Near infrared multifactor identification tags.

We propose a compact technique for encryption-verification that relies on the following elements: multifactor encryption, which permits the simultaneous verification of up to four factors; distortion-invariant ID tag for remote identification; near infrared (NIR) writing and readout of the ID tag signal for invisible transmission; and optical processor, based on joint transform pattern recognition by optical correlation, for automatic verification of information. A highly-reliable security system is obtained by joining the advantages of all these elements for the first time. A novel NIR ID tag is designed and built by using commonly available materials. The very ID tag content cannot be visually perceived at naked eye; it cannot be either copied, scanned, or captured by any conventional device. Experimental results based on the NIR ID tag are shown. The satisfactory results obtained demonstrate a new insight into the applications of the compact and efficient technique for high-secure identification systems.

[1]  B Javidi,et al.  Optoelectronic information encryption with phase-shifting interferometry. , 2000, Applied optics.

[2]  B Javidi,et al.  Encrypted optical memory system using three-dimensional keys in the Fresnel domain. , 1999, Optics letters.

[3]  B. Javidi Nonlinear joint power spectrum based optical correlation. , 1989, Applied optics.

[4]  Bahram Javidi,et al.  Encrypted optical memory using double-random phase encoding. , 1997 .

[5]  Abhijit Mahalanobis,et al.  Review of correlation filters and their application for scene matching , 1996, Optics + Photonics.

[6]  Bahram Javidi,et al.  Scale and rotation Invariant optical ID tags for automatic vehicle identification and authentication , 2005, IEEE Transactions on Vehicular Technology.

[7]  Bahram Javidi,et al.  Compression of encrypted three-dimensional objects using digital holography , 2004 .

[8]  Bahram Javidi,et al.  Image reconstruction from compressed encrypted digital hologram , 2005 .

[9]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[10]  O. Matoba,et al.  The keys to holographic data security , 2000 .

[11]  Bahram Javidi,et al.  Fully phase encrypted image processor , 1999 .

[12]  N Yoshikawa,et al.  Binary computer-generated holograms for security applications from a synthetic double-exposure method by electron-beam lithography. , 1998, Optics letters.

[13]  Kehar Singh,et al.  Optical encryption using quadratic phase systems , 2001 .

[14]  Myrian Tebaldi,et al.  Multiple image encryption using an aperture-modulated optical system , 2006 .

[15]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[16]  Jingjuan Zhang,et al.  Multiple-image encryption by wavelength multiplexing. , 2005, Optics letters.

[17]  B. Javidi,et al.  Encrypting three-dimensional information with digital holography. , 2000, Applied optics.

[18]  B Javidi,et al.  Encrypted optical storage with angular multiplexing. , 1999, Applied optics.

[19]  Osamu Matoba,et al.  Multidimensional optical sensor and imaging system. , 2006, Applied optics.

[20]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[21]  María S. Millán,et al.  Dual nonlinear correlator based on computer controlled joint transform processor: Digital analysis and optical results , 1997 .

[22]  Bahram Javidi Real-time Remote Identification and Verification of Objects Using Optical ID Tags , 2003 .

[23]  Bahram Javidi,et al.  Multifactor authentication reinforces optical security. , 2006, Optics letters.

[24]  Bahram Javidi,et al.  Influence of a perturbation in a double phase-encoding system , 1998 .

[25]  Bahram Javidi,et al.  Design of Distortion-Invariant Optical ID Tags for Remote Identification and Verification of Objects , 2007 .

[26]  Bahram Javidi,et al.  Design of input phase mask for the space bandwidth of the optical encryption system , 2006 .

[27]  John Fredy Barrera,et al.  Optical encryption method using toroidal zone plates , 2005 .

[28]  Bahram Javidi,et al.  Remote optical ID tag recognition and verification using fully spatial phase multiplexing , 2005, Security + Defence.