You are on page 1of 16

theholographytimes

The journal of hologram industry


October 2009 | Vol. 3 | Issue 8

TM The Holography Times

www.homai.org

ID Cards
Protecting People

But

WHAT about their


Special Report
Global trends for document security

protection?

ALSO: Innovation: Research team designing holographic imaging system for ovarian cancer UK national ID card unveils Indian passports to go the e-way Patent news Events & calendar & more...
1

www.homai.org

The Holography Times is quarterly published by HoMAI.

The Holography Times

Holographers To The Globe

www.homai.org

Editorial

The Holography Times

Holography : A technology protecting products & lives!

In this issue
Innovation Holographic imaging system for ovarian cancer

e are delighted to share with you our quarterly newsletter, Th d li h d h ih l l The Holography Times. This is perhaps the best means of staying in touch with the holographic family, where we share with you latest developments in the Indian and the international holographic industry, learnings from around the world which have future potential and can be applied to your business- where the aim is to establish a connection between the expanding universe of holography and its importance in daily life. Holography is a fast developing science having enormous impact on the society at large. Worldwide innovations like scientists working on Holographic Imaging Systems to ght ovarian cancer are leading to revolutionary changes in our world. In this newsletter we discuss how this imaging instrument contributes to a broader understanding of ovarian cancer - The Silent Killer. Identity counterfeiting is an increasing global menace that has turned our identities into highly valuable assets. Since being developed over 60 years ago holograms have been the most successful anti-counterfeiting measure in this battle against ID counterfeiting. While the rst DOVID appeared on a credit card in 1982 and on a banknote in 1988, in 1985 the rst metallized hologram appeared on the passport of Iraq. Here we discuss about the role of a hologram offering protection against forgery of variable information like photograph and personal data and global developments in ID document protection. The issue talks about how holography is not only protecting identity documents, saving tax revenues but also playing a social part by protecting human lives. Once again we seek your feedback and valuable advice to take this newsletter and association to greater heights. Happy reading! Team HoMAI!

4
Web Watch 5 News Bytes 6

Company Prole
Holographers To The Globe

9
Cover Story Global trends for document security

10

Patent news related to identity documents

15

www.homai.org

The Holography Times

Technology

Innovation
Holographic imaging system for ovarian cancer
Human ovary image captured with the use of the prototype holo-graphic imaging system the team developed.

For comparison, an onion is imaged with the use of the prototype system the team developed.

wo University of Arizona researchers have formed a research team to design, build and evaluate an ovarian cancer medical imaging and screening instrument that will use holographic components in a new type of optical microscope. By using holograms and merging medical and optical science, researchers Raymond Kostuk and Jennifer K. Barton are developing a way of seeing enough varied depth in ovarian tissue to detect microscopic cancer cells in their earliest stages. This would be a huge advance in the ght against an insidious disease that kills most women within ve years of diagnosis. The system will work like a highpowered microscope that can be used to study tissue samples already removed. In addition, an endoscopic version is in the design stage to safely scan the ovaries for cancer during laparoscopic screenings in high-risk women. The system is unique in that it will for the rst time project multiple spatial images from different depths within a tissue sample and simultaneously provide spectral information from optical markers in order to better identify cancerous cells. Raymond Kostuk and Jennifer Barton have secured a ve-year; $2.4 million grant from the National Institutes of Health to build the instrument that they hope will one day be used to monitor

women at high risk for ovarian cancer. The grant was issued following the successful two-year development of a prototype system the team built. During the past 25 years Kostuk has researched different aspects of holography and holographic materials for use as optical elements. The holographic imaging system being designed combines an optical technique that creates images capable of detecting subtle tissue microstructure changes. Together with uorescence spectroscopy methods, the system has demonstrated capability for early cancer detection. Another member of the team, UA research professor Marek Romanowski, is working on the development of targeted uorescent dyes that will be used on tissue samples to

identify or conrm suspected cancerous areas shown in the spatial image. Barton said ovarian cancer provides a compelling case to test holographic imaging and its efcacy in detecting cancers. At the present time the preferred treatment is surgery, which is also often needed to diagnose ovarian cancer. The procedure includes taking tissue samples, which may threaten the womans ability to have children in the future. The researchers expect to spend the next ve years ne-tuning a wandlike instrument thats anticipated to be a game changer for medicine if it does what is intended - allow high-risk women to know whether they actually have ovarian cancer before having their

Raymond Kostuk

Jennifer Barton

www.homai.org

Technology
ovaries removed. The system will image like an MRI or a CT scan but with much higher resolution than an ultrasonic image and will be a lot less expensive than an MRI. As an additional benet no radiation will be used or exposed to sensitive ovary areas during the cancer screenings, Kostuk said. The researchers in the future course will do three major things: improve the performance of a prototype of the technology Kostuk and Barton already have developed; package the technology into a laparoscopic system that can be taken into the operating room; and perform a pilot study on women who already are having their ovaries removed. Ultimately, Kostuk and Barton want to help save lives and contribute to a broader understanding of how ovarian cancer progresses. Our hope is that it would detect it earlier by providing more information, said Barton, who heads the universitys department of biomedical engineering.

The Holography Times

The Silent Killer


Ovarian cancer is often called the silent killer because many times there are no symptoms until the disease has progressed to an advanced stage.

Ovarian Cancer Facts to Know


Fact 1: Ovarian cancer is the leading cause of gynecologic cancer deaths among women. Fact 2: If diagnosed in its early stage, the chance of survival is 90%. Fact 3: Only 24 percent of ovarian cancers are diagnosed at an early stage, when the cancer is conned to the ovary. Fact 4. One woman out of every 55 (approximately 1.8 percent) will develop ovarian cancer at some point in her lifetime. Fact 5. Ovarian cancer is most common in women who have already gone through menopause. The average age for developing ovarian cancer is 61 years old. Fact 6. For the small number of women who are fortunate enough to have their cancer diagnosed before it has spread beyond the ovary, the chance for recovery is 85 to 90 percent. Fact 7: The risk for ovarian cancer is greater for women who have never had children, who had their rst child at a later time in life or who have a personal history of breast cancer, colorectal cancer or endometrial cancer. Fact 8. The only sure way to diagnose ovarian cancer is through microscopic examination of abnormal uid or tissue, obtained by needle aspiration (withdrawal of uid or tissue from a suspicious area though a special, wide needle) or surgery. Fact 9. Hycamtin is one of the rst of a new kind of anti-cancer drugs that kills cancer cells by inhibiting an enzyme essential to the replication of human DNA.

Web watch section


rotecting vital information is of utmost importance to companies nowadays, whether it is printed documentation or digital les. Thus, here we mention certain websites armed with useful tips on information security and how to safeguard companies from threats and violation of the rights to privacy.

The goal of this website is to try & prevent, detect, resolve, or repair internet and network security issues in Asia. You can get essential tips on how to protect both the front and back end of your website. You may also check how to secure data through tips, articles, white papers, and case studies that, ironically, spill over information on information security.

1. Search security asia (www.searchsecurityasia.com)

Toolkit, Security Policies., Security Risk Assessment, and Risk Analysis: How & Why-describes the method and approach on Security Risk and manual for Information Security management. You may also nd news on the upgrade of ISO 17799 to ISO 27002.

2. Computer Security News (www.computersecuritynow.com)


The purpose of this website is presenting an almost perfect portal for ISO 17799 Information security. From general information to implementation, this website provides downloadable les for your reference like ISO 17799

www.homai.org

The Holography Times

News Bytes

UK national ID card unveils


passport as well as ngerprints on a secure electronic chip. This chip will link to a biometric database holding a persons ngerprints and address. The cards remain a central part of the governments plans to tighten up Britains border controls and clamp down on illegal working. Given the growing problem of identity fraud and the inconvenience of having to carry passports, coupled with gas bills or six months worth of bank statements to prove identity, Mr. Johnson, believes the ID card will be welcomed as an important addition to the many plastic cards that most people already carry. The fact that it can be used as a passport when traveling in Europe will be an added advantage, he said. Over the years the reason for issuing documents has also shifted to being a good proof of age tool. This approach has received the backing of the National Federation of Retailers and Newsagents, whose spokesperson said: Underage sales are a problem across the UK and we are always looking for new ways for the public, especially those under the age of 18 years old, to prove their identity. Source: news.bbc.co.uk

The UK government relied on hologram for the protection of their ID card.

he UK government relied on hologram for the protection of their ID card.

The UK ID cards image was ofcially unveiled by the Home Secretary Alan Johnson in Manchester in August 2009. This ID card is voluntary for British

citizens and can also be used as a travel document in Europe. The card image shows the information contained on the face of the card, including photograph, name, date of birth and signature, as well as the cards unique design. It holds similar information to that currently contained in the UK

JDSU increases security with holofuse technology


DSU, a leading provider of innovative optical solutions for brand authentication, medical/environmental instrumentation, semiconductor processing, display, etc. has introduced its HoloFuseTM polycarbonate lm, a new highly integrated product that helps protect government-issued identity documents such as passports, national identity documents and drivers licenses against counterfeiting and tampering. HoloFuse is the rst solution that includes a hologram that is integrated into a polycarbonate lm without the use of adhesives. This lm in turn becomes the clear outer layer of identity documents, helping to

reduce the ability of counterfeiters to separate card layers and tamper with their security. In addition, providing an integrated solution simplies the manufacturing process for card and identity document makers. The partially transparent and customized hologram within the polycarbonate lm includes overt, covert and forensic security features that make it difcult to reproduce. JDSUs patented technology also better preserves the hologram, making it brighter and easier to identify. The new HoloFuse product is based on JDSUs years of expertise in optical

science and provides a whole new way to protect the integrity of high security identity documents, while simplifying the manufacturing process for card makers, said Garth Zambory, Document Authentication product manager for the Advanced Optical Technologies business segment at JDSU. The polycarbonate material is also more environmentally friendly than plastics typically used for the creation of cards such as PET or PVC. JDSU has led a patent for the new solution and expects to be shipping it during the second half of calendar year 2009. Source: www.jdsu.com

www.homai.org

News Bytes

The Holography Times

NAFDAC likely to set up check points for counterfeit drugs

ccording to a WHO report, about 16.7% of the total pharma exports to Nigeria are counterfeit. Following recent apprehensions over substandard drugs marketed in Nigeria, the National Agency for Food and Drug Administration and Control (Nafdac) has proposed to set up overseas control points in India and China to verify the quality of all drugs and allied pharmaceutical products sold in Nigeria from these two countries. These check points are expected to have state-of-theart technologies to check counterfeit on the spot. This is said to be the rst initiative to counter fake drug supply in the generic business. The Nigerian government also plans to bring in lifetime jail term or death penalty for manufacturers and distributors of fake and substandard drugs in Nigeria. We would sign a memorandum of understanding with the Department of Pharmaceuticals, government of India, on September 30, to put in place a joint regulatory framework for both the countries to check counterfeit drugs, informed Paul B Orhii, director general Nafdac. He

said that about 20 Indian pharmaceutical companies in various categories have expressed interest in setting up manufacturing facilities in Nigeria. The likes of Apollo Pharmacy and Hetero Dugs, which have a wide network of pharmacy outlets in the country, have been approached to set up pharmacies for marketing quality products and dispel fears of sub-standard drugs. Incidentally, Nafdac has had discussions with Torrent Pharma and Ranbaxy for setting up bio-equilance and bioavailability study centres in Nigeria. Nafdac is planning to join hands with the National Institute of Pharmaceutical

Education and Research, Hyderabad, to train its people. The Nigerian government would give rewards to informers and actively encourage victims to gather evidence that enable us to sue manufacturers and distributors of these deadly products. He also informed that a massive campaign was being drawn up jointly by Nafdac, the Indian government, China and the US to build an international coalition to ght counterfeit drugs. Source: www.nancialexpress.com

TSSI buys ver-tec patents

SSI has acquired a portfolio of patents for specialist volume and true colour holograms including Biometrigram and HD-3D hologram patents from authentication security technology and consultancy rm Ver-tec. The move follows the recent launch of TSSIs Magnetics Solutions Division, which aims to drive growth across TSSIs document security and brand protection products. According to TSSI, counterfeiters are becoming increasingly sophisticated, producing highly realistic ID documents. Additional security measures are therefore required to provide the highest level of protection possible and ensure that ID documents such as passports, ID cards and access cards cannot

be replicated. Hologram technology provides an effective security solution for all identity documents as each hologram is unique making it impossible to imitate. HD-3D is a true colour hologram, meaning the images always maintain their original colours from any viewing angle, unlike embossed holograms which exhibit a rainbow effect. Each hologram is unique with different serial numbers and/or bar codes, which can also be encrypted for added security. The Biometrigram, a volume hologram, can store multiple biometrics as well as analogue images and encrypted digital information.

TSSI says these have a higher information density than electronic chips so are ideal for use on ID cards. Each hologram is unique so ensures the correct identity of the document holder and provides an effective security measure in the ght against identity fraud. Both of these products are a welcome addition to our portfolio of identity and document security offerings. Our customers want top quality security solutions and these new patents will meet this increased demand for fraud proof identity documents, says Danny Chapchal, executive chairman, TSSI Systems.
Source: www.securitydocumentworld.com

www.homai.org

The Holography Times

News Bytes

Indian passports to go the e-way

ndia will shortly switch over to epassport system, increasingly used globally to check terrorism using false identity. The government launched its e-passport scheme on Jun. 25 this year, where President Pratibha Patil, Prime Minister Manmohan Singh and Vice President Hamid Ansari were the rst ones to receive their biometric passports. E-passports have been issued to diplomats since July this year, but are expected to be extended to all citizens from September next year. The Indian government appears on track to issue some 800,000 e-passports next year and begin piloting its new backend system touted to enable faster delivery of passport services, baring no further delays. Already, 35 countries have shifted to the e-passport system, also called biometric passports, which is an offshoot of the 9/11 attacks in the U.S. The e-passports are designed to facilitate international travel by allowing automatic identity verication and faster immigration inspections, as well as provide efcient border protection and security. These would look like an

ordinary passport with an embedded electronic chip. The chip would contain the photograph, ngerprint and personal information of the holder so that the passport could not be duplicated. An e-passport is machine-readable, enabling quick processing at airports. The passport comes with a built-in security (biometric) feature, which comprises an integrated circuit (IC) embedded in the back cover that stores the data, including photo. These also make the passport tamperproof. In ordinary passports, this data is typically displayed on the photo page. E-passports support a combination of electronic and optical security features including watermark, optically variable device and hologram. If an e-passport is misused, the immigration checkpoint will be able to detect a mismatch between the printed and digital information, and authorities can take necessary action against the offender. The International Civil Aviation Organization (ICAO) sets the standards for e-passports that have been

implemented in over 70 countries. Data in the Indian epassport can be read in other countries as it adheres to the ICAO global standards for biometrics and secure storage of personal data in travel documents. The Indian government next year will also launch its Passport Seva Project. Implemented by Tata Consultancy Services (TCS) under a build-operatetransfer scheme, the Passport Seva Project entails digitization of the entire passport services. It seeks to deliver all passport-related services to citizens in a timely, transparent, more accessible and reliable manner, through streamlined processes and trained workforce. This US$207.3 million (10 billion rupees) project is part of the governments National e-Governance Plan (NeGP). Source: www.businessweek.com, www.igovernment.in

RBI plans to print Rs.10 plastic notes

oiled notes may soon be a thing of past with the Reserve Bank of India (RBI) planning to introduce polymer banknotes whose life span would be four times the normal currency notes and would be difcult to imitate. The seizure of large quantities of fake Rs 1,000 and Rs. 500 notes has led the RBI to toy with the idea of replacing paper currency with polymer notes. As a pilot project, the Central bank is planning to introduce one billion pieces of Rs. 10 polymer notes, for which the bank has oated a global tender. The bank has asked interested parties for 500 pieces of sample banknotes, before the actual global bids for the project go through.

Explaining the rationale for the introduction of polymer notes, the ofcial said these notes are extremely difcult to counterfeit and have a lifespan of ve years compared to paper currency which lasts just one year. They can also be washed, making them more hygienic. Central banks the world over believe that the only sure way to control counterfeiting is through continuous design change and innovation. The polymer notes were rst introduced in Australia to safeguard against counterfeiting of currency. Besides Australia, other countries which have introduced plastic notes, include New Zealand, Papua New Guinea, Romania, Bermuda, Brunei and Vietnam.

Going by the increasing incidence detection of fake notes, RBI may consider introduction of higher denomination plastic notes. The RBI had rst hinted in 2007 that it may start using plastic notes. Source: Financial Chronicle, September 2009; India Today, September 2009

www.homai.org

Company Prole

The Holography Times

Holographers To The Globe

two forms of application discussed above, the nal document can be used as is basis or can be further laminated within a pouch. The use of pouch adds another layer of security & also enhances life of the document. There are a number of methods that can be adopted for securitization of identity documents depending on volume of documents to be securitized, method of application and resources available. Thus, Holostik offers security holograms in (i) Pressure sensitive form (ii) Hot Stamping Foil form (iii) Transparent Holography form and (iv) Laminate form, as per customer requirements. The most common form is to apply Security Hologram on to the existing identity document. This hologram can be afxed on the document separately or in a manner so that it partially covers the photograph of the bearer. As it is tamper evident in nature, any attempt to remove it will result in its destruction. At Holostik we offer, both Pressure sensitive holograms that are afxed manually and automatically and Hot Stamping Foil based holograms that are afxed using a Hot Stamping machine, in standard and customised shapes. Pressure sensitive security hologram can be of Transparent / Semi-Transparent type. Another method is to use preprinted identity document having holographic strip running through. In this method, Holostik prints the required identity document and applies a strip of security hologram as per design. This method does not require hologram handling at the end user, rather only printing of the individual card details. The use of a security strip offers a larger area and is also visually appealing. In the Holostik offers a third option which combines benets of tamper evident transparent security holography with transparent laminated holographic pouch, offering high security with exibility of use. Customer needs to print data on to the document type, paste photographs etc & then place document in the pouch and pass it through a pouch laminator. The end product protected by the laminated pouch, it has see-through holographic features through out the fascia, is tamper evident, visually appealing and easy to authenticate, making it is easy to protect, securitize and authenticate identity documents. Holostik provides tailor made solutions for the I.D. Cards depending on the customers requirement i.e. security solutions, semi high security solutions and high security solutions. But, we always incorporate certain security features in all of the above three categories so that it becomes extremely difcult for counterfeiters to copy. Today, many of the important and sensitive documents worldwide are protected using our tailor made security products. What ever be the customers need, Holostik can provide the right solution because of its rigorous R&D and wide exposure, experience in holography and allied products. Just allow us to become your Security Partner to help you in securing your products and we assure of your complete satisfaction. For any queries/assistance, feel free to contact us at holostik@vsnl.com.

olostik India Limited offers security solutions for protection/ authentication of identity documents. Holostik is the leading Security Hologram manufacturer in India, since 1991, and one of the largest manufactures in the world with over 5000 customers in Government, Public and Private sectors. Holostik has all facilities under one roof under high security environment. We supply holographic security solutions to various prestigious government bodies, for identity document protection. Holostik has two types of Master Origination machinesConventional 2D/3D machine and 24000 DPI Dot Matrix master origination machine, which offers ability to produce combination masters with added security. Our R&D (master lab) team has developed certain high security features (both overt and covert), which are very difcult for other holographers to develop. Holostik has an in-house printing facility, which offers up to 8 colour UV printing options on paper and 10 colour printing options on lm, providing latest high security features in printing available in the world. Our product range includes regular security holograms, paper products incorporating security features, polyester / PVC / other plastics based lm products and / or a combination product of one or more of the above substrates with holographic security

www.homai.org

The Holography Times

Cover Story

Global trends for document security


dentity is an integral part of the Human subsystem. All livings being struggle for their unique identity in the universe- It may be in the form of knowledge, Power or Wealth. In ordinary language, one can use the word identity to refer to characteristics or attributes that cannot naturally be expressed in terms of a social category. However, realizing its importance, worldwide all governments keep their Citizen in easy and quick access identity formats. But today, Identity counterfeiting is a growing global menace that has turned our identities into highly valuable assets. The potential risks associated with fake identication documents can be high. With a fake identity, an individual can potentially gain illegitimate access, qualify for government benets, defraud credit companies or make illegal purchases. Even though todays card printing technology delivers superior image quality and exceptional card durability at a surprisingly affordable cost, but with forgery and counterfeiting now a serious issue, what defense mechanism are solution providers putting in place to protect the end users? This article outlines how to reduce the risk of counterfeiting with latest document security trends, paying particular attention to a system combining the most effective features.

Identity Cards:
ID Cards were introduced during the First World War as part of a statutory registration scheme. It ended in 1919. They were introduced in 1939 and remained in force for several years after the war until they were abolished by Churchill in 1952. Today, around a hundred countries have ofcial, compulsory, national IDs that are used for variety of purposes. In India, the recent national Unique Identication (UID) project launched by the Government of India, with the iconic technocrat, Mr. Nandan Nilekani at its helm is indeed a signicant project. With this, India has embarked on an ambitious e-governance project which targets to provide a unique number to each citizen.

number, etc. these documents are used routinely not only to verify a persons identity but can also be used to protect rights to privacy, wealth and security. Today, governments worldwide are using e-Governance methods and realizing that national security has profound effects on the economy and our way of life. To optimize these issues, a diversity of security features is available. A brief overview of the most widely used features is given below.

The identity of a physical object is uniquely determined by a set of distinctive properties. Most ID cards are fabricated today by direct printing on composite CR-80 cards comprising layers of cross-oriented polyester with outer layers of PVC. Once printed, a tough 0.001 (1 mil) thick polyester laminate is typically applied to protect both sides of the card. After the process, companies used a variety of integrated security features, which can be classied mainly into three categories visible, invisible and forensic. Finally, there are machine-readable magnetic stripes, bar codes and programmable devices (smart cards) that can provide even more security, plus the means for automatic data checking and database connectivity.

Commonly used security features


Most people would agree that secure identication begins with a photo ID card, the most representative of which is the drivers license. While a good photo likeness and a legible signature remain the key features of a photo ID card, those features alone are inadequate today. Issuing authorities now incorporate several additional features to deter counterfeiting, while at the same time making authentication easier and more reliable.

Authentication
In this era of heightened security concerns, we are keenly aware of the role that ID Documents, or credentials, play in our lives. Whether a drivers license, passport, social security number, Unique Identity

Level 1 (Overt features)


These are rst line validation features, i.e. they can be seen without the use of equipment or special devices. The most frequently encountered Level 1 device is a High Refractive Index (HRI) hologram printed on either the card or, more

10

www.homai.org

Cover Story
commonly for drivers licenses, on the underside of the protective laminate. Recently developed demetallization and photo polymer holographic techniques now offer enhanced depth, transparency, and ne line detail which most would acknowledge being practically counterfeit-proof. covert background printing that is incorporated in the card design.

The Holography Times

Level 3 (Forensic features)


The majority of these must be kept secret to remain useful. Analysis of a card having Level 3 features is essentially a post-mortem process, often requiring some dismembering of the card to determine its origin, and to minutely inspect the features for validity. Level 3 devices are images or physical objects that are hidden within the card structure or concealed by special graphic effects on the card surface. Typically, they can be fully validated only by specialized optical scanning devices, or other means of machine-reading data.

SOLUTIONS TO IMPROVE SECURITY OF IDS- ADDING EXTRA SECURITY


ID card security comes from a combination of features inherent to the card media (like overt, covert and forensic), together with variable features printed at the time of issuance. To add security, growing use is made of security features with integrated personal data.

Level 2 (Covert features)


Level 2 features are veriable by simple, inexpensive tests such as visual inspection under a lens or black light (UV), biometric scanning, digital scanning and data base checking. Examples of Level 2 features include: specialized bar codes, micro-printing, and

a) UV-Ink Personalization
One example is on-demand UV ink personalization, which allows cardholders photograph or personal data to be printed in high-resolution gradient UV ink. Pre-printed features are very difcult to duplicate. User dened text, with deliberate random font changes and misspelling if desired, may be micro-printed as an added security features. Character height of the micro-printing is ve thousand of an inch. Other printed security choices include Guilloche patterns, serial numbering and micrographics.

b) Holographic Laminate
Since their use in 1989, holograms were historically hard to copy; they were used to provide cloning resistance to products. Holographic laminate may be used to extend the useful life of a card while simultaneously protecting it against data manipulation. To combat document tampering and counterfeiting, the holographic industry is developing and implementing new security features such as nano-text and images (very small text and graphics including entire city maps) created using special diffractive techniques. Other enhanced diffractive methods also exist.

Figure 1: Security features in currently release UK National ID Card

www.homai.org

11

The Holography Times

Cover Story

Figure 2: Lamination Security features

c) Holographic Personalization Technology (HPT)


Database verication is an important element of ID card. To secure this, a more recent trend is to combine holographic laminates with personal data, photos and other information. One example is Identigram, as found on the German ID Card and e-passport. HPT allows unique or generic diffractive images to be coated on a card surface. The images incorporate unique optical effects that are extremely difcult to counterfeit.

Think, for example, of the card holders photo, biographic data, a logo, symbols, a coat of arms or a combination thereof. This technology, which is also available for desktop personalization, allows a much wider range of diffractive optical images to be designed, this effectively adding an additional level of security to ID cards.

d) Holographic Biometrics Security


The security of card can also be enhanced by encrypting and storing (biographic data) on high-capacity chips, possibly in combination with biometrics. Given the limited space available on an ID cad, especially compared to passport, the use of electronic ID cards- or eIDs likely to increase. Moreover, eIDs

can be used for various e-business and e-governance applications, including online banking, shopping, and user registration and with implementation of government schemes. In this system, the holographic photopolymer is laminated to the plastic card, either as a strip or patch. It is laminated with a reective layer and protected against wear of tampering. The designated biometric (e.g. an iris scan or ngerprint) is captured in the normal way (cameras, ngerprint scanner, etc), then encoded using a code mask.

e) Enhanced Security with Laser Engraving


A growing number of industry participants are calling for laser engraving technology to be used on a broader scale. Laser engraving

Figure 3: German ID card using HPT

12

www.homai.org

Cover Story
Changeable Laser Images (CLI), which cannot be produced using othertechnologies. The process used to integrate CLI/ MLI images into the card body is highly specialised. CLI/MLI images are similar to holograms in that alternate images are produced, albeit using direct Figure 4: Phenostar, a holographic photopolymer storage medium for plastic cards, invented by Bayer Material Science laser engraving. The alternate involves burning data into images are positioned close to each the substrate of an ID card or other and engraved at different angles. polycarbonate biographic data In contrast with holograms, CLI/MLI page. The data may consist of text, data forms an integral yet unique part images and graphics (including of the card body (it is applied during security features such as micro personalisation). CLI/MLI allows text). personal data to be engraved on individual cards. Think, for example, As such, laser engraving is a of the document ID number or technology rather than a security expiration date in combination with feature. The actual security is derived non-standard ipping images of the from the application method used. cardholders photograph or signature. If properly applied, laser engraving As the data cannot be copied or provides protection against alteration tampered, advanced laser engraving and reproduction. In fact, laser offers an additional level of security. engraving provides unsurpassed It also creates a much higher entry security. The application of heat (in barrier for counterfeiters compared the form of a laser beam) creates a with other personalisation techniques. chemical reaction inside the core The result is a highly tamper-resistant of the card, causing molecules to card. move to the surface. The resultant characters or images are virtually g) Creating Uniform Security impossible to modify - any attempt to alter or remove laser engraved Standards: data invariably destroys the substrate surface. Another advantage of laser With the lack of consistent standards engraving is that the data does not across identication documents today, fade or deteriorate due to UV light or it is often difcult to give reasonable surface abrasion. assurance of a given documents

The Holography Times

on each card, while leaving the rest of the design up to the discretion of the member banks. This resulted in a dramatic reduction in the incidence of credit card counterfeiting. This solution works because each layer of the security chain: consumer, issuer and law enforcement ofcial alike, know where and what to look for to authenticate a given card. In the end, no single security feature is able to provide adequate protection. Instead, security is optimized if several features are combined. A clear laminate can be used to extend the cards life. If the laminate also contains holographic images, security is improved at the same time. Holographic laminate is therefore highly recommended for national IDs.

Conclusion
Improving the security of identity documents is a matter of urgent national security. Most identity documents in use today were not designed as secure documents, and there are no uniform security standards in place to assist the public and law enforcement in the recognition of genuine versus counterfeit identity documents. Government should understand that counterfeiters will attempt to counterfeit the least secure document. Although no-one can stop a counterfeiter from trying to modify or copy a document, the right combination of security features and technologies make it impossible for him to be successful. These security features must be practical for document issuers to implement, easy for the public to recognize and provide specic identifying features for law enforcement and forensic investigators.

f) Advanced Laser Engraving


Laser engraving facilitates the creation of Multiple Laser Images (MLI) and

authenticity. For e.g. MasterCard and Visa addressed the counterfeiting problem by mandating a uniform security feature in the form of a hot stamped hologram in the same place

www.homai.org

13

The Holography Times

Industry Updates

14

www.homai.org

The Holography Times

Patents related to identity documents


Security Hologram for Identity Document
United States Patent Application 20090051986 (This invention relates to improved techniques for using holograms to provide security for documents and the like.) Abstract: Overlaying a security document such as a driving license or passport with a hologram, which is difcult to copy, can afford additional security value. For example in the British passport document, embossed holography has been used in the form of a translucent thin layer coated on its reverse side with a layer of material such as zinc sulphide, whose refractive index is signicantly higher than the carrier. Thus light is reected from the interface in such a way as to reconstruct the holographic image, whilst permitting the viewer to see simultaneously, printed matter behind the holographic lm. The idea is that an attempt to remove the covering layer will result in destruction of the document but in practice one of the most common forms of passport/ID forgery is where the protective laminate is lifted off, allowing the print underneath to be tampered with or the laminate to be reused on other documents. Background prior art can be found in EP 0 754 987A, WO 2006/077447 A2, U.S. Pat. Nos. 4,971,646A, 5,834,096 A and US 2006/0289114 A1. There is therefore a need for improved anti-counterfeiting techniques for security documents and the like. and is excellent in graphical design function and suitable for certication purposes. A hologram label used for the fabrication of the hologram laminate is also provided. The hologram laminate has a colored layer, a release pattern, a transparent lm, a hologram layer and a surface protective layer laminated on an adherend in the order mentioned. The hologram layer includes a volume hologram layer and a relief hologram layer having a transparent thin-lm layer over the surface of the relief interference fringe pattern. The volume hologram layer and the relief hologram layer are superimposed so as to be switch able from one to another. The hologram laminate is separable between the adherend and the transparent lm. When the hologram is separated, the colored layer is left on the adherend in a pattern corresponding to the release pattern. The hologram label has a release sheet in place of the adherend in the hologram laminate

Events & Calendar


HOLO-PACKHOLO-PRINT 2009 11-13 November 2009, Budapest, Hungary www.holopackholoprint.info LABEL EXPO ASIA 2009 1-4 December 2009, Shanghai www.labelexpo-asia.com PRINTECH 2009 18-21 December 2009, Mumbai www.mmsprintech.com OPTICAL DOCUMENT SECURITY January 20-22, 2010, San Francisco, CA, USA www.opticaldocumentsecurity.com/ 5TH GLOBAL FORUM ON PHARMACEUTICAL ANTICOUNTERFEITING February 24-26, 2010, Miami, FL, USA www.reconnaissance-intl.com PAN-EUROPEAN HIGH SECURITY PRINTING CONFERENCE April 13-15, 2010, Berlin, Germany www.cross-conferences.com

Digitally watermarking holograms for identity documents


United States 20030210805 Patent Application

Editorial Board
Neha Gupta | C S Jeena

Hologram laminate and hologram label


United States 20060193021 Patent Application

Abstract: A hologram laminate allows traces of separation of the hologram to be clearly left on both the adherend and the hologram label and hence makes it possible to prevent re-use of the hologram

Abstract: The present invention relates to digital watermarks integrated into holograms, watermarked hologram structures, and related applications as an authentication technique. One method creates a watermark image, and then embeds the watermark image into a holographic structure. The holographic structure is carried by a smart card. The smart card includes additional information. In one embodiment, the digital watermark includes information bits, and these information bits are used to authenticate the hologram, or the smart card. In another embodiment, the watermarks information bits are compared with the additional information carried by the smart card. The result of the comparison is used to authenticate the smart card or the hologram.

The Holography Times is published by

HOLOGRAM MANUFACTURERS ASSOCIATION OF INDIA (HoMAI)


21-Ground Floor, Devika Tower 6, Nehru Place, New Delhi - 110019, INDIA Telefax: +91-11-4161 7369, Email: cjhomai@gmail.com Web: www.homai.org Designed and Printed by Chandan Kumar connectchandan@gmail.com on behalf of HoMAI
Disclaimer: The data used here are from various published and electronically available primary and secondary sources. Despite due diligence the source data may contain occasional errors. In such instances, HoMAI would not be responsible for such errors.

www.homai.org

15

The Holography Times

Industry Updates

16

www.homai.org

You might also like