Translator Disclaimer
1 April 1998 Counterfeit holograms and simulations
Author Affiliations +
Proceedings Volume 3314, Optical Security and Counterfeit Deterrence Techniques II; (1998) https://doi.org/10.1117/12.304711
Event: Photonics West '98 Electronic Imaging, 1998, San Jose, CA, United States
Abstract
When the hologram was first introduced as a security device it was accepted as being a virtually un-counterfeitable security feature. In the decade that followed rumors grew up within the security industry that the hologram was actually far less secure than manufacturers had claimed, with some authorities stating that holograms offered no real security value whatsoever. Despite this, the use of holograms and related Diffractive Optically Variable Image Devices (DOVIDs) continues to increase both for product authentication and document security. This paper presents a number of case histories of hologram copying and simulation and attempts to differentiate the facts from the rumors on the subject of hologram counterfeiting.
© (1998) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
David J. Pizzanelli "Counterfeit holograms and simulations", Proc. SPIE 3314, Optical Security and Counterfeit Deterrence Techniques II, (1 April 1998); https://doi.org/10.1117/12.304711
PROCEEDINGS
11 PAGES


SHARE
Advertisement
Advertisement
RELATED CONTENT

Fraud involving OVDs and possible security measures
Proceedings of SPIE (October 01 1991)
Hologram counterfeiting: problems and solutions
Proceedings of SPIE (April 01 1990)
Survey of holographic security systems
Proceedings of SPIE (April 01 1990)
Art of color holography: pioneers in change
Proceedings of SPIE (October 03 2000)

Back to Top