Discover
/
Article

Securing Information with Optical Technologies

MAR 01, 1997
The next generation of data security systems may thwart counterfeiters and eavesdroppers by employing new systems and devices based on optical information processing.
Bahram Javidi

Data security has become part of our everyday lives. For even the most banal transactions, a secure piece of identification—a passport, password, bank card, credit card, personal identification number or driver’s permit—is often required. As those proofs of identity have become increasingly necessary in our complex world, they have also increased the opportunities for deception. Each year, US business spends many billions of dollars on information fraud, including forged credit cards. Many of those losses are passed onto the consumer. Each year, tens of millions of dollars in counterfeit US notes are seized worldwide. And counterfeit manufactured goods, such as computer chips and machine tools, are arriving on our shores in greater numbers than ever.

This article is only available in PDF format

References

  1. 1. B. Javidi, J. L. Horner, Opt. Eng. 33, 1752 (1994).https://doi.org/OPEGAR

  2. 2. P. Refregier, B. Javidi, Opt. Lett. 20, 767 (1995).https://doi.org/OPLEDP

  3. 3. B. Javidi, J. Li, Q. Tang, Appl. Opt. 34, 3950 (1995).https://doi.org/APOPAI

  4. 4. B. Javidi, G. Zhang, J. Li, Opt. Eng. 35, 2506 (1996).https://doi.org/OPEGAR

  5. 5. B. Javidi, A. Sergent, G. Zhang, Opt. Eng. 36, (1997), in press.https://doi.org/OPEGAR

  6. 6. H. S. Li, Y. Qiao, D. Psaltis, Appl. Opt. 32, 5026 (1993).https://doi.org/APOPAI

  7. 7. R. L. Van Reneese, ed., Optical Document Security, Artech House, Boston (1994).

  8. 8. K. H. Fielding, J. L. Horner, C. K. Makekau, Opt. Eng. 30, 1958 (1991).https://doi.org/OPEGAR

  9. 9. H. Rajenbach, Proc. SPIE 2237, 322 (1994).https://doi.org/PSISDG

  10. 10. J. W. Goodman, Introduction to Fourier Optics, McGraw‐Hill, New York (1968).

  11. 11. B. E. A. Saleh, M. Teich, Fundamentals of Photonics, Wiley, New York (1991).

  12. 12. B. Javidi, J. L. Horner, eds., Real‐Time Optical Information Processing, Academic Press, New York (1994).

  13. 13. A. Papoulis, Probability, Random Variables, and Stochastic Processes, 3rd ed., McGraw‐Hill, New York (1991).

  14. 14. R. O. Duda, P. E. Hart, Pattern Classification and Scene Analysis, Wiley, New York (1973).

  15. 15. R. Lippmann, IEEE‐ASSP Magazine, April 1987, p. 4.

  16. 16. Y. S. Abu‐Mostafa, D. Psaltis, Sci. Am. 256(3), 88 (1987).https://doi.org/SCAMAC

More about the Authors

Bahram Javidi. University of Connecticut, Storrs.

Related content
/
Article
Figuring out how to communicate with the public can be overwhelming. Here’s some advice for getting started.
/
Article
Amid growing investment in planetary-scale climate intervention strategies that alter sunlight reflection, global communities deserve inclusive and accountable oversight of research.
/
Article
Although motivated by the fundamental exploration of the weirdness of the quantum world, the prizewinning experiments have led to a promising branch of quantum computing technology.
/
Article
As conventional lithium-ion battery technology approaches its theoretical limits, researchers are studying alternative architectures with solid electrolytes.
This Content Appeared In
pt-cover_1997_03.jpeg

Volume 50, Number 3

Get PT in your inbox

pt_newsletter_card_blue.png
PT The Week in Physics

A collection of PT's content from the previous week delivered every Monday.

pt_newsletter_card_darkblue.png
PT New Issue Alert

Be notified about the new issue with links to highlights and the full TOC.

pt_newsletter_card_pink.png
PT Webinars & White Papers

The latest webinars, white papers and other informational resources.

By signing up you agree to allow AIP to send you email newsletters. You further agree to our privacy policy and terms of service.