Visible and NIR spectral band combination to produce high security ID tags for automatic identification

Verification of a piece of information and/or authentication of a given object or person are common operations carried out by automatic security systems that can be applied, for instance, to control the entrance to restricted areas, access to public buildings, identification of cardholders, etc. Vulnerability of such security systems may depend on the ease of counterfeiting the information used as a piece of identification for verification and authentication. To protect data against tampering, the signature that identifies an object is usually encrypted to avoid an easy recognition at human sight and an easy reproduction using conventional devices for imaging or scanning. To make counterfeiting even more difficult, we propose to combine data from visible and near infrared (NIR) spectral bands. By doing this, neither the visible content nor the NIR data by theirselves are sufficient to allow the signature recognition and thus, the identification of a given object. Only the appropriate combination of both signals permits a satisfactory authentication. In addition, the resulting signature is encrypted following a fully-phase encryption technique and the obtained complex-amplitude distribution is encoded on an ID tag. Spatial multiplexing of the encrypted signature allows us to build a distortion-invariant ID tag, so that remote authentication can be achieved even if the tag is captured under rotation or at different distances. We also explore the possibility of using partial information of the encrypted signature to simplify the ID tag design.

[1]  Nasser M. Nasrabadi,et al.  Automatic Target Recognition Using a Modular Neural Network. , 1998 .

[2]  J. Goodman Introduction to Fourier optics , 1969 .

[3]  D Psaltis,et al.  Optical network for real-time face recognition. , 1993, Applied optics.

[4]  Bahram Javidi,et al.  Performance of double phase encoding encryption technique using binarized encrypted images , 1998 .

[5]  Bahram Javidi,et al.  Influence of a perturbation in a double phase-encoding system , 1998 .

[6]  Bahram Javidi,et al.  Detection and authentication of objects by using distortion-invariant optical ID tags , 2005, SPIE OPTO-Ireland.

[7]  María S. Millán,et al.  Pattern recognition with variable discrimination capability by dual non-linear optical correlation , 1999 .

[8]  B. Javidi,et al.  Optical Security System with Fourier Plane encoding. , 1998, Applied optics.

[9]  H J Caulfield Linear combination of filters for character recognition: a unified treatment. , 1980, Applied optics.

[10]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[11]  Bahram Javidi,et al.  Fully phase encrypted image processor , 1999 .

[12]  Bahram Javidi,et al.  Fully phase encoded key and biometrics for security verification , 1997 .

[13]  B. Javidi Nonlinear joint power spectrum based optical correlation. , 1989, Applied optics.

[14]  Y. Pétillot,et al.  Scale-invariant optical correlators using ferroelectric liquid-crystal spatial light modulators. , 1995, Applied optics.

[15]  Bahram Javidi,et al.  Image Recognition and Classification: Algorithms, Systems, and Applications , 2002 .

[16]  María S. Millán,et al.  Optical pattern recognition with adjustable sensitivity to shape and texture , 2002 .

[17]  Bahram Javidi,et al.  Remote object authentication using distortion-invariant ID tags , 2005, SPIE Optics + Photonics.

[18]  Heesung Kwon,et al.  Automated vehicle detection in forward-looking infrared imagery. , 2004, Applied optics.

[19]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[20]  Bahram Javidi,et al.  Noise performance of double-phase encryption compared to XOR encryption , 1999 .

[21]  Bahram Javidi Real-time Remote Identification and Verification of Objects Using Optical ID Tags , 2003 .

[22]  Bahram Javidi,et al.  Distortion-invariant ID tags for object identification , 2004, SPIE Security + Defence.

[23]  J L Horner,et al.  Metrics for assessing pattern-recognition performance. , 1992, Applied optics.

[24]  G. Turin,et al.  An introduction to matched filters , 1960, IRE Trans. Inf. Theory.

[25]  Abhijit Mahalanobis,et al.  Review of correlation filters and their application for scene matching , 1996, Optics + Photonics.

[26]  Jesmin F. Khan,et al.  Target detection in cluttered forward-looking infrared imagery , 2005 .

[27]  Bahram Javidi,et al.  Optimum nonlinear composite filter for distortion-tolerant pattern recognition. , 2002, Applied optics.

[28]  Bahram Javidi,et al.  Scale and rotation Invariant optical ID tags for automatic vehicle identification and authentication , 2005, IEEE Transactions on Vehicular Technology.

[29]  Bahram Javidi,et al.  Distortion-invariant pattern recognition with Fourier-plane nonlinear filters. , 1996, Applied optics.

[30]  D Casasent,et al.  Multivariant technique for multiclass pattern recognition. , 1980, Applied optics.

[31]  Bahram Javidi,et al.  Remote optical ID tag recognition and verification using fully spatial phase multiplexing , 2005, Security + Defence.

[32]  B. Kumar,et al.  Performance measures for correlation filters. , 1990, Applied optics.

[33]  Bahram Javidi,et al.  Nonlinear distortion-tolerant filters for detection of road signs in background noise , 2002, IEEE Trans. Veh. Technol..