Share Email Print

Proceedings Paper

Designing security holograms
Author(s): Randy James; Michael Long; Diana Newcomb
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Over the years, holograms have evolved from purely decorative images to bona fide security devices. During this evolution, highly secure technologies have been developed specifically for product and document protection. To maximize the security potential of these hologram technologies requires a holistic approach. A hologram alone is not enough. To be effective it must be part of a security program and that security program needs to inform the design and development of the actual hologram. In the most elementary case the security program can be as simple as applying a tamper evident label for a one-day event. In a complex implementation it would include multi-level technologies and corresponding verification methods. A holistic approach is accomplished with good planning and articulation of the problem to be solved, and then meeting the defined security objectives. Excellent communication among all the stakeholders in a particular project is critical to the success of the project. The results of this dialogue inform the design of the security hologram.

Paper Details

Date Published: 3 June 2004
PDF: 11 pages
Proc. SPIE 5310, Optical Security and Counterfeit Deterrence Techniques V, (3 June 2004); doi: 10.1117/12.527209
Show Author Affiliations
Randy James, Pacific Holographics, Inc. (United States)
Michael Long, Pacific Holographics, Inc. (United States)
Diana Newcomb, Pacific Holographics, Inc. (United States)

Published in SPIE Proceedings Vol. 5310:
Optical Security and Counterfeit Deterrence Techniques V
Rudolf L. van Renesse, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?