Machine Readability and Automation of Holographic Authentication

Similar documents
An ISI 9001 : 2008 Company. Member:- Security Holograms, Holographic Labels, Bar Code labels & Packaging Labels

Security Holograms, Holographic Labels, Bar Code labels & Packaging Labels. An ISI 9001 : 2008 Company

PhysFest. Holography. Overview

The range of applications which can potentially take advantage of CGH is very wide. Some of the

"Correlation System for Security Validation and Verification Using An Encoded Phase Mask"

Physics 3340 Spring 2005

Lec. 26, Thursday, April 15 Chapter 14: Holography. Hologram

Holography as a tool for advanced learning of optics and photonics

Spherical Beam Volume Holograms Recorded in Reflection Geometry for Diffuse Source Spectroscopy

Basics of Holography

Confocal Imaging Through Scattering Media with a Volume Holographic Filter

From birth to present of hologram.

PhD Thesis. Balázs Gombköt. New possibilities of comparative displacement measurement in coherent optical metrology

Holography. Casey Soileau Physics 173 Professor David Kleinfeld UCSD Spring 2011 June 9 th, 2011

Interferometric key readable security holograms with secrete-codes

Advances in holographic replication with the Aztec structure

Holographic optical elements encoded security holograms with enhanced features

Ringing Effect In Holographic Image Processing

Gerhard K. Ackermann and Jurgen Eichler. Holography. A Practical Approach BICENTENNIAL. WILEY-VCH Verlag GmbH & Co. KGaA

Testing Aspherics Using Two-Wavelength Holography

The Photorefractive Effect

HOLOGRAPHIC DATA STORAGE

Security Based Variable Holographic Data Encryption using Spatial Light Modulator

Visual Security Solutions

Copyright 2009 SPIE and IS&T. This paper was (will be) published in Proceedings Electronic Imaging 2009 and is made available as an electronic

Exposure schedule for multiplexing holograms in photopolymer films

The Method of Verifying an Authenticity of Printing Production. Samples

Parallel Digital Holography Three-Dimensional Image Measurement Technique for Moving Cells

THE ULTIMATE DOCUMENT EXAMINATION SYSTEM STATE-OF-THE-ART SPECTRAL ANALYSIS FORENSIC LABS SECURITY PRINTERS IMMIGRATION AUTHORITIES

Following the path of light: recovering and manipulating the information about an object

Reviewers' Comments: Reviewer #1 (Remarks to the Author):

ZEBRA SOLUTIONS Create Highly Secure ID Cards

V I S O c o r e I n s p e c t

Diffraction, Fourier Optics and Imaging

Small-Particle Imaging with Digital Holography

UO-11 RECORDING and RECONSTRUCTING of HOLOGRAMS

INTRODUCTION TO MODERN DIGITAL HOLOGRAPHY

Holographic 3D imaging methods and applications

ELECTRONIC HOLOGRAPHY AND SHEAROGRAPHY NDE FOR INSPECTION

COOPERATIVE PATENT CLASSIFICATION

Study of self-interference incoherent digital holography for the application of retinal imaging

DEVELOPMENT PROCESS FOR PVCz HOLOGRAM

Copyright 2000 Society of Photo Instrumentation Engineers.

Particles Depth Detection using In-Line Digital Holography Configuration

HOE for clock distribution in integrated circuits : Experimental results

Authentication Solution for Currency Management

Basics of INTERFEROMETRY

Basics of INTERFEROMETRY

HOLOGRAPHY All rights Reserved. Page 3923

Printed Document Watermarking Using Phase Modulation

NEW! Reduce the threat of counterfeit ID cards with a protective layer of holographic images.

Parameter Selection and Spectral Optimization Using the RamanStation 400

Holographic Augmented Reality: Towards Near-to-Eye Electroholography

Holography. Introduction

NEW LASER ULTRASONIC INTERFEROMETER FOR INDUSTRIAL APPLICATIONS B.Pouet and S.Breugnot Bossa Nova Technologies; Venice, CA, USA

Holography (A13) Christopher Bronner, Frank Essenberger Freie Universität Berlin Tutor: Dr. Fidder. July 1, 2007 Experiment on July 2, 2007

Transmission electron Microscopy

Research Trends in Spatial Imaging 3D Video

Unique and sustainable surface refinement of products with innovative thin films: Ara Authentic. R. Domnick, Ara-Authentic GmbH

Integrated Photonics based on Planar Holographic Bragg Reflectors

HOLOGRAPHIC TAPES. Combines a high-impact look with simple security features.

ELECTRONIC HOLOGRAPHY

LEOK-3 Optics Experiment kit

HOLOGRAPHY NAEA Allison Procacci

"The Use of a Three Dimensional Hologram as an Interface Option" The Be More Urban Team considered the efficacy of a three-dimensional

Lab #2: Holography %RWKLPDJHVDUHLQWKHSXEOLFGRPDLQ

ECEN 4606, UNDERGRADUATE OPTICS LAB

Header. The Role of Optical Security Media in Secure Identification

Use of Computer Generated Holograms for Testing Aspheric Optics

lll lll a lldl DID lll DIII DD llll uui lll DIV 1101 lll ld ll Dl lli

Design of a digital holographic interferometer for the. ZaP Flow Z-Pinch

Important performance parameters when considering lasers for holographic applications

Advances in holography

Using double-exposure holographic techniques to evaluate the deformation of an aluminum can under stress

J. C. Wyant Fall, 2012 Optics Optical Testing and Testing Instrumentation

Detection of the Security Feature in the New 1 coin

High Contrast Imaging

SHADOWGRAPH ILLUMINIATION TECHNIQUES FOR FRAMING CAMERAS

Administrative details:

Effects of Photographic Gamma on Hologram Reconstructions*

Unmasking the Criminal Frauds and Forgeries

Holographic 3D disks using shift multiplexing. George Barbastathist, Allen Put, Michael Levene, and Demetri Psaltis

4-2 Image Storage Techniques using Photorefractive

Lab Report 3: Speckle Interferometry LIN PEI-YING, BAIG JOVERIA

PROPOSED SYSTEM FOR MID-AIR HOLOGRAPHY PROJECTION USING CONVERSION OF 2D TO 3D VISUALIZATION

Parallel Associative Search by use of a Volume Holographic Memory*

Fourier Transformation Hologram Experiment using Liquid Crystal Display. Kenji MISUMI, Yoshikiyo KASHII, Mikio MIMURA (Received September 30, 1999)

Electron Multiplying Charge-Coupled Devices

Notes: Light and Optics. Reflection. Refraction. Law of Reflection. Light goes straight 12/13/2012

Future of Photorefractive Based Holographic 3D Display

1. INTRODUCTION ABSTRACT

ANTI-COUNTERFEITING FEATURES OF ARTISTIC SCREENING 1

Point Spread Function. Confocal Laser Scanning Microscopy. Confocal Aperture. Optical aberrations. Alternative Scanning Microscopy

A Visual Indication of Environmental Humidity Using a Colour Changing Hologram Recorded in a Self-developing Photopolymer

Characterization of High Resolution Photographic Emulsion BB640 by Holographic Methods

ECEN 4606, UNDERGRADUATE OPTICS LAB

We have included the following information, which describes various security features available for identification cards.

In-line measurements of rolling stock macro-geometry

TOUCHABLE HOLOGRAMS AND HAPTIC FEEDBACK: REAL EXPERIENCE IN A VIRTUAL WORLD

Transmitting Light: Fiber-optic and Free-space Communications Holography

Transcription:

Machine Readability and Automation of Holographic Authentication International Conference Asian Anti-counterfeiting Association Shenzhen, China, 2007 P.T. Ajith Kumar President and Leading Scientist Light Logics Holography and optics www.lightlogics.in

Counterfeiting is a global menace.

Security against counterfeiting should start with the basic assumption that. Anything manmade can be counterfeited!

..and it has reached such a stage that Even God made objects are counterfeited!!!

Digital imaging and processing. Modern digital tools see images as color or monochrome dots and easily copy, scan, or capture., process and print... Counterfeiting / forgery made easy. The good old sanctity of photographic evidence was lost!!! During the first half of the 80s. Security Holography evolved as an effective tool to fight against counterfeiting and forgery.

Man on Mother Nature s Trail

Diffracting structures with Specific order

Diffracting structures with Specific order

Man on Mother Nature s Trail

A Hologram is a recording of a pattern formed by interference of two fields. Optical Holography

Security hologram. is generally, a hologram with a microscopic relief structure

Categories 2D/3D Dot-matrix e-beam Photopolymer

A 2D/3D Mastering 2D Layers of Images are Superposed at Different Depth to form a 3D Structure. Specific Colors are Assigned

2D/3D Hologram Security Depends lot on the Design and the Skill of the Holographer.

Image-matrix System Creates complex relief structures Creates identical structures if repeated

Dot-matrix holograms Security depends mainly on the integrity of the origination company.

E-beam origination Very Complex Patterns with High Resolution Less number of Players

Complex content in e-beam holograms Security depends mainly on the integrity of the origination company.

Why security holograms? Very attractive and efficient security device Security value. Difficult to copy by conventional digital tools Virtually impossible to duplicate, even by the originator Image formation through diffraction.

Reality. Authentication is not simple End users are not trained Features can not be advertised Overt Features alone does not Authenticate There are look alike holograms Clients / Customers are confused There is doubt about the efficacy of holography Needs Experts and Special tools for Authentication.

Authentication Client / end user Visual Inspection - Primary End User / client Reference Hologram - Intermediate Reading Devices Expert Specialized Tools - Third Level

Intermediate Systems

Machine Readability Features Need not to be Disclosed to the End User Yet, should be Verified Has to be Quick Reliable Expert Verification only if Machine Rejects.

True Reader Physical Structure Based Wavefront Based

Physical Structure Based A High Resolution Microscope can be used to image the structure of the hologram Even an AFM can be applied.

Ideal Situation Machine Images the Hologram Compares with the Reference Memory Result Original / Counterfeit

But., not easy! A high resolution hologram can hold about 200,000 spatial information per inch (8000 lines /mm). A reader that can read 1000 dots per sec, takes 460 days to read a 25mm/25mm hologram A 1000 lines/mm hologram and a reader that can read 10000 dots per sec takes about 18 Hours to Read a Hologram

Wavefront Based White light is scattered by the diffracting structure and a complex wavefront that varies in color and parallax is reconstructed. Hence it takes much time to capture the entire light field and compare it with the reference. Also great positioning accuracy is needed. Possibility of error is more

Complex content in e-beam holograms

Universal Credit Card Hologram Reader - with a reading accuracy of 99.99%, one innocent person out of every 10000 users will be jailed / quarantined. and as on today, a universal hologram reader is not fully feasible.

Feature based Machine Reader for Primary Authentication No feature is revealed End User can Handle the Reader Quick A Variety of Methods Good Reliability Possibility of Applying Various Emerging Developments in IT and Photonics for Secure coding and Reading.

Entry Level Feature Readers

Machine Readable Hologram Writing an example.

Photopolymer Based Writing

Laboratory System

Hologram Verification Screen capture

Results Data matrix Variable data Modulation Serial number 123 Data modulated signal wave Processed PP reconstruction

Phase Mask Spatially Random Phase Modulation Interferometric Features can also be used

2D Photonic Crystal Based

To Conclude. A Variety of Feature Based Hologram Readers can be Developed. Facilitates Effective and Secure Primary Authentication of Holograms. Much Less Error Rate and Faster than the Universal Hologram Reader. Possibility of Data Encryption and Added Security.