Summary. Three different optical security systems are surveyed in this chapter. Their common feature is the appearance of meaningful images on the system's output. In the first system, two phase-only transparencies are placed in a 4f correlator such that a known output image is received. In the second system, two phase-only transparencies are placed together in a joint-transform correlator for the same purposes. In both cases, the two phase masks are designed with an iterative optimization algorithm with constraints in the input and the output domains. In addition to simple verification, these security systems are capable of identifying the type of input mask according to the corresponding output image it generates. The third system is different from the two others in the sense that the system's input signal also is a meaningful image. This last system can offer various solutions for steganography, watermarking, and information coding. This chapter summarizes research first published in [1-3].
IntroductionOptical technologies have recently been employed in data security [4][5][6][7]. Compared with traditional computer and electrical systems, optical technologies offer primarily two types of benefits. (1) Optical systems have an inherent capability for parallel processing; that is, rapid transmission of information. (2) Information can be hidden in any of several dimensions, such as phase or spatial frequency; that is, optical systems have excellent capability for encoding information.In several pioneering studies [4][5][6], the authors demonstrated different optical verification systems for information security applications based on optical correlations. These systems correlate two functions: one, the lock, is always inside the correlator, and the other, the key, is presented to the system by the user in the verification stage. Mostly, the systems determine whether the input is true or false by detecting the correlation peak in the output plane. The next generation of these security systems should offer a higher level of security and more sophisticated services than the simple verification offered by