Paper
19 April 2002 Evaluation of DOVID security under first-line inspection
Ana Alexandra Andrade, Jose Manuel Rebordao
Author Affiliations +
Proceedings Volume 4677, Optical Security and Counterfeit Deterrence Techniques IV; (2002) https://doi.org/10.1117/12.462722
Event: Electronic Imaging, 2002, San Jose, California, United States
Abstract
The relative value of optical security features submitted to 1st line inspection - performed by the layman - depends on how easily they are memorized, recognized and identified. The relative security value of different Diffractive Optically Variable Image Devices (DOVID), under this type of inspection, depends on the same criteria taking specific forms for such kind of dense and dynamical visual elements. For DOVID, the relevant security components include image complexity, resemblance to other images, easiness of inspection, interconnection to product characteristics, and others. In this paper we review and analyze such kind of properties and how they can be used to implement a quantitative measure of the 1st line security value of DOVID, encompassing a number of constrains and specifications derived from human ergonomic factors. These insights are integrated in a broader context of an evaluation model of the security value of DOVID, elaborated through Multicriteria Decision Analysis methodologies, already assessed for 2nd line inspection.
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Ana Alexandra Andrade and Jose Manuel Rebordao "Evaluation of DOVID security under first-line inspection", Proc. SPIE 4677, Optical Security and Counterfeit Deterrence Techniques IV, (19 April 2002); https://doi.org/10.1117/12.462722
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Inspection

Visualization

Resistance

Neodymium

Adhesives

Optical components

RELATED CONTENT

Hologram counterfeiting: problems and solutions
Proceedings of SPIE (April 01 1990)
Designing security holograms
Proceedings of SPIE (June 03 2004)
Machine for continuous hologram production
Proceedings of SPIE (September 17 1993)
Security applications of embossed holograms
Proceedings of SPIE (April 01 1990)
Assessing DOVID security: a system approach
Proceedings of SPIE (April 07 2000)
Holography as a regenerator of architecture
Proceedings of SPIE (October 12 1994)

Back to Top