Download - The Holography Times, Vol 3, Issue 8
-
8/6/2019 The Holography Times, Vol 3, Issue 8
1/16
www.homai.org
The Holography Times
1
theholographytimesThe journal of hologram industry
October 2009 | Vol. 3 | Issue 8 www.homai.org
TM
The Holography Times is quarterly published by HoMAI.
Special Report
ALSO:
Innovation: Research team designingholographic imaging system for ovarian
cancer UK national ID card unveils Indianpassports to go the e-way Patent news Events & calendar & more...
Global trends fordocument security
ID CardsProtecting People
But
WHATabout theirprotection?
-
8/6/2019 The Holography Times, Vol 3, Issue 8
2/16
www.homai.org
The Holography Times
2
Holographers
To The Globe
-
8/6/2019 The Holography Times, Vol 3, Issue 8
3/16
www.homai.org
The Holography Times
W
e are delighted to share with you our quarterly newsletter, The
Holography Times. This is perhaps the best means of staying in
touch with the holographic family, where we share with you latestdevelopments in the Indian and the international holographic industry, learnings
from around the world which have future potential and can be applied to your
business- where the aim is to establish a connection between the expanding
universe of holography and its importance in daily life.
Holography is a fast developing science having enormous impact on the society
at large. Worldwide innovations like scientists working on Holographic Imaging
Systems to fight ovarian cancer are leading to revolutionary changes in our
world. In this newsletter we discuss how this imaging instrument contributes
to a broader understanding of ovarian cancer - The Silent Killer.
Identity counterfeiting is an increasing global menace that has turned our
identities into highly valuable assets. Since being developed over 60 years ago
holograms have been the most successful anti-counterfeiting measure in this
battle against ID counterfeiting. While the first DOVID appeared on a credit
card in 1982 and on a banknote in 1988, in 1985 the first metallized hologram
appeared on the passport of Iraq. Here we discuss about the role of a hologram
offering protection against forgery of variable information like photograph and
personal data and global developments in ID document protection.
The issue talks about how holography is not only protecting identity documents,
saving tax revenues but also playing a social part by protecting human lives.
Once again we seek your feedback and valuable advice to take this newsletter
and association to greater heights.
Happy reading!
Team HoMAI!
In this issueHolography :
A technology protectingproducts & lives!
Editorial
Innovation
Holographic imagingsystem forovarian cancer
4Web Watch 5
News Bytes 6
Company Profile
9
Patent news related to identity 15documents
Cover Story
Global trends for
document security
10
3
Holographers
To The Globe
-
8/6/2019 The Holography Times, Vol 3, Issue 8
4/16
www.homai.org
The Holography Times
Innovation
Two University of Arizona researchershave formed a research team todesign, build and evaluate an ovarian
cancer medical imaging and screening
instrument that will use holographic
components in a new type of optical
microscope. By using holograms and
merging medical and optical science,
researchers Raymond Kostuk and
Jennifer K. Barton are developing a
way of seeing enough varied depth in
ovarian tissue to detect microscopic
cancer cells in their earliest stages.
This would be a huge advance in the
fight against an insidious disease that
kills most women within five years of
diagnosis.
The system will work like a high-
powered microscope that can be used to
study tissue samples already removed. In
addition, an endoscopic version is in thedesign stage to safely scan the ovaries for
cancer during laparoscopic screenings
in high-risk women. The system is
unique in that it will for the first time
project multiple spatial images from
different depths within a tissue sample
and simultaneously provide spectral
information from optical markers in
order to better identify cancerous cells.
Raymond Kostuk and Jennifer Barton
have secured a five-year; $2.4 million
grant from the National Institutes of
Health to build the instrument that they
hope will one day be used to monitor
women at high risk for ovarian cancer.
The grant was issued following the
successful two-year development of a
prototype system the team built.
During the past 25 years Kostuk
has researched different aspects of
holography and holographic materials
for use as optical elements. The
holographic imaging system being
designed combines an optical technique
that creates images capable of
detecting subtle tissue microstructure
changes. Together with fluorescence
spectroscopy methods, the system
has demonstrated capability for early
cancer detection. Another member
of the team, UA research professor
Marek Romanowski, is working on the
development of targeted fluorescent dyes
that will be used on tissue samples to
identify or confirm suspected cancerous
areas shown in the spatial image.
Barton said ovarian cancer provides
a compelling case to test holographic
imaging and its efficacy in detecting
cancers. At the present time the preferred
treatment is surgery, which is also often
needed to diagnose ovarian cancer. The
procedure includes taking tissue samples,which may threaten the womans ability
to have children in the future.
The researchers expect to spend the
next five years fine-tuning a wand-
like instrument thats anticipated to
be a game changer for medicine if it
does what is intended - allow high-risk
women to know whether they actually
have ovarian cancer before having their
Holographic imaging system for ovarian cancer
Human ovary
image captured
with the use of
the prototype
holo-graphic
imaging system
the team
developed.
For comparison,
an onion is imaged
with the use of
the prototype
system the team
developed.
Raymond Kostuk Jennifer Barton
Technology
4
-
8/6/2019 The Holography Times, Vol 3, Issue 8
5/16
www.homai.org
The Holography TimesTechnology
ovaries removed. The system
will image like an MRI or a
CT scan but with much higher
resolution than an ultrasonic
image and will be a lot less
expensive than an MRI. As an
additional benefit no radiation
will be used or exposed to
sensitive ovary areas during
the cancer screenings, Kostuk
said.
The researchers in the future
course will do three major things:
improve the performance of
a prototype of the technology
Kostuk and Barton already
have developed; package thetechnology into a laparoscopic
system that can be taken into
the operating room; and perform
a pilot study on women who
already are having their ovaries
removed. Ultimately, Kostuk
and Barton want to help save
lives and contribute to a broader
understanding of how ovarian
cancer progresses. Our hope is
that it would detect it earlier by
providing more information,said Barton, who heads the
universitys department of
biomedical engineering.
The Silent Killer Ovarian cancer is often called the silent killer because many times there are no symptomsuntil the disease has progressed to an advanced stage.
Ovarian Cancer Facts to KnowFact 1: Ovarian cancer is the leading cause of gynecologic cancer deaths among women.
Fact 2: If diagnosed in its early stage, the chance of survival is 90%.
Fact 3: Only 24 percent of ovarian cancers are diagnosed at an early stage, when the cancer isconfined to the ovary.
Fact 4. One woman out of every 55 (approximately 1.8 percent) will develop ovarian cancer atsome point in her lifetime.
Fact 5. Ovarian cancer is most common in women who have already gone through menopause.The average age for developing ovarian cancer is 61 years old.
Fact 6. For the small number of women who are fortunate enough to have their cancer diagnosedbefore it has spread beyond the ovary, the chance for recovery is 85 to 90 percent.
Fact 7: The risk for ovarian cancer is greater for women who have never had children, who hadtheir first child at a later time in life or who have a personal history of breast cancer,colorectal cancer or endometrial cancer.
Fact 8. The only sure way to diagnose ovarian cancer is through microscopic examination ofabnormal fluid or tissue, obtained by needle aspiration (withdrawal of fluid or tissue froma suspicious area though a special, wide needle) or surgery.
Fact 9. Hycamtin is one of the first of a new kind of anti-cancer drugs that kills cancer cells byinhibiting an enzyme essential to the replication of human DNA.
Web watch section
Protecting vital information is ofutmost importance to companiesnowadays, whether it is printed
documentation or digital files. Thus, here
we mention certain websites armed with
useful tips on information security and
how to safeguard companies from threats
and violation of the rights to privacy.
1. Search security asia
(www.searchsecurityasia.com)
The goal of this website is to try & prevent,
detect, resolve, or repair internet and
network security issues in Asia. You can
get essential tips on how to protect both
the front and back end of your website.
You may also check how to secure data
through tips, articles, white papers, and
case studies that, ironically, spill over
information on information security.
2. Computer Security News
(www.computersecuritynow.com)The purpose of this website is presenting
an almost perfect portal for ISO 17799
Information security. From general
information to implementation, thiswebsite provides downloadable files
for your reference like ISO 17799
Toolkit, Security Policies., Security
Risk Assessment, and Risk Analysis:How & Why-describes the method and
approach on Security Risk and manual
for Information Security management.
You may also find news on the upgrade
of ISO 17799 to ISO 27002.
5
-
8/6/2019 The Holography Times, Vol 3, Issue 8
6/16
www.homai.org
The Holography Times
T
he UK government relied on
hologram for the protection of their
ID card.
The UK ID cards image was officially
unveiled by the Home Secretary Alan
Johnson in Manchester in August 2009.
This ID card is voluntary for British
citizens and can also be used as a travel
document in Europe. The card image
shows the information contained
on the face of the card, including
photograph, name, date of birth and
signature, as well as the cards unique
design. It holds similar information
to that currently contained in the UK
passport as well as fingerprints on a
secure electronic chip. This chip will
link to a biometric database holding a
persons fingerprints and address.
The cards remain a central part of
the governments plans to tighten up
Britains border controls and clamp
down on illegal working. Given the
growing problem of identity fraud and
the inconvenience of having to carry
passports, coupled with gas bills or six
months worth of bank statements to
prove identity, Mr. Johnson, believes
the ID card will be welcomed as animportant addition to the many plastic
cards that most people already carry.
The fact that it can be used as a passport
when traveling in Europe will be an
added advantage, he said.
Over the years the reason for issuing
documents has also shifted to being a
good proof of age tool. This approach
has received the backing of the National
Federation of Retailers and Newsagents,
whose spokesperson said: Underagesales are a problem across the UK and
we are always looking for new ways for
the public, especially those under the age
of 18 years old, to prove their identity.
Source: news.bbc.co.uk
UK national ID card unveils
The UK government relied on hologram for the protection of their ID card.
News Bytes
J
DSU, a leading provider ofinnovative optical solutions for brand
authentication, medical/environmentalinstrumentation, semiconductorprocessing, display, etc. has introducedits HoloFuseTM polycarbonate film,a new highly integrated product thathelps protect government-issued identitydocuments such as passports, nationalidentity documents and drivers licensesagainst counterfeiting and tampering.
HoloFuse is the first solution that
includes a hologram that is integrated
into a polycarbonate film without
the use of adhesives. This film in
turn becomes the clear outer layer
of identity documents, helping to
reduce the ability of counterfeiters to
separate card layers and tamper with
their security. In addition, providingan integrated solution simplifies themanufacturing process for card andidentity document makers.
The partially transparent and customizedhologram within the polycarbonatefilm includes overt, covert and forensicsecurity features that make it difficultto reproduce. JDSUs patentedtechnology also better preserves the
hologram, making it brighter and
easier to identify.
The new HoloFuse product is basedon JDSUs years of expertise in optical
science and provides a whole new wayto protect the integrity of high securityidentity documents, while simplifyingthe manufacturing process for cardmakers, said Garth Zambory, DocumentAuthentication product manager for theAdvanced Optical Technologies businesssegment at JDSU.
The polycarbonate material is also moreenvironmentally friendly than plasticstypically used for the creation of cardssuch as PET or PVC. JDSU has filed apatent for the new solution and expectsto be shipping it during the second halfof calendar year 2009.
Source: www.jdsu.com
JDSU increases security with holofuse technology
6
-
8/6/2019 The Holography Times, Vol 3, Issue 8
7/16
www.homai.org
The Holography Times
A
ccording to a WHO report, about
16.7% of the total pharma exports
to Nigeria are counterfeit. Followingrecent apprehensions over sub-
standard drugs marketed in Nigeria, the
National Agency for Food and Drug
Administration and Control (Nafdac)
has proposed to set up overseas control
points in India and China to verify
the quality of all drugs and allied
pharmaceutical products sold in Nigeria
from these two countries. These check
points are expected to have state-of-the-
art technologies to check counterfeit
on the spot. This is said to be the firstinitiative to counter fake drug supply in
the generic business.
The Nigerian government also plans
to bring in lifetime jail term or
death penalty for manufacturers and
distributors of fake and substandard
drugs in Nigeria. We would sign a
memorandum of understanding with
the Department of Pharmaceuticals,
government of India, on September
30, to put in place a joint regulatory
framework for both the countries to
check counterfeit drugs, informed Paul
B Orhii, director general Nafdac. He
said that about 20 Indian pharmaceutical
companies in various categories
have expressed interest in setting up
manufacturing facilities in Nigeria. The
likes of Apollo Pharmacy and Hetero
Dugs, which have a wide network of
pharmacy outlets in the country, have
been approached to set up pharmacies
for marketing quality products and
dispel fears of sub-standard drugs.
Incidentally, Nafdac has had discussions
with Torrent Pharma and Ranbaxy
for setting up bio-equilance and bio-
availability study centres in Nigeria.
Nafdac is planning to join hands with
the National Institute of Pharmaceutical
Education and Research, Hyderabad, to
train its people.
The Nigerian government would give
rewards to informers and actively
encourage victims to gather evidence
that enable us to sue manufacturers and
distributors of these deadly products. He
also informed that a massive campaign
was being drawn up jointly by Nafdac,
the Indian government, China and the
US to build an international coalition
to fight counterfeit drugs.
Source: www.financialexpress.com
NAFDAC likely to set up check points for counterfeit drugs
News Bytes
TSSI has acquired a portfolio ofpatents for specialist volumeand true colour holograms including
Biometrigram and HD-3D hologram
patents from authentication securitytechnology and consultancy firm
Ver-tec. The move follows the recent
launch of TSSIs Magnetics Solutions
Division, which aims to drive growth
across TSSIs document security and
brand protection products.
According to TSSI, counterfeiters are
becoming increasingly sophisticated,
producing highly realistic ID documents.
Additional security measures are
therefore required to provide the highest
level of protection possible and ensurethat ID documents such as passports,
ID cards and access cards cannot
be replicated. Hologram technology
provides an effective security solution
for all identity documents as each
hologram is unique making it impossible
to imitate.
HD-3D is a true colour hologram,
meaning the images always maintain
their original colours from any
viewing angle, unlike embossed
holograms which exhibit a rainbow
effect. Each hologram is unique with
different serial numbers and/or bar
codes, which can also be encrypted for
added security.
The Biometrigram, a volume
hologram, can store multiple
biometrics as well as analogue images
and encrypted digital information.
TSSI says these have a higher
information density than electronic
chips so are ideal for use on ID cards.
Each hologram is unique so ensures the
correct identity of the document holderand provides an effective security
measure in the fight against identity
fraud.
Both of these products are a welcome
addition to our portfolio of identity
and document security offerings. Our
customers want top quality security
solutions and these new patents will
meet this increased demand for fraud
proof identity documents, says Danny
Chapchal, executive chairman, TSSI
Systems.
Source: www.securitydocumentworld.com
TSSI buys ver-tec patents
7
-
8/6/2019 The Holography Times, Vol 3, Issue 8
8/16
www.homai.org
The Holography Times
India will shortly switch over to e-
passport system, increasingly usedglobally to check terrorism using false
identity. The government launched
its e-passport scheme on Jun. 25 this
year, where President Pratibha Patil,
Prime Minister Manmohan Singh and
Vice President Hamid Ansari were
the first ones to receive their biometric
passports. E-passports have been issued
to diplomats since July this year, but are
expected to be extended to all citizens
from September next year. The Indian
government appears on track to issue
some 800,000 e-passports next year
and begin piloting its new backend
system touted to enable faster delivery
of passport services, baring no further
delays. Already, 35 countries have
shifted to the e-passport system, also
called biometric passports, which is an
offshoot of the 9/11 attacks in the U.S.
The e-passports are designed to
facilitate international travel by allowing
automatic identity verification and
faster immigration inspections, as wellas provide efficient border protection
and security. These would look like an
ordinary passport with an embedded
electronic chip. The chip would containthe photograph, fingerprint and personal
information of the holder so that the
passport could not be duplicated. An
e-passport is machine-readable, enabling
quick processing at airports. The passport
comes with a built-in security (biometric)
feature, which comprises an integrated
circuit (IC) embedded in the back cover
that stores the data, including photo.
These also make the passport tamper-
proof. In ordinary passports, this data is
typically displayed on the photo page.
E-passports support a combination of
electronic and optical security features
including watermark, optically
variable device and hologram.
If an e-passport is misused, the
immigration checkpoint will be able to
detect a mismatch between the printed
and digital information, and authorities
can take necessary action against the
offender.
The International Civil AviationOrganization (ICAO) sets the standards
for e-passports that have been
implemented in
over 70 countries.Data in the Indian e-
passport can be read
in other countries
as it adheres to the
ICAO global standards
for biometrics and
secure storage of personal data in travel
documents.
The Indian government next year will
also launch its Passport Seva Project.
Implemented by Tata Consultancy
Services (TCS) under a build-operate-
transfer scheme, the Passport Seva
Project entails digitization of the entire
passport services. It seeks to deliver all
passport-related services to citizens in a
timely, transparent, more accessible and
reliable manner, through streamlined
processes and trained workforce. This
US$207.3 million (10 billion rupees)
project is part of the governments
National e-Governance Plan (NeGP).
Source: www.businessweek.com,www.igovernment.in
Indian passports to go the e-way
News Bytes
Soiled notes may soon be a thing ofpast with the Reserve Bank of India(RBI) planning to introduce polymer
banknotes whose life span would be
four times the normal currency notes
and would be difficult to imitate. The
seizure of large quantities of fake Rs
1,000 and Rs. 500 notes has led the
RBI to toy with the idea of replacing
paper currency with polymer notes.
As a pilot project, the Central bank is
planning to introduce one billion pieces
of Rs. 10 polymer notes, for which the
bank has floated a global tender. The bank
has asked interested parties for 500 pieces
of sample banknotes, before the actualglobal bids for the project go through.
Explaining the rationale for the
introduction of polymer notes, the
official said these notes are extremely
difficult to counterfeit and have a
lifespan of five years compared to
paper currency which lasts just one
year. They can also be washed, making
them more hygienic. Central banks the
world over believe that the only sure
way to control counterfeiting is through
continuous design change and innovation.
The polymer notes were first introduced
in Australia to safeguard against
counterfeiting of currency. Besides
Australia, other countries which have
introduced plastic notes, include New
Zealand, Papua New Guinea, Romania,Bermuda, Brunei and Vietnam.
Going by the increasing incidence
detection of fake notes, RBI may consider
introduction of higher denomination
plastic notes. The RBI had first hinted
in 2007 that it may start using plastic
notes.
Source: Financial Chronicle, September
2009; India Today, September 2009
RBI plans to print Rs.10 plastic notes
8
-
8/6/2019 The Holography Times, Vol 3, Issue 8
9/16
www.homai.org
The Holography Times
Holostik India Limited offerssecurity solutions for protection/authentication of identity documents.Holostik is the leading SecurityHologram manufacturer in India,since 1991, and one of the largestmanufactures in the world with over5000 customers in Government,
Public and Private sectors. Holostikhas all facilities under one roof underhigh security environment. We supplyholographic security solutions tovarious prestigious government bodies,for identity document protection.
Holostik has two types ofMaster Origination machines-Conventional 2D/3D machineand 24000 DPI Dot Matrixmaster origination machine,
which offers ability to producecombination masters with addedsecurity.
Our R&D (master lab) team hasdeveloped certain high securityfeatures (both overt and covert),which are very difficult for otherholographers to develop.
Holostik has an in-house printingfacility, which offers up to 8colour UV printing options onpaper and 10 colour printingoptions on film, providing latesthigh security features in printingavailable in the world.
Our product range includesregular security holograms, paperproducts incorporating securityfeatures, polyester / PVC / otherplastics based film products and /
or a combination product of oneor more of the above substrateswith holographic security
There are a number of methods thatcan be adopted for securitizationof identity documents dependingon volume of documents to besecuritized, method of application andresources available. Thus, Holostikoffers security holograms in
(i) Pressure sensitive form (ii)Hot Stamping Foil form (iii)
Transparent Holography form and
(iv) Laminate form, as per customerrequirements.
The most common form is to applySecurity Hologram on to the existingidentity document. This hologramcan be affixed on the documentseparately or in a manner so that it
partially covers the photograph ofthe bearer. As it is tamper evidentin nature, any attempt to removeit will result in its destruction. AtHolostik we offer, both Pressuresensitive holograms that are affixedmanually and automatically and HotStamping Foil based hologramsthat are affixed using a Hot Stampingmachine, in standard and customisedshapes. Pressure sensitive securityhologram can be of Transparent /Semi-Transparent type.Another method is to use pre-printed identity document havingholographic strip running through.In this method, Holostik prints therequired identity document andapplies a strip of security hologramas per design. This method does notrequire hologram handling at theend user, rather only printing of the
individual card details. The use ofa security strip offers a larger areaand is also visually appealing. In the
two forms of application discussed
above, the final document can be
used as is basis or can be further
laminated within a pouch. The
use of pouch adds another layer ofsecurity & also enhances life of thedocument.
Holostik offers a third option whichcombines benefits of tamper evidenttransparent security holography withtransparent laminated holographicpouch, offering high security withflexibility of use. Customer needs toprint data on to the document type,paste photographs etc & then place
document in the pouch and pass itthrough a pouch laminator. The endproduct protected by the laminatedpouch, it has see-through holographicfeatures through out the fascia, istamper evident, visually appealingand easy to authenticate, makingit is easy to protect, securitize andauthenticate identity documents.
Holostik provides tailor made
solutions for the I.D. Cards dependingon the customers requirement i.e.security solutions, semi high securitysolutions and high security solutions.But, we always incorporate certainsecurity features in all of the abovethree categories so that it becomesextremely difficult for counterfeitersto copy.
Today, many of the important and
sensitive documents worldwide are
protected using our tailor madesecurity products. What ever bethe customers need, Holostik canprovide the right solution because ofits rigorous R&D and wide exposure,experience in holography and alliedproducts. Just allow us to becomeyour Security Partner to help you insecuring your products and we assureof your complete satisfaction.
For any queries/assistance, feel free
to contact us at
9
Holographers
To The Globe
Company Profile
-
8/6/2019 The Holography Times, Vol 3, Issue 8
10/16
www.homai.org
The Holography Times
Identity is an integral part of the Human subsystem. All livings being struggle for their unique identity in the universe- It may bein the form of knowledge, Power or Wealth. In ordinary language, one can use the word identity to refer to characteristicsor attributes that cannot naturally be expressed in terms of a social category. However, realizing its importance, worldwide allgovernments keep their Citizen in easy and quick access identity formats.
But today, Identity counterfeiting is a growing global menace that has turned our identities into highly valuable assets. Thepotential risks associated with fake identification documents can be high. With a fake identity, an individual can potentially gainillegitimate access, qualify for government benefits, defraud credit companies or make illegal purchases. Even though todayscard printing technology delivers superior image quality and exceptional card durability at a surprisingly affordable cost, but withforgery and counterfeiting now a serious issue, what defense mechanism are solution providers putting in place to protect theend users?
This article outlines how to reduce the risk of counterfeiting with latest document security trends, paying particular attention toa system combining the most effective features.
Identity Cards:
ID Cards were introduced during the
First World War as part of a statutory
registration scheme. It ended in 1919.
They were introduced in 1939 and
remained in force for several years
after the war until they were abolishedby Churchill in 1952. Today, around
a hundred countries have official,
compulsory, national IDs that are
used for variety of purposes.
In India, the recent national Unique
Identification (UID) project launched
by the Government of India, with
the iconic technocrat, Mr. Nandan
Nilekani at its helm is indeed a
significant project. With this, Indiahas embarked on an ambitious
e-governance project which targets
to provide a unique number to each
citizen.
Authentication
In this era of heightened security
concerns, we are keenly aware
of the role that ID Documents, or
credentials, play in our lives.Whethera drivers license, passport, social
security number, Unique Identity
number, etc. these documents are
used routinely not only to verify a
persons identity but can also be
used to protect rights to privacy,
wealth and security.
Today, governments worldwide are
using e-Governance methods andrealizing that national security has
profound effects on the economy
and our way of life. To optimize
these issues, a diversity of security
features is available. A brief
overview of the most widely used
features is given below.
Commonly used security
features
Most people would agree that secure
identification begins with a photo
ID card, the most representative of
which is the drivers license. While
a good photo likeness and a legible
signature remain the key features
of a photo ID card, those features
alone are inadequate today. Issuing
authorities now incorporate
several additional features to deter
counterfeiting, while at the sametime making authentication easier
and more reliable.
The identity of a physical object
is uniquely determined by a set of
distinctive properties. Most ID cards
are fabricated today by direct printing
on composite CR-80 cards comprising
layers of cross-oriented polyester with
outer layers of PVC. Once printed, a
tough 0.001 (1 mil) thick polyesterlaminate is typically applied to protect
both sides of the card.
After the process, companies used
a variety of integrated security
features, which can be classified
mainly into three categories visible,
invisible and forensic. Finally,
there are machine-readable magnetic
stripes, bar codes and programmable
devices (smart cards) that can provideeven more security, plus the means for
automatic data checking and database
connectivity.
Level 1 (Overt features)
These are first line validation
features, i.e. they can be seen
without the use of equipment or
special devices. The most frequently
encountered Level 1 device is a HighRefractive Index (HRI) hologram
printed on either the card or, more
Cover Story
Global trends for document security
10
-
8/6/2019 The Holography Times, Vol 3, Issue 8
11/16
www.homai.org
The Holography Times
commonly for drivers licenses,
on the underside of the protective
laminate. Recently developed de-
metallization and photo polymer
holographic techniques now offerenhanced depth, transparency, and
fine line detail which most would
acknowledge being practically
counterfeit-proof.
Level 2 (Covert features)
Level 2 features are verifiable by
simple, inexpensive tests such
as visual inspection under a lens
or black light (UV), biometricscanning, digital scanning and data
base checking. Examples of Level
2 features include: specialized
bar codes, micro-printing, and
covert background printing that is
incorporated in the card design.
Level 3 (Forensic features)
The majority of these must be kept
secret to remain useful. Analysis
of a card having Level 3 features is
essentially a post-mortem process,
often requiring some dismembering
of the card to determine its origin, and
to minutely inspect the features for
validity. Level 3 devices are images
or physical objects that are hidden
within the card structure or concealed
by special graphic effects on the cardsurface. Typically, they can be fully
validated only by specialized optical
scanning devices, or other means of
machine-reading data.
SOLUTIONS TO IMPROVE
SECURITY OF IDS- ADDING
EXTRA SECURITY
ID card security comes from a
combination of features inherent to
the card media (like overt, covert
and forensic), together with variable
features printed at the time of
issuance. To add security, growing
use is made of security features with
integrated personal data.
a) UV-Ink Personalization
One example is on-demand UV
ink personalization, which allows
cardholders photograph or personal
data to be printed in high-resolution
gradient UV ink. Pre-printed features
are very difficult to duplicate. User
defined text, with deliberate random
font changes and misspelling if
desired, may be micro-printed as an
added security features. Character
height of the micro-printing is five
thousand of an inch. Other printed
security choices include Guilloche
patterns, serial numbering and micro-
graphics.
b) Holographic Laminate
Since their use in 1989, holograms
were historically hard to copy;
they were used to provide cloning
resistance to products. Holographic
laminate may be used to extend
the useful life of a card while
simultaneously protecting it
against data manipulation. To
combat document tampering and
counterfeiting, the holographic
industry is developing and
implementing new security features
such as nano-text and images (very
small text and graphics including
entire city maps) created using
special diffractive techniques. Otherenhanced diffractive methods also
exist.Figure 1: Security features in currently release UK National ID Card
Cover Story
11
-
8/6/2019 The Holography Times, Vol 3, Issue 8
12/16
www.homai.org
The Holography Times
c) Holographic Personalization
Technology (HPT)
Database verification is an important
element of ID card. To secure this,
a more recent trend is to combine
holographic laminates with personal
data, photos and other information.
One example is Identigram, as
found on the German ID Card and
e-passport. HPT allows unique orgeneric diffractive images to be
coated on a card surface. The images
incorporate unique optical effects that
are extremely difficult to counterfeit.
Think, for example, of the card
holders photo, biographic data,
a logo, symbols, a coat of arms
or a combination thereof. This
technology, which is also available
for desktop personalization, allows
a much wider range of diffractive
optical images to be designed, this
effectively adding an additional level
of security to ID cards.
d) Holographic Biometrics
Security
The security of card can also be
enhanced by encrypting and storing
(biographic data) on high-capacity
chips, possibly in combination with
biometrics. Given the limited space
available on an ID cad, especially
compared to passport, the use ofelectronic ID cards- or eIDs
likely to increase. Moreover, eIDs
can be used for various e-business
and e-governance applications,
including online banking,
shopping, and user registration
and with implementation of
government schemes. In this system,
the holographic photopolymer is
laminated to the plastic card, either
as a strip or patch. It is laminated
with a reflective layer and protected
against wear of tampering. The
designated biometric (e.g. an iris
scan or fingerprint) is captured in
the normal way (cameras, fingerprint
scanner, etc), then encoded using a
code mask.
e) Enhanced Security with
Laser Engraving
A growing number of industry
participants are calling for laserengraving technology to be used on
a broader scale. Laser engraving
Cover Story
Figure 3: German ID card using HPT
Figure 2: Lamination Security features
12
-
8/6/2019 The Holography Times, Vol 3, Issue 8
13/16
www.homai.org
The Holography Times
involves burning data into
the substrate of an ID card or
polycarbonate biographic data
page. The data may consist of text,
images and graphics (including
security features such as micro
text).
As such, laser engraving is a
technology rather than a securityfeature. The actual security is derived
from the application method used.
If properly applied, laser engraving
provides protection against alteration
and reproduction. In fact, laser
engraving provides unsurpassed
security. The application of heat (in
the form of a laser beam) creates a
chemical reaction inside the core
of the card, causing molecules to
move to the surface. The resultantcharacters or images are virtually
impossible to modify - any attempt
to alter or remove laser engraved
data invariably destroys the substrate
surface. Another advantage of laser
engraving is that the data does not
fade or deteriorate due to UV light or
surface abrasion.
f) Advanced Laser Engraving
Laser engraving facilitates the creation
of Multiple Laser Images (MLI) and
Changeable Laser
Images (CLI),
which cannot be
produced using
other technologies.The process used
to integrate CLI/
MLI images into
the card body is
highly specialised.
CLI/MLI images
are similar to
holograms in that
alternate images
are produced,
albeit using directlaser engraving.
The alternate
images are positioned close to each
other and engraved at different angles.
In contrast with holograms, CLI/MLI
data forms an integral yet unique part
of the card body (it is applied during
personalisation). CLI/MLI allows
personal data to be engraved on
individual cards. Think, for example,
of the document ID number or
expiration date in combination with
non-standard flipping images of the
cardholders photograph or signature.
As the data cannot be copied or
tampered, advanced laser engraving
offers an additional level of security.
It also creates a much higher entry
barrier for counterfeiters compared
with other personalisation techniques.
The result is a highly tamper-resistant
card.
g) Creating Uniform Security
Standards:
With the lack of consistent standards
across identification documents today,
it is often difficult to give reasonable
assurance of a given documents
authenticity. For e.g. MasterCard and
Visa addressed the counterfeiting
problem by mandating a uniformsecurity feature in the form of a hot
stamped hologram in the same place
on each card, while leaving the rest
of the design up to the discretion of
the member banks. This resulted in a
dramatic reduction in the incidence
of credit card counterfeiting. Thissolution works because each layer of
the security chain: consumer, issuer
and law enforcement official alike,
know where and what to look for to
authenticate a given card.
In the end, no single security feature
is able to provide adequate protection.
Instead, security is optimized if several
features are combined.
A clear laminate can be used to
extend the cards life. If the laminate
also contains holographic images,
security is improved at the same time.
Holographic laminate is therefore
highly recommended for national
IDs.
ConclusionImproving the security of identity
documents is a matter of urgentnational security. Most identity
documents in use today were not
designed as secure documents,
and there are no uniform security
standards in place to assist the
public and law enforcement in the
recognition of genuine versus
counterfeit identity documents.
Government should understand
that counterfeiters will attempt
to counterfeit the least secure
document.
Although no-one can stop a
counterfeiter from trying to modify
or copy a document, the right
combination of security features
and technologies make it impossible
for him to be successful. These
security features must be practical
for document issuers to implement,
easy for the public to recognize and
provide specific identifying featuresfor law enforcement and forensic
investigators.
Cover Story
Figure 4: Phenostar, a holographic photopolymer storagemedium for plastic cards, invented by Bayer Material Science
13
-
8/6/2019 The Holography Times, Vol 3, Issue 8
14/16
www.homai.org
The Holography TimesIndustry Updates
14
-
8/6/2019 The Holography Times, Vol 3, Issue 8
15/16
www.homai.org
The Holography Times
Patents related to identity documents
Security Hologram for Identity
Document
United States Patent Application
20090051986 (This invention relates
to improved techniques for using
holograms to provide security for
documents and the like.)
Abstract: Overlaying a security document
such as a driving license or passport with
a hologram, which is difficult to copy,
can afford additional security value. For
example in the British passport document,embossed holography has been used in
the form of a translucent thin layer coated
on its reverse side with a layer of material
such as zinc sulphide, whose refractive
index is significantly higher than the
carrier. Thus light is reflected from the
interface in such a way as to reconstruct
the holographic image, whilst permitting
the viewer to see simultaneously, printed
matter behind the holographic film.
The idea is that an attempt to remove thecovering layer will result in destruction
of the document but in practice one of
the most common forms of passport/ID
forgery is where the protective laminate
is lifted off, allowing the print underneath
to be tampered with or the laminate to be
reused on other documents. Background
prior art can be found in EP 0 754
987A, WO 2006/077447 A2, U.S. Pat.
Nos. 4,971,646A, 5,834,096 A and US
2006/0289114 A1. There is therefore a
need for improved anti-counterfeiting
techniques for security documents andthe like.
Hologram laminate and
hologram label
United States Patent Application
20060193021
Abstract: A hologram laminate allows
traces of separation of the hologram to
be clearly left on both the adherend andthe hologram label and hence makes it
possible to prevent re-use of the hologram
and is excellent in graphical design
function and suitable for certificationpurposes. A hologram label used for the
fabrication of the hologram laminate is
also provided. The hologram laminate
has a colored layer, a release pattern, a
transparent film, a hologram layer and
a surface protective layer laminated on
an adherend in the order mentioned.
The hologram layer includes a volume
hologram layer and a relief hologram
layer having a transparent thin-film layer
over the surface of the relief interference
fringe pattern. The volume hologram
layer and the relief hologram layer are
superimposed so as to be switch able from
one to another. The hologram laminate is
separable between the adherend and the
transparent film. When the hologram is
separated, the colored layer is left on the
adherend in a pattern corresponding to the
release pattern. The hologram label has a
release sheet in place of the adherend in
the hologram laminate
Digitally watermarking
holograms for identity
documents
United States Patent Application
20030210805
Abstract: The present invention relates
to digital watermarks integrated into
holograms, watermarked hologram
structures, and related applications as an
authentication technique. One method
creates a watermark image, and thenembeds the watermark image into a
holographic structure. The holographic
structure is carried by a smart card.
The smart card includes additional
information. In one embodiment, the
digital watermark includes information
bits, and these information bits are used
to authenticate the hologram, or the
smart card. In another embodiment,
the watermarks information bits are
compared with the additional information
carried by the smart card. The result of
the comparison is used to authenticate the
smart card or the hologram.
Events & CalendarHOLO-PACKHOLO-PRINT 2009
11-13 November 2009, Budapest, Hungary
www.holopackholoprint.info
LABEL EXPO ASIA 2009
1-4 December 2009, Shanghaiwww.labelexpo-asia.com
PRINTECH 2009
18-21 December 2009, Mumbaiwww.mmsprintech.com
OPTICAL DOCUMENT SECURITY
January 20-22, 2010, San Francisco, CA, USAwww.opticaldocumentsecurity.com/
5TH GLOBAL FORUM ON PHARMACEUTICAL
ANTICOUNTERFEITINGFebruary 24-26, 2010, Miami, FL, USAwww.reconnaissance-intl.com
PAN-EUROPEAN HIGH SECURITY PRINTING
CONFERENCE
April 13-15, 2010, Berlin, Germanywww.cross-conferences.com
Editorial Board
Neha Gupta | C S Jeena
The Holography Times is published by
HOLOGRAM MANUFACTURERS
ASSOCIATION OF INDIA (HoMAI)
21-Ground Floor, Devika Tower 6, Nehru Place,New Delhi - 110019, INDIA
Telefax: +91-11-4161 7369,Email: [email protected]
Web: www.homai.org
Designed and Printed byChandan Kumar
[email protected] behalf of HoMAI
Disclaimer: The data used here are from various
published and electronically available primary and
secondary sources. Despite due diligence the source
data may contain occasional errors. In such instances,
HoMAI would not be responsible for such errors.
15
-
8/6/2019 The Holography Times, Vol 3, Issue 8
16/16
The Holography TimesIndustry Updates