Abstract

We present an optical coding technique that enhances the anticounterfeiting power of security holograms. The principle of the technique is based on the moiré phenomenon. The code in the hologram has a phase pattern that is invisible and cannot be detected by optical equipment, so that imitation is extremely difficult. Holographic, photographic, and embossing techniques are used in fabricating coded holograms and decoders.

© 1997 Optical Society of America

Full Article  |  PDF Article
Related Articles
Moiré analysis of the reconstruction accuracy and uniformity of holograms

Meir Ben-Levi and Gabriel Laufer
Opt. Lett. 11(9) 557-559 (1986)

Varifocal moiré zone plates for straightness measurement

J. M. Burch and D. C. Williams
Appl. Opt. 16(9) 2445-2450 (1977)

Sandwich holography for storing information interferometrically with a high degree of security

Nils Abramson, Hans Bjelkhagen, and Per Skande
Appl. Opt. 18(12) 2017-2021 (1979)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (2)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription