Jainisha R. Shah
Cabot Corporation
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jainisha R. Shah.
electronic imaging | 2006
Mark J. Hampden-Smith; Scott Haubrich; Ralph E. Kornbrekke; Jainisha R. Shah; Rimple Bhatia; Ned Jay Hardman; Rich Einhorn
Digital printing technology represents a counterfeiting threat and a counterfeiting deterrence opportunity. Digital reproduction methods have been used to produce holographic and printed features similar to those on banknotes. As digital technology continues to improve, the quality of those features will become nearly indistinguishable from intaglio printing, offset printing and holograms. Optically active devices and inks have been useful to slow counterfeiters, but security document and feature designers need more tools. The toolbox for digital technologies is very large and being exploited by the counterfeiters, but their toolbox has been limited to commercially available digital technologies. Security designers also need to take advantage of this toolbox with the additional lever of secure materials. By leveraging digital technologies with secure materials, variable information and integration with other security features, security document designers can create new, attractive features that are hard to replicate. The high level of difficulty to create security materials in the sub-micron to nanometer size range with multiple functionalities is one barrier. Creating inks that are formulated to fit the stringent requirements for custom digital printing methods creates another barrier to unauthorized reproduction. All of the other valuable aspects of digital technology are therefore accessible only to those with access to these secure materials. Leveraging these digital materials to make optical effects make them useful for the end-user authentication. Furthermore, use of digital technologies allows the incorporation of variable data that can be authenticated visually or using proprietary algorithms and detection / sorting equipment.
Archive | 2006
Mark J. Hampden-Smith; Richard A. Einhorn; Scott Haubrich; Ned Jay Hardman; Jainisha R. Shah; Rimple Bhatia; Ralph E. Kornbrekke
Archive | 2013
Richard A. Einhorn; Mark J. Hampden-Smith; Jainisha R. Shah; Miodrag Oljaca
Archive | 2010
Scott Haubrich; Jainisha R. Shah; Steven R. Cordero
Archive | 2010
Scott Haubrich; Jainisha R. Shah; Steven R. Cordero
Archive | 2010
Scott Haubrich; Jainisha R. Shah; Liam Noailles; Gary Darsey; Richard A. Einhorn; James Brewster
Archive | 2007
Richard A. Einhorn; Mark J. Hampden-Smith; Jainisha R. Shah; Miodrag Oljaca
Archive | 2007
Richard A. Einhorn; Mark J. Hampden-Smith; Jainisha R. Shah; Miodrag Oljaca
Archive | 2007
Richard A. Einhorn; Mark J. Hampden-Smith; Jainisha R. Shah; Miodrag Oljaca
Archive | 2007
Richard A. Einhorn; Mark J. Hampden-Smith; Jainisha R. Shah; Miodrag Oljaca