Laser surface authentication - reading Nature's own security code

被引:28
|
作者
Cowburn, Russell [1 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, Blackett Phys Lab, London, England
关键词
laser surface authentication; security coding;
D O I
10.1080/00107510802583948
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A laser-based security technique called Laser Surface Authentication (LSA) is described in which diffuse laser scattering is used as a probe of the naturally-occurring randomness present in virtually all surfaces. LSA brings the principles of biometric identification currently used in human fingerprint- or iris-recognition to the world of inanimate objects such as paper documents, plastic cards, high value branded products and a range of other things that are commonly counterfeited or smuggled.
引用
收藏
页码:331 / 342
页数:12
相关论文
共 50 条
  • [21] Coconut oil - Nature's own emollient
    Logamorthy, Ramamoorthy
    Karthikeyan, Kaliaperumal
    INDIAN JOURNAL OF DERMATOLOGY VENEREOLOGY & LEPROLOGY, 2025, 91 (01): : 81 - 83
  • [22] Substrate Channelling Nature's Own Tunnels
    Khan, Danish
    RESONANCE-JOURNAL OF SCIENCE EDUCATION, 2012, 17 (08): : 791 - 796
  • [23] Code security analysis of a biometric authentication system using automated theorem provers
    Jürjens, J
    21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 125 - 134
  • [24] An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security
    Chen, Dajiang
    Zhang, Ning
    Lu, Rongxing
    Fang, Xiaojie
    Zhang, Kuan
    Qin, Zhiguang
    Shen, Xuemin
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (04) : 748 - 761
  • [25] Novel Authentication Mechanisms for Hash Code, CAPTCHA and OTP in Cyber Security Domain
    Devi, R. Kanniga
    Muthukannan, M.
    Babu, S. S. Harish
    Sivadasan, Adith
    Abinivesh, S.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 62 - 68
  • [26] Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security
    Hussain, S. M. Suhail
    Farooq, Shaik Mullapathi
    Ustun, Taha Selim
    IEEE ACCESS, 2019, 7 : 80980 - 80984
  • [27] What Is Security? The individual nurse's responsibility for her own security
    Stimson, Julia C.
    AMERICAN JOURNAL OF NURSING, 1938, 38 (06) : 658 - 662
  • [28] READING FAILURE AND THE CHILD'S SECURITY
    Preston, Mary I.
    AMERICAN JOURNAL OF ORTHOPSYCHIATRY, 1940, 10 (02) : 239 - 252
  • [29] Reading nature's tea leaves
    de Waal, F
    NATURAL HISTORY, 2000, 109 (10) : 66 - 71
  • [30] CODE SYSTEMS INSTRUCTION AND KINDERGARTEN CHILDRENS PERCEPTIONS OF THE NATURE AND PURPOSE OF READING
    MAYFIELD, MI
    JOURNAL OF EDUCATIONAL RESEARCH, 1983, 76 (03): : 161 - 168