Serial Number

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 54648 Experts worldwide ranked by ideXlab platform

Jiwhan Noh - One of the best experts on this subject based on the ideXlab platform.

  • Fast and direct engraving of iridescent lettering on original product surface using laser interference to prevent counterfeiting
    Optics and Lasers in Engineering, 2018
    Co-Authors: Sanghoon Ahn, Han-sung Bae, Hee Shin Kang, Jeng-o Kim, Jiwhan Noh
    Abstract:

    Abstract We propose the engraving of a unique interference pattern on metal with the use of high-energy 1064 nm laser pulses fired through a Fresnel biprism (FB). The grating is patterned with 500 patterns for 5 ns, and the spacing of patterns can be adjusted according to the physical value of FB. By rotating the FB, the interference pattern is machined into metal to produce an encrypted iridescent character. Encrypted letters are engraved via assigning a Serial Number and corporate logos to a product (on which the metal is affixed) according to the viewing angle of the interference fringe. The resulting iridescently colored letters or Numbers are visible according to their viewing direction. By superimposing letters and Numbers, it is possible to store complex passwords, and forgery/counterfeiting can be easily detected by merely using the naked eye and an angle meter.

  • Serial Number coding and decoding by laser interference direct patterning on the original product surface for anti-counterfeiting
    Optics Express, 2017
    Co-Authors: In-yong Park, Youngduk Kim, Han-sung Bae, Jason Yoo, Sanghoon Ahn, Hee Shin Kang, Jiwhan Noh
    Abstract:

    Here, we investigate a method to distinguish the counterfeits by patterning multiple reflective type grating directly on the surface of the original product and analyze the Serial Number from its rotation angles of diffracted fringes. The micro-sized gratings were fabricated on the surface of the material at high speeds by illuminating the interference fringe generated by passing a high-energy pulse laser through the Fresnel biprism. In addition, analysis of the grating’s diffraction fringes was performed using a continuous wave laser.

Markus G Kuhn - One of the best experts on this subject based on the ideXlab platform.

  • information hiding a survey
    Proceedings of the IEEE, 1999
    Co-Authors: Fabien A P Petitcolas, Ross Anderson, Markus G Kuhn
    Abstract:

    Information-hiding techniques have recently become important in a Number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or Serial Number or even help to prevent unauthorized copying directly. Military communications systems make increasing use of traffic security techniques which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its receiver, or its very existence. Similar techniques are used in some mobile phone systems and schemes proposed for digital elections. Criminals try to use whatever traffic security properties are provided intentionally or otherwise in the available communications systems, and police forces try to restrict their use. However, many of the techniques proposed in this young and rapidly evolving field can trace their history back to antiquity, and many of them are surprisingly easy to circumvent. In this article, we try to give an overview of the field, of what we know, what works, what does not, and what are the interesting topics for research.

  • information hiding a survey identification and protection of multimedia information
    Proceedings of the IEEE, 1999
    Co-Authors: Fabien A P Petitcolas, R J Anderson, Markus G Kuhn
    Abstract:

    Information-hiding techniques have recently become important in a Number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or Serial Number or even help to prevent unauthorized copying directly. Military communications systems make increasing use of traffic security techniques which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its receiver, or its very existence. Similar techniques are used in some mobile phone systems and schemes proposed for digital elections. Criminals try to use whatever traffic security properties are provided intentionally or otherwise in the available communications systems, and police forces try to restrict their use. However, many of the techniques proposed in this young and rapidly evolving field can trace their history back to antiquity, and many of them are surprisingly easy to circumvent. In this article, we try to give an overview of the field, of what we know, what works, what does not, and what are the interesting topics for research.

Shermeen Sayeda - One of the best experts on this subject based on the ideXlab platform.

  • origin and destination estimation in new york city with automated fare system data
    Transportation Research Record, 2002
    Co-Authors: James J Barry, Robert Newhouser, Adam Rahbee, Shermeen Sayeda
    Abstract:

    New York City Transit's automated fare collection system, known as MetroCard, is an entry-only system that records the Serial Number of the MetroCard and the time and location (subway turnstile or bus Number) of each use. A methodology that estimates station-to-station origin and destination (O-D) trip tables by using this MetroCard information is described. The key is to determine the sequence of trips made throughout a day on each MetroCard. This is accomplished by sorting the MetroCard information by Serial Number and time and then extracting, for each MetroCard, the sequence of the trips and the station used at the origin of each trip. A set of straightforward algorithms is applied to each set of MetroCard trips to infer a destination station for each origin station. The algorithms are based on two primary assumptions. First, a high percentage of riders return to the destination station of their previous trip to begin their next trip. Second, a high percentage of riders end their last trip of the day ...

Yu Xie - One of the best experts on this subject based on the ideXlab platform.

  • Serial Number extracting and recognizing applied in paper currency sorting system based on rbf network
    Computational Intelligence, 2010
    Co-Authors: Li Liu, Yu Xie
    Abstract:

    In view of the increasing demand of recognition system for paper currency Number, to develop a type of Number recognition system based on CIS and DSP. The hardware is composed of CIS and DSP which control image acquisition and process. The software is composed of image acquisition, character correction and recognition. To recognize character with noise pollution rapidly and accurately, a novel approach for character feature extraction based on statistics and fuzzy membership is proposed, and applied in RBF neural network. The experiment shows that the recognition system runs stably and accurately, the collected image shows clearly. The system runs with highly exact rate on Number recognition.

Sanghoon Ahn - One of the best experts on this subject based on the ideXlab platform.

  • Fast and direct engraving of iridescent lettering on original product surface using laser interference to prevent counterfeiting
    Optics and Lasers in Engineering, 2018
    Co-Authors: Sanghoon Ahn, Han-sung Bae, Hee Shin Kang, Jeng-o Kim, Jiwhan Noh
    Abstract:

    Abstract We propose the engraving of a unique interference pattern on metal with the use of high-energy 1064 nm laser pulses fired through a Fresnel biprism (FB). The grating is patterned with 500 patterns for 5 ns, and the spacing of patterns can be adjusted according to the physical value of FB. By rotating the FB, the interference pattern is machined into metal to produce an encrypted iridescent character. Encrypted letters are engraved via assigning a Serial Number and corporate logos to a product (on which the metal is affixed) according to the viewing angle of the interference fringe. The resulting iridescently colored letters or Numbers are visible according to their viewing direction. By superimposing letters and Numbers, it is possible to store complex passwords, and forgery/counterfeiting can be easily detected by merely using the naked eye and an angle meter.

  • Serial Number coding and decoding by laser interference direct patterning on the original product surface for anti-counterfeiting
    Optics Express, 2017
    Co-Authors: In-yong Park, Youngduk Kim, Han-sung Bae, Jason Yoo, Sanghoon Ahn, Hee Shin Kang, Jiwhan Noh
    Abstract:

    Here, we investigate a method to distinguish the counterfeits by patterning multiple reflective type grating directly on the surface of the original product and analyze the Serial Number from its rotation angles of diffracted fringes. The micro-sized gratings were fabricated on the surface of the material at high speeds by illuminating the interference fringe generated by passing a high-energy pulse laser through the Fresnel biprism. In addition, analysis of the grating’s diffraction fringes was performed using a continuous wave laser.