Interferometric key readable security holograms with secrete-codes

Similar documents
Holographic optical elements encoded security holograms with enhanced features

Testing Aspherics Using Two-Wavelength Holography

LOS 1 LASER OPTICS SET

Use of Computer Generated Holograms for Testing Aspheric Optics

Imaging Systems Laboratory II. Laboratory 8: The Michelson Interferometer / Diffraction April 30 & May 02, 2002

MASSACHUSETTS INSTITUTE OF TECHNOLOGY. 2.71/2.710 Optics Spring 14 Practice Problems Posted May 11, 2014

4-2 Image Storage Techniques using Photorefractive

Simple interferometric fringe stabilization by CCD-based feedback control

Holography (A13) Christopher Bronner, Frank Essenberger Freie Universität Berlin Tutor: Dr. Fidder. July 1, 2007 Experiment on July 2, 2007

A novel tunable diode laser using volume holographic gratings

Holography as a tool for advanced learning of optics and photonics

Computer Generated Holograms for Testing Optical Elements

Collimation Tester Instructions

Gerhard K. Ackermann and Jurgen Eichler. Holography. A Practical Approach BICENTENNIAL. WILEY-VCH Verlag GmbH & Co. KGaA

1.6 Beam Wander vs. Image Jitter

Exposure schedule for multiplexing holograms in photopolymer films

Effects of Photographic Gamma on Hologram Reconstructions*

NEW LASER ULTRASONIC INTERFEROMETER FOR INDUSTRIAL APPLICATIONS B.Pouet and S.Breugnot Bossa Nova Technologies; Venice, CA, USA

In-line digital holographic interferometry

CHAPTER 5 FINE-TUNING OF AN ECDL WITH AN INTRACAVITY LIQUID CRYSTAL ELEMENT

Exp No.(8) Fourier optics Optical filtering

Fabrication of large grating by monitoring the latent fringe pattern

Diffractive optical elements based on Fourier optical techniques: a new class of optics for extreme ultraviolet and soft x-ray wavelengths

Development of a Low Cost 3x3 Coupler. Mach-Zehnder Interferometric Optical Fibre Vibration. Sensor

Development of innovative fringe locking strategies for vibration-resistant white light vertical scanning interferometry (VSI)

Physics 3340 Spring 2005

Pixel size and pitch measurements of liquid crystal spatial light modulator by optical diffraction

Department of Mechanical and Aerospace Engineering, Princeton University Department of Astrophysical Sciences, Princeton University ABSTRACT

EE119 Introduction to Optical Engineering Fall 2009 Final Exam. Name:

EE119 Introduction to Optical Engineering Spring 2002 Final Exam. Name:

Computer Generated Holograms for Optical Testing

Fiber Optic Sensing Applications Based on Optical Propagation Mode Time Delay Measurement

Physical Optics. Diffraction.

PhysFest. Holography. Overview

Using double-exposure holographic techniques to evaluate the deformation of an aluminum can under stress

Rotation/ scale invariant hybrid digital/optical correlator system for automatic target recognition

USE OF COMPUTER- GENERATED HOLOGRAMS IN OPTICAL TESTING

Chapter 4: Fourier Optics

Non-intrusive refractometer sensor

9. Microwaves. 9.1 Introduction. Safety consideration

Superimposed surface-relief diffraction grating holographic lenses on azo-polymer films

3.0 Alignment Equipment and Diagnostic Tools:

LOPUT Laser: A novel concept to realize single longitudinal mode laser

Analysis of PIV photographs using holographic lenses in an anamorphic white light Fourier processor configuration

FIELD DISTRIBUTION IN THE INPUT COUPLING REGION OF PLANAR SINGLE-MODE WAVEGUIDES

Holography. Introduction

Project Staff: Timothy A. Savas, Michael E. Walsh, Thomas B. O'Reilly, Dr. Mark L. Schattenburg, and Professor Henry I. Smith

Speckle-free digital holographic recording of a diffusely reflecting object

3B SCIENTIFIC PHYSICS

Unit-23 Michelson Interferometer I

Physics 3340 Spring Fourier Optics

Interference [Hecht Ch. 9]

Infrared broadband 50%-50% beam splitters for s- polarized light

Optical sectioning using a digital Fresnel incoherent-holography-based confocal imaging system

Parallel Digital Holography Three-Dimensional Image Measurement Technique for Moving Cells

Spatial-Phase-Shift Imaging Interferometry Using Spectrally Modulated White Light Source

LEOK-3 Optics Experiment kit

EE119 Introduction to Optical Engineering Spring 2003 Final Exam. Name:

INTERFEROMETRIC VIBRATION DISPLACEMENT MEASUREMENT

A STUDY ON THE VIBRATION CHARACTERISTICS OF CFRP COMPOSITE MATERIALS USING TIME- AVERAGE ESPI

Lab Report 3: Speckle Interferometry LIN PEI-YING, BAIG JOVERIA

Contouring aspheric surfaces using two-wavelength phase-shifting interferometry

Modeling and analysis of an extrinsic Fabry-Perot interferometer performance using MATLAB

Three-dimensional quantitative phase measurement by Commonpath Digital Holographic Microscopy

Aberrations and adaptive optics for biomedical microscopes

Synthesis of projection lithography for low k1 via interferometry

The Formation of an Aerial Image, part 3

visibility values: 1) V1=0.5 2) V2=0.9 3) V3=0.99 b) In the three cases considered, what are the values of FSR (Free Spectral Range) and

Compound Holographic Optical Element System for Splitting and Concentrating Solar Spectrum on Laterally- Arranged Multiple Band Gap Solar Cells

Symmetrically coated pellicle beam splitters for dual quarter-wave retardation in reflection and transmission

Dynamic Phase-Shifting Electronic Speckle Pattern Interferometer

Full Color Holographic Optical Element Fabrication for Waveguide-type Head Mounted Display Using Photopolymer

J. C. Wyant Fall, 2012 Optics Optical Testing and Testing Instrumentation

Thin holographic camera with integrated reference distribution

Testing Aspheric Lenses: New Approaches

Fabrication of Extremely Short Length Fiber Bragg Gratings for Sensor Applications

Optics and Lasers. Matt Young. Including Fibers and Optical Waveguides

Basics of Holography

Metrology and Sensing

Real-time optical subtraction of photographic imagery for difference detection

Why is There a Black Dot when Defocus = 1λ?

Chapter Ray and Wave Optics

Polarization Experiments Using Jones Calculus

SUPPLEMENTARY INFORMATION

Study of self-interference incoherent digital holography for the application of retinal imaging

Wave optics and interferometry

2 CYCLICAL SHEARING INTERFEROMETER

3B SCIENTIFIC PHYSICS

Physics 431 Final Exam Examples (3:00-5:00 pm 12/16/2009) TIME ALLOTTED: 120 MINUTES Name: Signature:

Machine Readability and Automation of Holographic Authentication

COMPOSITE MATERIALS AND STRUCTURES TESTING BY ELECTRONIC HOLOGRAPHY

Module 5: Experimental Modal Analysis for SHM Lecture 36: Laser doppler vibrometry. The Lecture Contains: Laser Doppler Vibrometry

Laser Beam Analysis Using Image Processing

PHYS 3153 Methods of Experimental Physics II O2. Applications of Interferometry

Radial Polarization Converter With LC Driver USER MANUAL

Lithography. 3 rd. lecture: introduction. Prof. Yosi Shacham-Diamand. Fall 2004

Asphere testing with a Fizeau interferometer based on a combined computer-generated hologram

Title: Laser marking with graded contrast micro crack inside transparent material using UV ns pulse

Supplementary Figure 1. Effect of the spacer thickness on the resonance properties of the gold and silver metasurface layers.

Mach Zehnder Interferometer Apparatus:

Transcription:

PRAMANA c Indian Academy of Sciences Vol. 68, No. 3 journal of March 2007 physics pp. 443 450 Interferometric key readable security holograms with secrete-codes RAJ KUMAR 1, D MOHAN 2 and A K AGGARWAL 1, 1 Coherent Optics Division, Central Scientific Instruments Organisation, Sector 30, Chandigarh 160 030, India 2 Department of Applied Physics, Guru Jambheshwar University of Science & Technology, Hisar 125 001, India E-mail: aka1945@rediffmail.com MS received 21 August 2006; revised 27 October 2006; accepted 6 November 2006 Abstract. A new method is described to create secrete-codes in the security holograms for enhancing their anti-counterfeiting characteristics. To imitate these codes is difficult as pure phase objects having complex phase distribution function are used to modulate the object beam that is recorded in conjunction with an encoded interferometric reference beam derived from a key hologram. Lloyd s folding mirror interferometer is used to convert phase variations of the reconstructed wave-front into an intensity pattern for hologram authenticity verification. Creating the secrete-codes through an interferometric reference beam from the key hologram facilitates a multi-stage authenticity verification as well as easy repositioning of the security hologram through a specific Moiré pattern generated during the verification process. Keywords. Optical security; authenticity verification; security hologram. PACS Nos 42.40.-i; 42.25.Hz; 42.40.Kw; 42.30.Ms 1. Introduction Recently, there is a high level of interest in the application of optical techniques in the field of security and product authenticity verification owing to continuous increase in fraudulent cases worldwide. Optical methods offer parallel and real-time processing and provide various dimensions for optical information encryption such as phase, wavelength, polarization etc. in order to deter unauthorized access, copying, or falsification of the valuable products and documents. These parameters of optical waves have been exploited to realize various optical security systems. Representative examples of these systems include image encryption using random phase encoding, optical pattern recognition, fractional Fourier transform, joint transform correlation, phase only encryption etc. [1 4]. The above described systems are excellent in their own right but many of them require accurately fabricated complex masks and fine control of the optical axis alignment and also need specific and 443

Raj Kumar, D Mohan and A K Aggarwal costly equipment to decrypt the encrypted information. Apart from these, several simple encoding schemes such as use of encoded reference beam [5 7], Moiré pattern encoding [8 11], speckle pattern encoding [12] etc. have also been reported for authenticity verification and anti-counterfeit purposes in the embossed holograms. The present paper reports a simple method for enhancing the anti-counterfeiting ability of security holograms by embedding secrete-codes. Unlike visible holographic security codes [6 8] the secrete-codes, which are in the form of pure phase variations, cannot be detected by an intensity sensitive instrument, thus are extremely difficult for counterfeiting. The desired secrete-codes are created by interfering phase modulated object wave with an interferometric reference wave derived from a specially produced key hologram. During the hologram verification process illumination of security hologram with original reference wave generates a specific Moiré pattern in the observation plane. One of the main characteristics of this Moiré pattern is that it disappears on perfect repositioning of the genuine security hologram only. The chief security feature of these holograms (in addition to Moiré pattern and reconstruction of sharp focused spots at predetermined positions [11]) is that the secrete-codes remain concealed even for a perfectly repositioned security hologram until a decoding process is performed on the reconstructed wave-front to convert their phase variations into intensity variations. The paper reports the use of the simplest known interferometric scheme the Lloyd s mirror interferometer to convert the invisible phase variations of the reconstructed wave-front into detectable intensity pattern for hologram authenticity verification. 2. Principle of the method The method reported in this paper is based on the formation of a key hologram KH [11] having some unique characteristics and the security hologram in two recording steps. In the first recording step, the key hologram is formed by two holographic exposures on the same recording plate. In the first exposure a convergent beam O 1 is combined with a collimated reference beam R, while in the second exposure another convergent beam O 2, slightly different from O 1 is combined with the same reference beam R. Upon illumination of the processed KH with R, the reconstructed field R 1, which is a combination of O 1 and O 2, serves as an encoded interferometric reference wave to create the secrete-codes on the security hologram SH in the second recording step. Reading of SH through KH generates a specific Moiré pattern at the observation plane OP. Proper repositioning of SH results in the disappearance of these Moiré fringes. The secrete-code information is still invisible and a demodulating process is required to convert the invisible phase information into a visible intensity pattern. This could be accomplished by placing a Lloyd s mirror in proximity with one of the reconstructed focus spots and this is a quite simpler process than the earlier described methods of phase contrast [2] and Mach Zehnder interferometer [3] to convert phase variations into intensity pattern in the phase-only encryption systems. Let complex amplitude distributions of the beams O 1, O 2 and R are: O 1 = (A 0 /r 1 ) exp( jφ 1 ), O 2 = (A 0 /r 2 ) exp( jφ 2 ), 444 Pramana J. Phys., Vol. 68, No. 3, March 2007

Interferometric key readable security holograms and R = A r exp(jφ r ), (1) where φ 1 = kn 1 r 1, φ 2 = kn 2 r 2, φ r = kn r; and n 1, n 2, n are unit vectors along the directions of propagation of beams O 1, O 2 and R respectively; k = 2π/λ, λ is the wavelength of the light used and j = 1. A r and A 0 are the amplitude distributions of the corresponding beams. The processed KH upon illumination with R provides an encoded interferometric reference wave R 1 subsequently to be used for the formation of SH, given by [11] R 1 O 1 + O 2. (2) Equation (2) represents a sinusoidal grating pattern with transmittance function where g(x, y) = R 1 2 1 + cos φ, (3) φ = φ 2 φ 1 = 2πx/d, and d = λ/[2 sin(δα/2) cos{(2α + δα)/2}] represents its spatial period (for z = 0 position) and α and α + δα are the angles made by the directions of beams O 1 and O 2 respectively with the z-axis, i.e. with the direction of the reference beam R. The grating elements/lines run parallel to the y-axis. This encoded reference wave R 1 is used in conjunction with object wave O = (A o /r o ) exp[ j{φ o + ψ(x, y)}] (where ψ(x, y) is the phase distribution function of the pure phase object S = exp{jψ(x, y)} to be concealed and φ o = kn o r o ; n o is the unit vector along O) propagating at an angle β with the z-axis for making the concealed coded security hologram SH. Keeping the term of interest, the transmitted field from processed SH upon illumination by interferometric reference wave R 1 is t(x, y) R 1 2 O. (4) In the final reading process, if SH is slightly mis-positioned (say tilted by an angle θ with respect to the y-axis, and displaced longitudinally by a distance z from the original position) the transmittance function will be t (x, y) O[1 + cos 2π(x cos θ y sin θ)/d ]. (5) The intensity distribution in the observation plane due to illumination of mispositioned SH with R 1 is given by the product of transmittance functions g(x, y) and t (x, y) [13,14] I(x, y) = g(x, y) t (x, y) = O[1 + cos(2πx/d) + cos[2π(x cos θ y sin θ)/d ] + cos(2πx/d) cos[2π(x cos θ y sin θ)/d ], (6) where d is the effective period of grating pattern recorded on the mis-positioned SH. The first term in eq. (6) is a DC term, second and third terms are proportional Pramana J. Phys., Vol. 68, No. 3, March 2007 445

Raj Kumar, D Mohan and A K Aggarwal to the superimposing periods and the last term represents the Moiré pattern (figure 1) between these sinusoidal gratings. The last term is of our interest and can be rewritten with standard trigonometric relations as (O/2) cos[2π{x[(1/d) + cos θ/d ] y sin θ/d }] +(O/2) cos[2π{x[(1/d) cos θ/d ] + y sin θ/d }]. (7) In eq. (7) the first term generates a sum Moiré pattern, which has fine period, while the second term generates the difference Moiré pattern. The spatial period of this Moiré pattern is d m = dd /(d 2 + d 2 2dd cos θ). (8) It is obvious from eq. (8) that the period of Moiré pattern becomes infinite when d = d and θ = 0, i.e. when SH is perfectly repositioned. At this position the amplitude distribution of the reconstructed wave-front is given by eq. (4), which makes it clear that in the intensity recording of a pure phase modulated wavefront all information about phase distribution function ψ(x, y) is lost completely, i.e. information of a pure phase object used as a secrete-code remains concealed. A Lloyd s mirror positioned in proximity with one of the reconstructed focused spots (other spots are filtered out) of the converging beams converts the phase Figure 1. Geometry depicting Moiré fringe formation due to superposition of interferometric encoded reference beam R 1 and grating pattern recorded on security hologram for slightly misaligned positions. 446 Pramana J. Phys., Vol. 68, No. 3, March 2007

Interferometric key readable security holograms information of secrete-codes into an intensity pattern by generating a two-beam interference fringes: I 2 (x, y) = I 0 (x, y)[1 + V (x, y) cos ψ(x, y)], (9) where I 0 (x, y) is the average intensity and V (x, y) is the fringe contrast. This interference pattern provides information about the phase distribution function ψ(x, y) in the form of intensity variations which could be used for visual inspection to verify the authenticity of the security hologram. 3. Experiment and results The experimental set-up for the formation of KH, SH and their reconstruction is schematically shown in figure 2. He Ne laser at 632.8 nm wavelength was used as the light source. The thin laser beam was split into three parts as beams 1, 2 and 3 using variable beam splitters BS 1 and BS 2. Beam 1 was used as a plane reference beam R while beam 2 was used to generate convergent beams O 1 and O 2 to make the KH. Beam 3 was used as the object beam in conjunction with encoded interferometric reference beam R 1, reconstructed from KH, to make the security hologram SH. Lens L 1 (f/4) in conjunction with beam expander BE 1 generates a collimated beam of 50 mm diameter. Lens L 2 (f/4, 50 mm diameter) in conjunction with beam expander BE 2 was used for the generation of convergent beams O 1 and O 2. Lens L 3 (f/4) in conjunction with beam expander BE 3 generates a 100 mm diameter collimated beam and lens L 4 (f/4, 100 mm diameter) converges this collimated beam. Here f/4 denotes the f-number of the lenses. S 1 S 3 are shutters in the beams 1 3 respectively. During the formation of KH, shutters S 1 and S 2 were opened while S 3 was kept closed. Before making second exposure for KH on the same recording plate, the converging lens L 2 was given a minute movement ( 400 µm) in the transverse direction to generate another convergent beam O 2. For the formation of SH, processed KH was placed back in its original position and a pure phase object S was introduced into a portion of the one half width of collimated beam O, between lenses L 3 and L 4 to create the secrete-codes on SH. During the exposure for the formation of SH, shutters S 1 and S 3 were opened while S 2 was kept closed. In the final reading process, processed KH and SH were repositioned at their original positions and only shutter S 1 was open. A precise manual translation stage was used in our experimental set-up to reposition the processed SH for verification. A spatial filtering process was used to enhance the contrast of the Moiré pattern. A front coated plane mirror M (20 mm 40 mm 2 mm, SiO 2 protected, front surface silver coated, reflectivity 94%) was kept in proximity of one of the reconstructed focused spots of the object beam O to convert the invisible phase information of the secrete codes into verifiable intensity pattern. Exposure time of 600 ms was used for the first two exposures for the formation of KH while an exposure time of 350 ms was used for the formation of SH to supply the optimum energy of 130 µj to the recording medium. Slavich PFG-01 holographic recording plates of sizes 63 mm 62 mm for KH and 25 mm 31 mm for SH were processed in standard Kodak D-19 developer and R-9 bleach bath solutions. As is well-known, vibration isolation is an essential requirement to record a hologram Pramana J. Phys., Vol. 68, No. 3, March 2007 447

Raj Kumar, D Mohan and A K Aggarwal Figure 2. Schematic configuration of the experimental set-up. Figure 3. Photograph of a typical finite mode Moiré pattern. and vibrations with amplitude greater than λ/2 could disturb the recording. Thus a mechanical stability of the order of λ/2 is needed during the recording process of the hologram. For this reason, floating vibration isolation table and an enclosure to reduce air currents was used. The results presented have been recorded using S-50 Power-Shot Cannon digital camera in white balance settings. Figure 3 shows a specific Moiré pattern formed in the observation plane OP due to slight misalignment of SH in its repositioning. This Moiré pattern disappears on proper repositioning of SH and a typical null mode Moiré pattern is obtained as shown in figure 4. It may be noted that this finite Moiré to null Moiré transition takes place only for genuine SH. The information of secrete-codes is still hidden and a Lloyd s mirror interferometer is used to convert this phase information into 448 Pramana J. Phys., Vol. 68, No. 3, March 2007

Interferometric key readable security holograms Figure 4. Photograph of a typical null mode Moiré pattern. Figure 5. Reconstructed image of a phase object (a glass plate with a small broken portion) from the security hologram using Lloyd s mirror interferometer for hologram authenticity verification. an intensity pattern. Typical test results of the reconstructed secrete-codes (phase object) are shown in figure 5, which verifies the hologram authenticity. 4. Conclusions and discussions A simple method is described for generating security holograms with secrete-codes. A specially created key is used for the recording and reconstruction of the security hologram. In the reading process, a slight misalignment in repositioning of security hologram generates Moiré fringes that would vanish on proper repositioning, only for genuine security hologram. It may be noted that key hologram plays dual role in repositioning security hologram as well as in its authenticity verification. The reconstruction of sharp focused spots at pre-determined fixed positions (angularly and azimuthally) serves as an additional anti-counterfeiting feature and may Pramana J. Phys., Vol. 68, No. 3, March 2007 449

Raj Kumar, D Mohan and A K Aggarwal also be used for machine inspection. The final verification of security hologram requires an interferometric process on the reconstructed wave-front to convert the phase information of secrete-codes into verifiable intensity pattern. This has been accomplished using Lloyd s mirror interferometer, which is quite elegant compared to the earlier used set-ups for phase-only encryption methods. Counterfeiters may find it more difficult if we use strong (highly refracting) phase objects for creating secrete-codes. A further step is needed for retrieving complete information for such an object, where a grating is used at a specific distance from the focused spots to generate the null mode information [14]. Alternatively, a knife-edge [15] or mirroredge [16] could also be used for easy verification, but it will reduce the contrast of the resulting pattern. Acknowledgements The authors are grateful to The Director, CSIO, Chandigarh for his constant encouragement, support and for permission to publish this work. They wish to thank Mr D P Chhachhia for his kind help in performing the experiments and Mr Sushil K Kaura and Mr Amit K Sharma for helpful discussions held with them. The financial support by Council of Scientific & Industrial Research (Emeritus Scientist Scheme) is greatly acknowledged. References [1] B Javidi (ed), Optical and digital techniques for information security (Springer-Verlag, Berlin, 2005) [2] P C Mogensen and J Gluckstad, Opt. Lett. 25, 566 (2000) [3] D H Seo and S J Kim, Opt. Lett. 28, 304 (2003) [4] M S Millán, E Pérez-Cabré and B Javidi, Opt. Lett. 31, 721 (2006) [5] S Lai, Opt. Eng. 35, 2470 (1996) [6] A K Aggarwal, S K Kaura, D P Chhachhia and A K Sharma, J. Opt. A: Pure Appl. Opt. 6, 278 (2004) [7] A K Aggarwal, S K Kaura, A K Sharma, R Kumar and D P Chhachhia, Ind. J. Pure Appl. Phys. 42, 816 (2004) [8] S Liu, X Zhang and H Lai, Appl. Opt. 34, 4700 (1995) [9] X Zhang, E Dalsgaard, S Liu, H Lai and J Chen, Appl. Opt. 36, 8096 (1997) [10] A K Aggarwal, S K Kaura, D P Chhachhia and A K Sharma, Opt. Laser Technol. 38, 117 (2006) [11] S K Kaura, D P Chhachhia and A K Aggarwal, J. Opt. A: Pure Appl. Opt. 8, 67 (2006) [12] S L Yeh, Opt. Eng. 43, 573 (2004) [13] R S Sirohi and F S Chau, Optical methods of measurement (Dekker, New York, 1999) p. 227 [14] R Kumar, D P Chhachhia and A K Aggarwal, J. Opt. A: Pure Appl. Opt. 8, 747 (2006) [15] R Kumar, S K Kaura, A K Sharma, D P Chhachhia and A K Aggarwal, Opt. Laser Technol. 39, 256 (2007) [16] R Kumar, D P Chhachhia and A K Aggarwal, Appl. Opt. 45, 6708 (2006) 450 Pramana J. Phys., Vol. 68, No. 3, March 2007