PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
Tytuł artykułu

Concealing information in security hologram using interferometry

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
A new method utilizing holographic interferometry technique is described to conceal information in security holograms for enhancing their anti-counterfeiting ability. This concealed information can only be imitated if security hologram is illuminated through correct decoding wavefront generated through a key hologram. In decoding process, three spatially separated focus spots emerge at predefined positions which upon divergence further generate interferometric fringes modulated with concealed information in them. When security hologram is perfectly aligned, interferometric fringes disappear and concealed information becomes visible. The advantage of encoding through this technique lies in the fact that relative repositioning of key and security hologram becomes much easier and also additionally brings multifold improvement in the security level of the verification systems.
Czasopismo
Rocznik
Strony
385--394
Opis fizyczny
Bibliogr. 22 poz., rys.
Twórcy
  • Department of Physics, D.A.V. (PG) College, Dehradun
  • Department of Physics and Materials Science and Engineering, Jaypee Institute of Information Technology, Noida 201309, Uttar Pradesh, India
  • Department of Physics and Materials Science and Engineering, Jaypee Institute of Information Technology, Noida 201309, Uttar Pradesh, India
Bibliografia
  • [1] VAN RENESSE R.L. [Ed.], Optical Document Security, Artech House, Boston/London, UK, 1998, pp. 169–225.
  • [2] LANCASTER I. [Ed.], Holopack Holoprint Guidebook, Reconnaissance International, Leatherheads, Surrey, UK, 2000, pp. 139–154.
  • [3] CHESAK C.E., Holographic counterfeit protection, Optics Communications 115(5–6), 1995, pp. 429–436, DOI: 10.1016/0030-4018(94)00477-C.
  • [4] JANUCKI J., OWSIK J., A holographic method for document protection against counterfeit, Optics Communications 228(1–3), 2003, pp. 63–69, DOI: 10.1016/j.optcom.2003.09.083.
  • [5] WLODARCZYK K.L., ARDRON M., WESTON N.J., HAND D.P., Holographic watermarks and steganographic markings for combating the counterfeiting practices of high-value metal products, Journal of Materials Processing Technology 264, 2019, pp. 328–335, DOI: 10.1016/j.jmatprotec.2018.09.020.
  • [6] REFREGIER P., JAVIDI B., Optical image encryption based on input plane and Fourier plane random encoding, Optics Letters 20(7), 1995, pp. 767–769, DOI: 10.1364/OL.20.000767.
  • [7] WANG R.K., WATSON I.A., CHATWIN C.R., Random phase encoding for optical security, Optical Engineering 35(9), 1996, p. 2464, DOI: 10.1117/1.600849.
  • [8] ZLOKAZOV E.YU., STARIKOV R.S., ODINOKOV S.B., TSYGANOV I.K., TALALAEV V.E., KOLUCHKIN V.V., Specificity of correlation pattern recognition methods application in security holograms identity control apparatus, Physics Procedia 73, 2015, pp. 308–312, DOI: 10.1016/j.phpro.2015.09.143.
  • [9] AGGARWAL A.K., KAURA S.K., SHARMA A.K., KUMAR R., CHHACHHIA D.P., Interferometry based security hologram readable with an encoded key hologram, Indian Journal of Pure & Applied Physics 42, 2004, pp. 816–819.
  • [10] LAI S., Security holograms using an encoded reference wave, Optical Engineering 35(9), 1996, p. 2470, DOI: 10.1117/1.600850.
  • [11] AGGARWAL A.K., KAURA S.K., CHHACHHIA D.P., SHARMA A.K., Encoded reference wave security holograms with enhanced features, Journal of Optics A: Pure and Applied Optics 6(2), 2004, p. 278, DOI: 10.1088/1464-4258/6/2/020.
  • [12] LIU S., ZHANG X., LAI H., Artistic effect and application of moiré patterns in security holograms, Applied Optics 34(22), 1995, pp. 4700–4702, DOI: 10.1364/AO.34.004700.
  • [13] ZHANG X., DALSGAARD E., LIU S., LAI H., CHEN J., Concealed holographic coding for security applications by using a moiré technique, Applied Optics 36(31), 1997, pp. 8096–8097, DOI: 10.1364/AO.36.008096.
  • [14] AGGARWAL A.K., KAURA S.K., CHHACHHIA D.P., SHARMA A.K., Concealed moiré pattern encoded security holograms readable by a key hologram, Optics & Laser Technology 38(2), 2006, pp. 117–121, DOI: 10.1016/j.optlastec.2004.10.010.
  • [15] YEH S.L., Light-diffusion mark constituted with two-dimensional speckle patterns for enhancing hologram anticounterfeiting characteristics, Optical Engineering 43(3), 2004, p. 537, DOI: 10.1117/1.1641786.
  • [16] LU Y.T., CHI S., Compact, reliable asymmetric optical configuration for cost effective fabrication of multiplex dot matrix hologram in anti-counterfeiting applications, Optik 114(4), 2003, pp. 161–167, DOI: 10.1078/0030-4026-00241.
  • [17] YEH S.L., Using random features of dot-matrix holograms for anticounterfeiting, Applied Optics 45(16), 2006, pp. 3698–3703, DOI: 10.1364/AO.45.003698.
  • [18] KAURA S.K., CHHACHHIA D.P., AGGARWAL A.K., Interferometric moiré pattern encoded security holograms, Journal of Optics A: Pure and Applied Optics 8(1), 2006, p. 67, DOI: 10.1088/1464-4258/8/1/010.
  • [19] KAURA S.K., VIRDI S.P.S. AGGARWAL A.K., Holographic optical elements encoded security holograms with enhanced features, Indian Journal of Pure & Applied Physics 44, 2006, pp. 896–902.
  • [20] DANDLIKER R., MAROM E., MOTTIER F.M., Two-reference-beam holographic interferometry, Journal of the Optical Society of America 66(1), 1976, pp. 23–30, DOI: 10.1364/JOSA.66.000023.
  • [21] DANDLIKER R., THALMANN R., WILLEMIN J.-F., Fringe interpolation by two-reference-beam holographic interferometry: Reducing sensitivity to hologram misalignment, Optics Communications 42(5), 1982, pp. 301–306, DOI: 10.1016/0030-4018(82)90236-X.
  • [22] SHARMA A.K., KAURA S.K., CHHACHHIA D.P., MAHAJAN C.G., AGGARWAL A.K., Holographic optics based two-channel interferometer, Indian Journal of Pure & Applied Physics 44, 2006, pp. 501–508.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-488573b2-e0ea-4a17-acbb-c367e5f611cf
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.