Share Email Print
cover

Proceedings Paper

Polygram technology in optical security
Author(s): Vladimir I. Girnyk; Valeriy I. Grygoruk; Ilya S. Borisov
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

In the context of the paper there are represented the theoretical foundations and technological aspects of creation of the Optical Security Devices by Polygram technology. This technology implies the images of different types combining. There are generally discussed the Computer-Generated Rainbow Holograms (CGRHs) of 3D images. This type of holographic images is distinguished by its reliability against counterfeit, caused by the fact it requires matchless in this field precision of printing system, using extreme for the Electron Beam Lithography Equipment, which is applied for the recording, values of the stamp sizes. On the other hand CGRHs certainly distinguish from similar optical and stereographic images, so they can be easy recognized on the visual level of the verification and don’t need application of any tools. The theoretical basis of the CGRHs creation is strictly presented in this paper. The special attention is paid to the right choice of the non-linear quantization parameters. This paper is mainly concentrated on the investigation of the CGRH combining both with another CGRHs and with the other different images implying by the Polygram technology. The methods of the space restriction of the separate CGRH topology with the information loss and without it are compared. There are carried out the investigations of the influence of the additional images on visual perception of the CGRH.

Paper Details

Date Published: 3 June 2004
PDF: 8 pages
Proc. SPIE 5310, Optical Security and Counterfeit Deterrence Techniques V, (3 June 2004); doi: 10.1117/12.526011
Show Author Affiliations
Vladimir I. Girnyk, Optronics Ltd. (Ukraine)
Valeriy I. Grygoruk, Kyiv Taras Shevchenko Univ. (Ukraine)
Ilya S. Borisov, Kyiv Taras Shevchenko Univ. (Ukraine)


Published in SPIE Proceedings Vol. 5310:
Optical Security and Counterfeit Deterrence Techniques V
Rudolf L. van Renesse, Editor(s)

© SPIE. Terms of Use
Back to Top