PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.
Since the introduction of a design methodology for Dutch banknotes, the quality of Dutch paper currency has improved in more than one way. The methodology is question provides for (i) a design policy, which helps fix clear objectives; (ii) design management, to ensure a smooth cooperation between the graphic designer, printer, papermaker an central bank, (iii) a program of requirements, a banknote development guideline for all parties involved. This systematic approach enables an objective selection of design proposals, including security features. Furthermore, the project manager obtains regular feedback from the public by conducting market surveys. Each new design of a Netherlands Guilder banknote issued by the Nederlandsche Bank of the past 50 years has been an improvement on its predecessor in terms of value recognition, security and durability.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The more than 75 year old Hungarian Banknote Printing Corporation is an enterprise with a rich history. It is located in the very center of the capital, only some blocks away form the Parliament. Most people on this side of the Atlantic may not even have heard about the Hungarian currency, the Forint. Some may remember that after the WWII it was Hungary, where the severest hyperinflation in the world took place. As we come from a manufacturing company , we can give you information about deliberation and experiences of application of optically variable features on banknotes and some observations made in the past two years since the new Hungarian bank note series is ins circulation.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
There is a 64 billion dollar annual unattended cash transaction business in the US with 10 to 20 million daily transactions. Even small problems with the machine readability of banknotes can quickly become a major problem to the machine manufacturer and consumer. Traditional note designs incorporate overt security features for visual validation by the public. Many of these features such as fine line engraving, microprinting and watermarks are unsuitable as machine readable features in low cost note acceptors. Current machine readable features, mostly covert, were designed and implemented with the central banks in mind. These features are only usable by the banks large, high speed currency sorting and validation equipment. New note designs should consider and provide for low cost not acceptors, implementing features developed for inexpensive sensing technologies. Machine readable features are only as good as their consistency. Quality of security features as well as that of the overall printing process must be maintained to ensure reliable and secure operation of note readers. Variations in printing and of the components used to make the note are one of the major causes of poor performance in low cost note acceptors. The involvement of machine manufacturers in new currency designs will aid note producers in the design of a note that is machine friendly, helping to secure the acceptance of the note by the public as well as acting asa deterrent to fraud.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The great variety of existing security features can cause difficulty in choosing the adequate set for a particular security document. Considering the cost/benefit aspects with respect to the overall protection performance requested, a choice has to be made, for example, between either few features of high-security value or numerous many, less- resistant features. Another choice is the high versus low complexity of one particular features. A study aimed at providing a decision basis is a challenging matter because it involves human factors. Attention, perception, physiology of seeing and habits - to name some of the factors - are intangibles and are subject to evaluations involving normally a great number of experiments, if they are to be representative. The opportunity was given for a case study with the introduction of new Swiss banknotes between 1995 and 1998, because the new banknotes represent a novelty in the sense of the multiplicity and interplay of its optical security features. We have analyzed 652 articles which appeared in the press media concerning the new banknotes, seeking especially for peoples' reaction towards the security features.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Optically variable devices (OVDs) are becoming ever more popular as tools to provide security for documents and products subject to counterfeiting, forgery, and/or diversion. Issues faced during the design and implementation of OVDs for a specific security application include matching the proper security feature for its intended function, determining the method of the security features authenticity, and incorporating effective anti- counterfeiting protection for the OVD itself. Combining additional synergistic security technologies can be an effective approach to meeting the desired objectives in designing and implementing a security feature.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Software Piracy is estimated to cost software companies over eleven billion dollars per year in lost revenue worldwide. Over fifty three percent of all intellectual property in the form of software is pirated on a global basis. Software piracy has a dramatic effect on the employment figures for the information industry as well. In the US alone, over 130,000 jobs are lost annually as a result of software piracy.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The personal computer and digital photography boom of the last decade has fueled growth of a variety of high quality imaging peripherals. Personal computer scanners and color printers are now widely available as prices have fallen rapidly and quality continues to improve. The cost of a high-quality color scanner has stabilized under 150 dollars US. High-quality ink-jet printers are available for under 200 dollars US. Powerful, easy to use image processing software is typically with both printers and scanners at no additional charge. This combination of powerful technology at a low price point has increased the counterfeiting and forgery threat for valuable identity documents. As traditional, optically based techniques have become less effective against digital reproduction, new methods must be developed to mitigate the threat. Digital watermarks can be used to create self-authenticating identify documents to directly address these new threats. Digital watermarks are: imperceptible, so they do not impact the visual quality of the document; robust through the print and scan operation; and require not physical real estate on the document. This aper examines how digital watermarks can be used in identity documents. It explores the key system requirements and technical challenges in enhancing physical document authentication systems with digital watermarks.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Traditional security systems are becoming more and more useless as the digital technology moves on. Digital Graphical Systems and their increasing technology are now seriously forcing the security printing industry to start thinking 'digital'. Terms like digital signal and image processing, trail tracing, spread spectrum and digital watermarking, etc. are steadily moving into the security printers vocabulary. Digital technology should not only be seen as a threat but merely as an opportunity for security printers. This same technology can be used for a better implementation and integration of not just the tradition non-variable security feature but especially variable security features into security documents. Depending on the field of application these digital security features can be integrated into a design using localized spectrum, spread spectrum or full spectrum technology. In this presentation some applications will be explained and it will be shown how these technologies can be used to provide Security Solutions for the next Millennium.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The ability to print high-resolution thermochromic indicia, combining conventional inks with sophisticated printing technologies to either camouflage latent messages or create a warning message when copied, is new. (1) For Authentication: Offset thermochromic inks can trap a message that is printed in conventional ink. The conventional ink must match the thermochromic ink in density and color hue in order to perfectly hide at typical office room temperature. This technique is very difficult to manufacture. Even if a fraudster was to obtain the protected ink, the technology is still extremely difficult to replicate. (2) For Copy Protection: Irregular pattern graphics printed in thermochromic ink over a linear Copy/Void message, or dot pattern Copy/Void message, allows for superior protection against replication. The thermochromic pantograph camouflages the Copy/Void message. But, because thermochromic inks are both temperature sensitive and low in color pigment, the Copy/Void message prints through the ink onto the copy. This technology allows for an increase in disparity between the message and the background screen; maximizing protection effectiveness. Documents utilizing ThermoSafe and TouchSafe technologies have been produced in the tens of millions as a fraud deterrent. To our knowledge these security technologies have yet to be compromised.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A human expert observer can be employed to identify the production source of a print. The observer achieves this task by visual inspection of the print using a microscope. However, there are cases when the expert observer fails to identify correctly the production source. It is for this reason that the development of a method which can identify the production source is under consideration. This paper discusses the initial stages of the project which focuses on the development of a system that can classify prints from three different digital printing process. The system comprised an image analyzer that supplied image data from the print samples for initial analysis using a data pre- processing program and artificial neural networks which then used the pre-processed data to produce the classification models. The three different digital printing processes employed in this investigation were laser printing, optical photocopying and inkjet printing. Print samples were obtained from a range of laser printers,,optical photocopiers and inkjet printers. The prints used in the investigation were of a monochrome image of a square. The results show that the system is capable of classifying prints accurately for the range of printing machines and the image used in the trials.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The biological photo chrome bacteriorhodopsin occurs in nature in the form of a 2D crystalline lattice. In this form, the so-called purple membranes, it is astonishingly stable towards chemical and thermal degradation. Variants of the naturally occurring bacteriorhodopsin can be switched between a purple and a yellowish state with yellow and blue light - no UV light is required. The application of bacteriorhodopsin in the form of a photochromic ink is described. In addition to the optical effect, which can be checked easily without instrumentation, additional optional security elements can be hidden in the material which are very hard to detect and to copy. Among them is the alteration of the aminoacid sequence of bacteriorhodopsin in positions which do not interact with its photochemical properties. By this and related methods even single production batches may be identified. The price of the material to date is too high for a broad commercial application but current efforts to reduce the production costs by several orders of magnitude look promising.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Clone resistance of most of all anti-counterfeiting techniques depends upon secret identifiers or difficulty of reproduction. However, these kinds of techniques are no use if a counterfeiter has enough financial a power to work the secret out or toe overcome the difficulty. We have focused on, among others, random patterns which can be inevitably difficult to reproduce. Consequently, we have developed a document protection system which utilizes random patterns of magnetic micro-fibers in substrates of documents. We have also applied cryptography to the system. The system verifies and authenticates a stochastic feature using pre-stored template data and a digital signature. The stochastic feature and the digital signature respectively prevent 'dead copying' and counterfeiting/alteration of the recorded data such as a value of the card. Therefore security of the system depends upon difficulty both in reproduction of the stochastic feature and in analysis of the digital signature. We have evalut3ed the security of the system for several kinds of criminal attacks. Some criminals may try to counterfeit a stochastic feature by modeling on a genuine document. In our paper we discuss security evaluation of our document protection system against such kinds of criminal methods and also discus a countermeasure and its difficulty.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Protecting identification documents against fraud attacks means constant innovation. Enschede/Sdu has developed a plastic security document with three new optical security features, which can easily be verified with the naked eye. The properties of plastics, especially the thermo plastic behavior, makes it possible to incorporate some elements into the document which are not possible with paper.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Guardian substrate is a coated polymer film that has demonstrated its suitability as a substrate for variety of printed security documents. Guardian consists of a transparent flexible polymer core layer that is coated on both sides with an opacifying coating that can be printed on using conventional printing techniques. Probably the most evolutionary feature of this substrate architecture is that is provides the facility to create areas on a document that are either transparent or semi-transparent, depending on how the coating is applied. Now for the first time documents can be secured using devices that rely on transmission through a medium with high optical clarity. Guardian substrate provides the flexibility of varying the degree of opacity to suit the device being employed. This paper discusses the benefits of this important capability, using a number of new and adapted devices to demonstrate the potential of this new platform.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
According to the counterfeiting intelligence Bureau, hologram s are the leading device used for the authentication of branded products. Similarly, it is arguable that they have become the leading device added to security documents to improve their authentication. In this paper we show the significance of this to the hologram producers; examine the extent to which holograms meet the emerging needs of brand owners and document issuers, and explore the ways that holographic products might evolve to become multi-part items to continue to meet the needs of those who seek authentication. Our conclusion is that hologram scan no longer 'walk alone' as stand-alone items for product or document authentication.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
With linear photo polymerization (LPP) ROLIC has developed a new photo-patternable technology which enables to align not only conventional liquid crystals bu also LCP. ROLICs optical security device technology derives from its LPP/LCP technology. LPP/LCP security devices are crated by structured photo-alignment of an LPP layer through photo- masks, thus generating a high resolution, photo-patterned aligning layer which carries the aligning information of the image to be created and which is machine readable. The subsequent LCP layer transforms the aligning information into an optical phase image. Among a large number of possible LPP/LCP optical effects that lead to LPP/LCP security devices - all of them with distinct optical appearance - we will concentrate on the following LPP/LCP security elements: Reflective and transmissive LPP/LCP security devices for 2nd level inspection applications. LPP/LCP images are invisible when viewed with the naked eye but becomes visible when viewed through a polarizer. Rotation of the polarizer leads to contrast inversion: i.e. the image changes from 'positive' to 'negative' which is an additional unique security feature. Other types of LPP/LCP security devices are based on cholesteric films. We will present 2nd level cholesteric LPP/LCP devices which can be sued as overlays and superimposed on printed information which remains visible through the overlay.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A novel opto-electronic system has been developed using a diffractive code for the machine verification of the contents of the electronic memory of integrated-circuit (IC) cards to impeded attacks against IC card security. Through engineering of the diffractive microstructures, the intensity distribution of the diffracted light can be tailored for optical codes of high security, uniqueness and unambiguous identification. By measuring the diffraction properties of the optical code, the authenticity of the IC card can be checked. The diffractive code further provides a link to the information stored in the IC memory. The demonstrated diffractive-optical code is of the WORM type; that is, it is a write-once, read-many times memory. The data recorded in the diffractive optical code are compared to the data of the IC-card electronic memory using an encryption algorithm and are used to prevent tempering and alteration of the data stored in the IC-card electronic memory.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
We will show various diffractive features which are easy to verify and highly secure against attempts to counterfeit. These features are based on engineered surface relief structures which allow one to tailor the diffraction properties to obtain the desired effects. The security is based on complex diffraction structures rather than on complex image content, allowing the realization of relative simple feature designs, which are favorable from an ergonomic point of view. The unique properties of the engineered diffraction structures can be visualized, if an appropriate reference is provided, against which the observer can compare. We follow the idea that the optical effects in a well designed security feature must be interdependent in the sense of coherence or self- referencing. Various examples are presented, showing unique self-referencing first-line security features for document applications, which are clearly recognizable and easy to communicate. The presented effects are resilient against attempts to counterfeit by holographic techniques.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The term 'computer generated hologram' (CGH) describes a diffractive structure strictly calculated and recorded to diffract light in a desired way. The CGH surface profile is a result of the wavefront calculation rather than of interference. CGHs are able to form 2D and 3D images. Optically, variable devices (OVDs) composed of diffractive gratings are often used in security applications. There are various types of optically and digitally recorded gratings in security applications. Grating based OVDs are used to record bright 2D images with limited range of cinematic effects. These effects result form various orientations or densities of recorded gratings. It is difficult to record high quality OVDs of 3D objects using gratings. Stereo grams and analogue rainbow holograms offer 3D imaging, but they are darker and have lower resolution than grating OVDs. CGH based OVDs contains unlimited range of cinematic effects and high quality 3D images. Images recorded using CGHs are usually more noisy than grating based OVDs, because of numerical inaccuracies in CGH calculation and mastering. CGH based OVDs enable smooth integration of hidden and machine- readable features within an OVD design.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Although Diffractive Optically Variable Image Devices (DOVIDs) are a relatively recent addition to the armory available to the currency printer they are already used on more than 80 banknote denominations worldwide. Design and integration of the DOVID into the thematic sense of the whole note are established as critical factors in insuring ease of recognition and integrity of the document. The effects of scatter as a result of roughness at the paper surface are handled in simplistic communication terms. Practical improvements are offered that can improve the legibility of the device on the document. The most popular form of application of the DOVID to a banknote is s a discrete image or contiguous stripe that is carried as a metallized transfer layer on a web of hot-stamping foil. While many security printers are familiar with the application of conventional hot-stamping foil the need to maintaining web stability for the accurate placement of images posses additional challenges. Recommendations are offered, again from a practical perspective, that can improve the overall speed and accuracy of the transfer process.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Diffraction gratings and liquid crystals are use4d as security features for document protection. We have studied the combination of these two features and have developed an optically variable device which is called 'CPLgram'. CPLgram is made of thin film of high polymer cholesteric liquid crystals which exhibit diffraction of light. The combination of diffraction gratings and cholesteric liquid crystals provides light diffraction, wavelength selectivity, color- shifting of reflection and circular polarization selectivity, for the deice. These characteristics make it vary difficult to counterfeit the devices. In our understanding, it is a new approach to combine these security features. The most striking characteristic of the combination is significant aspect of the combination is that customers can choose a device verification method from three types of methods depending on security requirements and/or cost demands; to examine the device (a) with the naked eye, (b) with a simple inspection tool, and (c) by verification equipment.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Optical variable devices are usually characterized by their physical objective properties, which are key elements to distinguish originals form fakes, especially in the court of law context, however, at the selection, planning or pre- production stages, an evaluation of devices could and should be performed, in view of its classification in a security scale. The ranking in this scale would be indicative of the likelihood of counterfeiting and would have to take into account not only the physical aspects, but also subjective ones such as the security of the legal manufacture or of the technology itself. In this paper, we propose a methodology and elaborate on a model for DOVID security measurement, based on Multi criteria Decision Analysis. Critical evaluation factors, related to technology, design and quality, are proposed, its impacts quantified and grouped in order to allow an evaluation of DOVID samples. Using this methodology all the aspects that contribute to the DOVID security might be assessed and inter-related, leading to a final classification and, in the long term, to a standard of security.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Quarter-wave interference films have seen numerous uses in the field of optical security, due to the strength of reflection, ability to select numerous colors, and especially for their conspicuous color shift. Decorative nanolayer quarter-wave polymeric material of greater than 100 layers have been known for twenty years, but did not have utility in the security market, because of their weak iridescent appearance. Through the use of polymers of higher refractive index difference, 3M has achieved strong reflectors with better band edge control. Extremely efficient broadband mirrors have been made for commercial use. By choosing the reflection to be in the near IR, a unique security laminate film is achieved. It is very transparent at normal incidence, and changes to a brilliant cyan at shallow viewing angles. This material is easily noticed by the typical observer, and is also machine- readable. The polymeric quarter wave mirror films may be fine-line embossed, permanently thinning the layers in that area, and further enhancing their appearance.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A method is presented to store biometric and/or other important information on an ID card in the form of a Card Hologram that cannot be read or duplicated without the use of a special Key Hologram that is secured inside of an automated reader. The Key Hologram produces the unique wavefront required to release the information contained in a complex, 3D diffraction pattern recorded in a volume hologram attached to the card. Experimental results are presented in which the image of an Air Force resolution target are recorded and reconstructed in a volume material using a random speckle wavefront and that cannot be viewed using a simple wavefront such as a collimated or diverging laser beam.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A new Optical Variable Device (OVD) technique is presented: the Lippmann OVD, based on interferential color photography. A system is under development where this type of unique photograph can be applied to personal documents as a new security device. For example, passports, travel documents, identification cards, driving licences, credit cards can carry a laminated Lippmann OVD. The Lippmann photograph is similar to the mass-produced embossed holograms, currently used in this field. However, each document can have its unique Lippmann OVD. The recording of the Lippmann OVD requires a special panchromatic photopolymer material as well as a special type of recording equipment. The main advantage of this new OVD is that it can be produced in- house by the document issuer. Lippmann OVDs are virtually impossible to copy and, certainly, cannot be copied by conventional photography or color copying machines. In addition, the authenticity of the Lippmann OVD can be verified by direct visual inspection, without the need for any equipment.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In this paper, we present a system for the practical implementation of phase-only optical encryption. Our approach is based on the use of the generalized phase contrast technique for the readout of decrypted information contained within the phase component of an optical wavefront. The decryption is achieved by superimposing a decrypting phase key and an encrypted phase mask in the image plane of an optical system and then applying the generalized phase contrast technique to generate an intensity pattern corresponding to the original encoded information. We have constructed an experiment system in which an encrypted binary phase mask is decrypted by a binary phase key that is implemented electronically on a phase-only spatial light modulator allowing a simplified electronic alignment of the key by scrolling its position with respect to the mask.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Together, OVP Security Pigment in OVI Security Ink, provide an excellent method of overt banknote protection. The effective use of overt security feature requires an educated public. The rapid rise in computer-generated counterfeits indicates that consumers are not as educate das to banknote security features as they should be. To counter the education issue, new methodologies have been developed to improve the validation of banknotes using the OVI ink feature itself. One of the new methods takes advantage of the overt nature of the product's optically variable effect. Another method utilizes the unique optical interference characteristics provided by the OVP platelets.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Most people in developed nations are familiar with the hologram. It appears on VISA, Discover and MasterCard credit cards. It is doubtful however, that a great number of people could identify the respective images. The public tends to confirm the presence of such a security device rather than verifying the actual image. As noted by Steve McGrew, "It is very rare that security holograms are subjected to close inspection in actual use" .Thus,there is now the opportunity for the use of poor counterfeits or the substitution of commercial holograms for the genuine security hologram. In an effort to thwart counterfeiters, the hologram industry has resorted to more complex products with multiple images as the device is rotated. These enhanced images provide the observer with a high level of "flash" or aesthetic appeal. Unfortunately, this added complexity does not confer added security because this complex imagery is hard to communicate and recollection of such imagery is difficult, if not impossible, to remember2 Every type of first order diffraction structure, including conventional holograms and grating images, has a major shortcoming even if encapsulated in a rigid plastic. Under an overcast sky or other diffuse illumination all diffraction orders expand and overlap so that the diffraction colors are lost. Under such viewing conditions all such devices look silvery or pastel at best. An additional hurdle that security holograms must overcome, to be truly secure, is the ease of which holograms can be counterfeited. One step and two step optical copying, direct mechanical copying and even re-origination have been extensively discussed over the Internet.3 Ways to counteract all these methods have been discussed but the conclusion was that none of the countermeasures, taken alone, was an effective deterrent. It has been discovered that by combining diffraction effects with thin film interference effects, a security device can be made with new enhanced features that allow for ready identification by the average person while still preserving complex optical patterns. This new security device, using LightGateTM technology, also appears to overcome the cited disadvantages of holographic technology.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Optically Variable Inks (OVI) are printing inks containing high precision, multi-layer interference filters as their constituent pigment. They display a strong and unique color change form a normal to an angled viewing position. During the last 10 years OVI has gained wide acceptance as an overt protection for numerous value documents including banknotes and ID cards. Meanwhile, continuous improvement has taken place over the last two years in a variety of areas.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Modern holographic security devices used as emblems against counterfeiting are being more difficult as they should oppress criminal world. 2D, 3D, 3D rainbow holograms or simple diffraction structures protecting documents can not be acceptable against illegal copying of important documents, banknotes or valuable products. Recent developments in technology of Optical variable devices permit world leaders to create more advanced security elements: Kinegrams, Exelgrams, Pixelgrams, Kineforms. These products are used for protecting the most confidential documents and banknotes, but now even their security level can not be enough and besides their automatic identification is vulnerable to factors of instability. We elaborate new visual security devices based on the usage of expensive and advanced technology of combined optical/digital security devices. The technology unites digital and analogue methods of synthesis and recording of visual security devices. The analogue methods include techniques of optical holography - different combinations of 2D/3D, 3D, 2D/3D + 3D structures. Basing on them the design with elements of 3D graphics including security elements and hidden machine- readable images are implemented. The digital methods provide synthesis of optical variable devices including special security elements, computer generated holograms and Kineforms. Using them we create determined and quasi-random machine-readable images. Recordings are carried out using the combined optical and electronic submicrometer technology elaborated by Optronics, Ltd. The results obtained show effectiveness of the combined technology permitting to increase the security level essentially that should increase tamper and counterfeit resistance during many years.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Banknotes are now frequently use din machines. The Federal Reserve Board and the US Department of the Treasury have identified a need to produce notes that are reliably accepted in a variety of machine applications. This paper describes the steps that led to identifying requirements of manufacturers of machines that process banknotes for test notes, and the program developed for the Bureau of Engraving and Printing to address those requirements.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Embossed holograms and othe rdiffractive optically variable devices are increasingly familiar security items on plastic cards, banknotes, securyt documetns and on branded gods and media to protect against counterfeit, protect copyright and to evidence tamper. This paper outlines some of the diffractive optical seuryt and printed security develoepd for this rapidly growing field and provides examles of some current security applications.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The US government recognizes the growing problem of counterfeiting currency using digital imaging technology, as desktop systems become more sophisticated, less expensive and more prevalent. As the rate of counterfeiting with this type of equipment has grown, the need for specific prevention methods has become apparent to the banknote authorities. As a result, the Treasury Department and Federal Reserve have begun to address issues related specifically to this type of counterfeiting. The technical representatives of these agencies are taking a comprehensive approach to minimize counterfeiting using digital technology. This approach includes identification of current technology solutions for banknote recognition, data stream intervention and output marking, outreach to the hardware and software industries and enhancement of public education efforts. Other aspects include strong support and cooperation with existing international efforts to prevent counterfeiting, review and amendment of existing anti- counterfeiting legislation and investigation of currency design techniques to make faithful reproduction more difficult. Implementation of these steps and others are to lead to establishment of a formal, permanent policy to address and prevent the use of emerging technologies to counterfeit currency.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The value of security features tends to decrease gradually, partly because of the continuously increasing ability of counterfeiters to counterfeit or imitate these features and partly because of the increasing capability and availability of equipment. As a countermeasure, numerous non-iridescent and iridescent optically variable devices (OVDs) are continuously being developed. The former comprise novel laser engraving techniques, the latter DOVIDs and ISISs. Although these novel techniques appear highly effective, there are indications that they are beginning to fail, not in the least because organized crime appears to have acquired some of those newer techniques. The response is the synergistic combination of those techniques, which combination expectedly remains beyond the capability of criminal organizations. This ongoing development is currently providing new and exciting security potential. Examples are combinations of diffractive and interference phenomena and of laser perforation techniques with OVDs. The latter combination provide strong protection against counterfeiting as well as forgery.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The prior artwork for a Dot-matrix hologram is always animated by a computer instead of a man made sculptured model. For a computer graphic software, it is very easy to interlace several bitmap graphics ona small area. So, if we generate an interlaced graphic and transfer the bitmaps to corresponding gratings which diffract the illumination light to a specific direction with respect to each individual graphic, then it will have several viewing images in different view angles. Hologram has special light characteristics that are difficult to duplicate, so it has intrinsic advantage for anti-counterfeiting application. For more guarantee of security to protect the value paper from the fraud activity. We use a more complex and delicate multi-image hologram to hold back the ambition of copycat. In this paper, will describe how to transfer the images that generated by computer to a hologram. The concept for interlace graphics, and the apparatus that is easy to generate the dot grating with respect to each bitmap in the image, and the practical samples that made by this technology for anti-counterfeiting purpose.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The US Bureau of Engraving and Printing produces over 9 billion Federal Reserve notes per year. Each note must maintain unfirm consistency for both security features and print quality. The quality control process necessary to assure the uniform nature of US currency requires a significant multi-tiered approach. Based on innovative optoelectronic techniques, individual security features are examined as a critical element during each phase of the production process. Print quality standards must also be strictly maintained and monitored to assure the uniformity of the most popular printed item in the world. This presentation describes the approach and some of the techniques developed and implemented in-house to carry out the necessary monitoring and control.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
DNA Technologies is harnessing the power of the genetic code to provide solutions to the problems of counterfeiting, forgery and product diversion. The Company intends to apply its enabling technology in the areas of fine-art authentication, fashion, currency and many other applications requiring essentially unbreakable encryption.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.