Open Access Paper
10 September 2005 Remote object authentication using distortion-invariant ID tags
Author Affiliations +
Abstract
A number of applications in security or inventory control may benefit from an authentication system able to identify a remote object viewed from different perspectives or distances. Object identification can be accomplished by using optical ID tags, which include relevant information of the target and are located on a visible part of the object under surveillance. Encryption of the information codified in the ID tag allows increasing security and deters from unauthorized usage of optical tags. The identification process encompasses several steps such as detection, information decoding and verification which are all detailed in this work. Design of distortion-invariant ID tags has to be taken into account to achieve a correct object authentication even if the ID tag is detected and captured at different distances (i.e. different scales) or from different views (i.e. rotated versions of the original ID tag). Description of diverse distortion-invariant ID tags and authentication results using the proposed ID tags are provided. We show that distortion-tolerance is achieved by the described identification system. Information encrypted on the tested ID tags is correctly decoded and verified even if variations in scale and rotations are considered. The effects of environmental degradation are taken into account in the recognition process.
© (2005) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Elisabet Perez-Cabre, Maria S. Millan, and Bahram Javidi "Remote object authentication using distortion-invariant ID tags", Proc. SPIE 5908, Optical Information Systems III, 59080N (10 September 2005); https://doi.org/10.1117/12.615006
Lens.org Logo
CITATIONS
Cited by 2 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image encryption

Receivers

Computer security

Image compression

System identification

Active optics

Imaging systems

Back to Top