24 May 2018 Opto-electronic scanner for operational control of security holograms authenticity on documents
Author Affiliations +
At present time, security holograms are widely used to protect against counterfeiting of various documents and identity cards. To control the security holograms authenticity on documents, devices that exclude the influence of the human factor and increase the speed and reliability of identification are needed. The paper presents an automatic optic-electronic scanner for operational control of security holograms authenticity on documents. The algorithm of data processing, operation principle of scanner and its design are described. The use of modern scanning systems, high-speed recording devices, specially designed and manufactured components of the optical system, as well as the use of correlation filters in the algorithm for recognizing the information received from the hologram, significantly reduce the time and raise the reliability of the security holograms authenticity control process.
© (2018) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
I. K. Tsyganov, I. K. Tsyganov, V. V. Kolyuchkin, V. V. Kolyuchkin, V. E. Talalaev, V. E. Talalaev, N. V. Piryutin, N. V. Piryutin, S. B. Odinokov, S. B. Odinokov, L. A Naiden, L. A Naiden, V. D. Cheburkanov, V. D. Cheburkanov, E. Y. Zlokazov, E. Y. Zlokazov, "Opto-electronic scanner for operational control of security holograms authenticity on documents", Proc. SPIE 10679, Optics, Photonics, and Digital Technologies for Imaging Applications V, 106791V (24 May 2018); doi: 10.1117/12.2307227; https://doi.org/10.1117/12.2307227


High-volume manufacturing device overlay process control
Proceedings of SPIE (March 27 2017)
Overlay quality metric
Proceedings of SPIE (April 05 2012)
The growth of optically variable features on banknotes
Proceedings of SPIE (June 02 2004)
Online measuring system for amorphous strip thickness
Proceedings of SPIE (October 09 2000)
Synergistic combination of document security techniques
Proceedings of SPIE (April 06 2000)

Back to Top