Abstract

We present an optical coding technique that enhances the anticounterfeiting power of security holograms. The principle of the technique is based on the moiré phenomenon. The code in the hologram has a phase pattern that is invisible and cannot be detected by optical equipment, so that imitation is extremely difficult. Holographic, photographic, and embossing techniques are used in fabricating coded holograms and decoders.

© 1997 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Artistic effect and application of moiré patterns in security holograms

Shou Liu, Xiangsu Zhang, and Hongkai Lai
Appl. Opt. 34(22) 4700-4702 (1995)

Bit-by-bit optical code scrambling technique for secure optical communication

Xu Wang, Zhensen Gao, Xuhua Wang, Nobuyuki Kataoka, and Naoya Wada
Opt. Express 19(4) 3503-3512 (2011)

Photorefractive holographic moiré-like patterns for secure numerical code generation

G. N. de Oliveira, M. E. Oliveira, and P. A. M. dos Santos
Opt. Lett. 38(6) 1004-1006 (2013)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (2)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription