

[85]  B. Javidi,et al.  Photon-Counting Security Tagging and Verification Using Optically Encoded QR Codes , 2014, IEEE Photonics Journal.

[86]  Toyohiko Yatagai,et al.  Encryption based on vector wave holography , 2012 .

[87]  Naoya Tate,et al.  Nano-artifact metrics based on random collapse of resist , 2014, Scientific Reports.

[88]  J. Suñé,et al.  Counterfeit medicines in Peru: a retrospective review (1997–2014) , 2016, BMJ Open.

[89]  G. S. Phipps,et al.  Optimization of retardance for a complete Stokes polarimeter. , 2000, Optics letters.

[90]  A. Atiya,et al.  Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond , 2005, IEEE Transactions on Neural Networks.

[91]  Brendan J. Frey,et al.  Are Random Forests Truly the Best Classifiers? , 2016, J. Mach. Learn. Res..

[92]  Bahram Javidi,et al.  Resistance of the double random phase encryption against various attacks. , 2007, Optics express.

[93]  P. Jain,et al.  Calculated absorption and scattering properties of gold nanoparticles of different size, shape, and composition: applications in biological imaging and biomedicine. , 2006, The journal of physical chemistry. B.

[94]  Kehar Singh,et al.  Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator. , 2011, Applied optics.

[95]  S. A. Goorden,et al.  Quantum-Secure Authentication with a Classical Key , 2013, 1303.0142.

[96]  Wen Chen,et al.  Space-based optical image encryption. , 2010, Optics express.

[97]  Quanying Wu,et al.  Information encryption in phase space. , 2015, Optics letters.

[98]  Enric Bertran,et al.  Spontaneous formation of nanometric multilayers of metal-carbon films by up-hill diffusion during growth , 2005 .