Journal of Printing Science and Technology
Online ISSN : 1882-4935
Print ISSN : 0914-3319
ISSN-L : 0914-3319
Volume 54, Issue 2
Displaying 1-6 of 6 articles from this issue
Special Reviews : Security Guard Technology
  • Shigeru MORINAGA
    2017 Volume 54 Issue 2 Pages 094-098
    Published: 2017
    Released on J-STAGE: May 16, 2017
    JOURNAL FREE ACCESS
    The unique stereoscopic vision mechanism promises to be an effective authentication method. In this study, we will introduce attempts to develop a security feature using this mechanism as the basis for authentication.
    Download PDF (874K)
  • Shin-ichiro SUZUKI
    2017 Volume 54 Issue 2 Pages 099-102
    Published: 2017
    Released on J-STAGE: May 16, 2017
    JOURNAL FREE ACCESS
    Holograms as security devices are very important and used in a wide range of areas today. Therefore, hologram manufactures are continually developing new features that are more difficult to counterfeit. In this paper, the types and features of security holograms are reviewed. We also report on the latest hologram product, "DNP LED Authentication Hologram," which enables authentication by using an LED point-light source.
    Download PDF (641K)
  • Keiichi IWAMURA, Kitahiro KANEDA
    2017 Volume 54 Issue 2 Pages 103-111
    Published: 2017
    Released on J-STAGE: May 16, 2017
    JOURNAL FREE ACCESS
    We have proposed an artificial fiber pattern as a technique for embedding electrical information into the real world such as a paper, a wallpaper and clothes. This technique can protect printed material by embedding the printing log. In recent studies, we tried to extract embedded information in an artificial fiber pattern using a high-resolution digital camera instead of a scanner. In addition, we attempted to use a relatively inexpensive and low-resolution Web camera as an input device because one of the important applications of our technique is an augmented reality system. In addition, from a design perspective, we examined different colors (cyan, magenta, and yellow) instead of the grayscale, and a specific pattern (a traditional Japanese katagami pattern for a kimono (i.e., Ise-katagami) ) instead of a paper fiber pattern.
    Download PDF (1164K)
  • Atsushi NARUI
    2017 Volume 54 Issue 2 Pages 112-115
    Published: 2017
    Released on J-STAGE: May 16, 2017
    JOURNAL FREE ACCESS
    The market for electronic-book (e-books) readers is expanding year-by-year. However, as the market grows, concerns of piracy are on the rise. Publishers and e-bookstores are encrypting the content and inserting watermarks to protect content. By applying Digital Rights Management (DRM) to files, reading is restricted to purchasers only, thus, preventing file copying and duplication. In addition, it is used for marketing by acquiring reading logs, and it is used for building an unlimited service for reading. Because it is common to share electronic files, even in the business world, DRM technology is also used to prevent document leakage and tampering. By applying DRM to a document, it is possible to limit the individuals who browse the file. Therefore, a trail management function, such as a confirmation key can be applied to a file. At present, there are emerging companies adopting this strategy. In the field of education, they are using DRM technology to focus on interactive lessons together with text distribution. In this report, we introduce, with examples, the usage of DRM in e-books and e-documents, which varies according to the type of service. We will also introduce the use of the new DRM technology as a future evolution.
    Download PDF (539K)
  • Hirofumi YAMAKI
    2017 Volume 54 Issue 2 Pages 116-119
    Published: 2017
    Released on J-STAGE: May 16, 2017
    JOURNAL FREE ACCESS
    Cyber security has become one of the primary topics in today's networked society. Cyber security, or information security, is about assuring confidentiality, integrity and availability of information resources, and attackers try to break them in various fashions. In this article, basic concepts about cyber security are presented, and primary threats, such as breach of secrecy, denial-of-service attacks and targeted cyber-attacks, and countermeasures, such as encryption and access control, are discussed.
    Download PDF (243K)
Original Paper
  • Hidetoshi SHINADA, Katsuto SUMI, Norihisa TAKADA, Takeshi FUJII
    2017 Volume 54 Issue 2 Pages 120-128
    Published: 2017
    Released on J-STAGE: May 16, 2017
    JOURNAL OPEN ACCESS
    There are many patented ideas on multi-beam technologies for internal-drum exposure systems, but none have been launched on the market. We also initiated and completed the study on multi-beam recording in the internal-drum system. The mechanism functioned properly, producing parallel lines from three beams in the internal drum. The idea we proposed was a simple optical design. The key components in the system for the mechanism to work are the "two-dimensional deflectors" that use acousto-optic devices. On the other hand, we needed to solve several issues caused by the multi-beam system, such as accurate position control, astigmatic distance adjustment, and so on. In this paper, we explain the new principle of multi-beam recording for the internal drum system, designs of deflectors, optics, and control systems.
    Download PDF (1043K)
feedback
Top