Paper
1 April 1998 Counterfeit holograms and simulations
David J. Pizzanelli
Author Affiliations +
Proceedings Volume 3314, Optical Security and Counterfeit Deterrence Techniques II; (1998) https://doi.org/10.1117/12.304711
Event: Photonics West '98 Electronic Imaging, 1998, San Jose, CA, United States
Abstract
When the hologram was first introduced as a security device it was accepted as being a virtually un-counterfeitable security feature. In the decade that followed rumors grew up within the security industry that the hologram was actually far less secure than manufacturers had claimed, with some authorities stating that holograms offered no real security value whatsoever. Despite this, the use of holograms and related Diffractive Optically Variable Image Devices (DOVIDs) continues to increase both for product authentication and document security. This paper presents a number of case histories of hologram copying and simulation and attempts to differentiate the facts from the rumors on the subject of hologram counterfeiting.
© (1998) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
David J. Pizzanelli "Counterfeit holograms and simulations", Proc. SPIE 3314, Optical Security and Counterfeit Deterrence Techniques II, (1 April 1998); https://doi.org/10.1117/12.304711
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Holograms

Optical simulations

Manufacturing

Holography

Silver

3D modeling

3D image processing

RELATED CONTENT


Back to Top