14 research outputs found

    Holographic security

    Get PDF
    This chapter is concerned with the security applications of holographic techniques. Holograms are used in product authentication, product branding and brand protection, and personal and other documents. Serialization to ensure the uniqueness of each hologram for added security is briefly discussed. The theory of optical character recognition and joint transform correlation methods is outlined. Holographic recording using encrypted reference waves enables secure storage of information. Several methods are considered for encrypting optical data as well as holographic recording of encrypted images and their reconstruction and decryption. Millimeter and microwave holographic imaging techniques for the detection of hidden contraband, narcotics, firearms, and explosives are also discussed

    Counterfeiting Models (Mathematical/Economic)

    No full text
    Counterfeiting and piracy are illicit activities infringing IPR (intellectual property rights). The market for counterfeit can be divided into two important submarkets. In the primary market, consumers purchase counterfeit products believing they have purchased genuine articles (deceptive counterfeiting). In the secondary market, consumers knowingly buy counterfeit products (nondeceptive counterfeiting). Counterfeiting has, obviously, consequences on genuine producers and consumers; nevertheless, it can have general socioeconomic effects. There is a considerable body of theoretical and empirical literature on the mechanisms of counterfeit trade and on the economic and social effects of counterfeiting. A number of the methodological papers are undertaken within the framework of operations research and game theory
    corecore