Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jainisha R. Shah is active.

Publication


Featured researches published by Jainisha R. Shah.


electronic imaging | 2006

Overt security features through digital printing

Mark J. Hampden-Smith; Scott Haubrich; Ralph E. Kornbrekke; Jainisha R. Shah; Rimple Bhatia; Ned Jay Hardman; Rich Einhorn

Digital printing technology represents a counterfeiting threat and a counterfeiting deterrence opportunity. Digital reproduction methods have been used to produce holographic and printed features similar to those on banknotes. As digital technology continues to improve, the quality of those features will become nearly indistinguishable from intaglio printing, offset printing and holograms. Optically active devices and inks have been useful to slow counterfeiters, but security document and feature designers need more tools. The toolbox for digital technologies is very large and being exploited by the counterfeiters, but their toolbox has been limited to commercially available digital technologies. Security designers also need to take advantage of this toolbox with the additional lever of secure materials. By leveraging digital technologies with secure materials, variable information and integration with other security features, security document designers can create new, attractive features that are hard to replicate. The high level of difficulty to create security materials in the sub-micron to nanometer size range with multiple functionalities is one barrier. Creating inks that are formulated to fit the stringent requirements for custom digital printing methods creates another barrier to unauthorized reproduction. All of the other valuable aspects of digital technology are therefore accessible only to those with access to these secure materials. Leveraging these digital materials to make optical effects make them useful for the end-user authentication. Furthermore, use of digital technologies allows the incorporation of variable data that can be authenticated visually or using proprietary algorithms and detection / sorting equipment.


Archive | 2006

Security features, their use and processes for making them

Mark J. Hampden-Smith; Richard A. Einhorn; Scott Haubrich; Ned Jay Hardman; Jainisha R. Shah; Rimple Bhatia; Ralph E. Kornbrekke


Archive | 2013

REFLECTIVE FEATURES WITH CO-PLANAR ELEMENTS AND PROCESSES FOR MAKING THEM

Richard A. Einhorn; Mark J. Hampden-Smith; Jainisha R. Shah; Miodrag Oljaca


Archive | 2010

Particulate compositions having plural responses to excitation radiation

Scott Haubrich; Jainisha R. Shah; Steven R. Cordero


Archive | 2010

Partikelzusammensetzung mit mehreren reaktionen auf erregungsstrahlung

Scott Haubrich; Jainisha R. Shah; Steven R. Cordero


Archive | 2010

Compositions de luminophore

Scott Haubrich; Jainisha R. Shah; Liam Noailles; Gary Darsey; Richard A. Einhorn; James Brewster


Archive | 2007

PROCESSES FOR MAKING REFLECTIVE FEATURES WITH CO-PLANAR ELEMENTS

Richard A. Einhorn; Mark J. Hampden-Smith; Jainisha R. Shah; Miodrag Oljaca


Archive | 2007

Reflektionsmerkmale mit coplanaren elementen und verfahren zu ihrer herstellung

Richard A. Einhorn; Mark J. Hampden-Smith; Jainisha R. Shah; Miodrag Oljaca


Archive | 2007

Élément réfléchissants avec parties coplanaires et leurs procédés de fabrication

Richard A. Einhorn; Mark J. Hampden-Smith; Jainisha R. Shah; Miodrag Oljaca


Archive | 2007

Processes for the manufacture of reflective characteristics with coplanar elements

Richard A. Einhorn; Mark J. Hampden-Smith; Jainisha R. Shah; Miodrag Oljaca

Collaboration


Dive into the Jainisha R. Shah's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge