Abstract

We present an optical coding technique that enhances the anticounterfeiting power of security holograms. The principle of the technique is based on the moiré phenomenon. The code in the hologram has a phase pattern that is invisible and cannot be detected by optical equipment, so that imitation is extremely difficult. Holographic, photographic, and embossing techniques are used in fabricating coded holograms and decoders.

© 1997 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Artistic effect and application of moiré patterns in security holograms

Shou Liu, Xiangsu Zhang, and Hongkai Lai
Appl. Opt. 34(22) 4700-4702 (1995)

Digital color encoding and its application to the moiré technique

Chang-Hua Hu and Yu-Wen Qin
Appl. Opt. 36(16) 3682-3685 (1997)

Optical wavelet processor by holographic bipolar encoding and joint-transform correlation

Katsuhisa Hirokawa, Kazuyoshi Itoh, and Yoshiki Ichioka
Appl. Opt. 36(5) 1023-1026 (1997)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (2)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription