Paper
3 June 2004 Designing security holograms
Author Affiliations +
Proceedings Volume 5310, Optical Security and Counterfeit Deterrence Techniques V; (2004) https://doi.org/10.1117/12.527209
Event: Electronic Imaging 2004, 2004, San Jose, California, United States
Abstract
Over the years, holograms have evolved from purely decorative images to bona fide security devices. During this evolution, highly secure technologies have been developed specifically for product and document protection. To maximize the security potential of these hologram technologies requires a holistic approach. A hologram alone is not enough. To be effective it must be part of a security program and that security program needs to inform the design and development of the actual hologram. In the most elementary case the security program can be as simple as applying a tamper evident label for a one-day event. In a complex implementation it would include multi-level technologies and corresponding verification methods. A holistic approach is accomplished with good planning and articulation of the problem to be solved, and then meeting the defined security objectives. Excellent communication among all the stakeholders in a particular project is critical to the success of the project. The results of this dialogue inform the design of the security hologram.
© (2004) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Randy James, Michael Long, and Diana Newcomb "Designing security holograms", Proc. SPIE 5310, Optical Security and Counterfeit Deterrence Techniques V, (3 June 2004); https://doi.org/10.1117/12.527209
Lens.org Logo
CITATIONS
Cited by 2 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Holograms

Optical design

Inspection

Holography

Visualization

Computer security

Optical simulations

Back to Top