The unique stereoscopic vision mechanism promises to be an effective authentication method. In this study, we will introduce attempts to develop a security feature using this mechanism as the basis for authentication.
Holograms as security devices are very important and used in a wide range of areas today. Therefore, hologram manufactures are continually developing new features that are more difficult to counterfeit. In this paper, the types and features of security holograms are reviewed. We also report on the latest hologram product, "DNP LED Authentication Hologram," which enables authentication by using an LED point-light source.
We have proposed an artificial fiber pattern as a technique for embedding electrical information into the real world such as a paper, a wallpaper and clothes. This technique can protect printed material by embedding the printing log. In recent studies, we tried to extract embedded information in an artificial fiber pattern using a high-resolution digital camera instead of a scanner. In addition, we attempted to use a relatively inexpensive and low-resolution Web camera as an input device because one of the important applications of our technique is an augmented reality system. In addition, from a design perspective, we examined different colors (cyan, magenta, and yellow) instead of the grayscale, and a specific pattern (a traditional Japanese katagami pattern for a kimono (i.e., Ise-katagami) ) instead of a paper fiber pattern.
The market for electronic-book (e-books) readers is expanding year-by-year. However, as the market grows, concerns of piracy are on the rise. Publishers and e-bookstores are encrypting the content and inserting watermarks to protect content. By applying Digital Rights Management (DRM) to files, reading is restricted to purchasers only, thus, preventing file copying and duplication. In addition, it is used for marketing by acquiring reading logs, and it is used for building an unlimited service for reading. Because it is common to share electronic files, even in the business world, DRM technology is also used to prevent document leakage and tampering. By applying DRM to a document, it is possible to limit the individuals who browse the file. Therefore, a trail management function, such as a confirmation key can be applied to a file. At present, there are emerging companies adopting this strategy. In the field of education, they are using DRM technology to focus on interactive lessons together with text distribution. In this report, we introduce, with examples, the usage of DRM in e-books and e-documents, which varies according to the type of service. We will also introduce the use of the new DRM technology as a future evolution.
Cyber security has become one of the primary topics in today's networked society. Cyber security, or information security, is about assuring confidentiality, integrity and availability of information resources, and attackers try to break them in various fashions. In this article, basic concepts about cyber security are presented, and primary threats, such as breach of secrecy, denial-of-service attacks and targeted cyber-attacks, and countermeasures, such as encryption and access control, are discussed.
There are many patented ideas on multi-beam technologies for internal-drum exposure systems, but none have been launched on the market. We also initiated and completed the study on multi-beam recording in the internal-drum system. The mechanism functioned properly, producing parallel lines from three beams in the internal drum. The idea we proposed was a simple optical design. The key components in the system for the mechanism to work are the "two-dimensional deflectors" that use acousto-optic devices. On the other hand, we needed to solve several issues caused by the multi-beam system, such as accurate position control, astigmatic distance adjustment, and so on. In this paper, we explain the new principle of multi-beam recording for the internal drum system, designs of deflectors, optics, and control systems.