Interferometric key readable security holograms with secrete-codes

Kumar, Raj and Mohan, D. and Aggarwal, A.K. (2007) Interferometric key readable security holograms with secrete-codes. Parmana Journal of Physics, 68 (3). pp. 443-450. ISSN 0304-4289

[img] PDF
Interferometric kay readable security.pdf
Restricted to Registered users only

Download (446Kb)
Official URL:


A new method is described to create secrete-codes in the security holograms for enhancing their anti-counterfeiting characteristics. To imitate these codes is di±cult as pure phase objects having complex phase distribution function are used to modulate the object beam that is recorded in conjunction with an encoded interferometric reference beam derived from a key hologram. Lloyd's folding mirror interferometer is used to convert phase variations of the reconstructed wave-front into an intensity pattern for hologram authenticity veri¯cation. Creating the secrete-codes through an interferometric reference beam from the key hologram facilitates a multi-stage authenticity veri¯cation as well as easy repositioning of the security hologram through a speci¯c Moir¶e pattern generated during the veri¯cation process

Item Type: Article
Uncontrolled Keywords: Optical security, authenticity verification
Subjects: CSIO > Optics
Depositing User: Ms. J Shrivastav
Date Deposited: 03 Apr 2012 12:37
Last Modified: 11 Apr 2012 11:11

Actions (login required)

View Item View Item