Share Email Print
cover

Proceedings Paper

Application of laser technology to introduce security features on security documents in order to reduce counterfeiting
Author(s): Will G. J. M. Hospel
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

The use of laser technology for application of security features into security documents is introduced and specifically the security features which are applied directly into the security documents itself are covered. This innovative way of working creates effective deterrents to counterfeit and forgery. Laser applied security features become an integral part of the documents and its characteristics are unique and well-distinguishable. Together with the high levels of fineness and accuracy which can be achieved, this makes laser applied security features virtually impossible to reproduce with other means. Furthermore lasers can create first line security features which the public can easily verify with the naked eye. An introduction into laser technology gives better insight into the use of lasers in security documents. The laser offers high flexibility as the security features are created one by one under control of computer programs. As result a laser system can produce unique and personalised security features which can be applied automatically during one of the last production stages of the document. Laser applied security features are at this moment used on banknotes, passports and cheques. Examples of such applications will be shown. Also new types of laser applied security features will be introduced.

Paper Details

Date Published: 1 April 1998
PDF: 6 pages
Proc. SPIE 3314, Optical Security and Counterfeit Deterrence Techniques II, (1 April 1998); doi: 10.1117/12.304704
Show Author Affiliations
Will G. J. M. Hospel, Industrial Automation Integrators BV (Netherlands)


Published in SPIE Proceedings Vol. 3314:
Optical Security and Counterfeit Deterrence Techniques II
Rudolf L. van Renesse, Editor(s)

© SPIE. Terms of Use
Back to Top