Paper
7 April 2000 Design and development of an effective optical-variable-device-based security system incorporating additional synergistic security technologies
Gary R. Wolpert
Author Affiliations +
Abstract
Optically variable devices (OVDs) are becoming ever more popular as tools to provide security for documents and products subject to counterfeiting, forgery, and/or diversion. Issues faced during the design and implementation of OVDs for a specific security application include matching the proper security feature for its intended function, determining the method of the security features authenticity, and incorporating effective anti- counterfeiting protection for the OVD itself. Combining additional synergistic security technologies can be an effective approach to meeting the desired objectives in designing and implementing a security feature.
© (2000) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Gary R. Wolpert "Design and development of an effective optical-variable-device-based security system incorporating additional synergistic security technologies", Proc. SPIE 3973, Optical Security and Counterfeit Deterrence Techniques III, (7 April 2000); https://doi.org/10.1117/12.382212
Lens.org Logo
CITATIONS
Cited by 15 patents.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Visualization

Security technologies

Printing

Magnetism

Computer security

Luminescence

RELATED CONTENT

Authentication of travel and breeder documents
Proceedings of SPIE (September 12 2021)
How do you select the right security features for your...
Proceedings of SPIE (April 01 1998)
The new color of money: safer, smarter, more secure
Proceedings of SPIE (June 03 2004)
Polygram technology in optical security
Proceedings of SPIE (June 03 2004)
Survey of holographic security systems
Proceedings of SPIE (April 01 1990)
Creating variable data UV signals for security applications
Proceedings of SPIE (January 28 2008)

Back to Top