Over the years, holograms have evolved from purely decorative images to bona fide security devices. During this evolution, highly secure technologies have been developed specifically for product and document protection. To maximize the security potential of these hologram technologies requires a holistic approach. A hologram alone is not enough. To be effective it must be part of a security program and that security program needs to inform the design and development of the actual hologram. In the most elementary case the security program can be as simple as applying a tamper evident label for a one-day event. In a complex implementation it would include multi-level technologies and corresponding verification methods. A holistic approach is accomplished with good planning and articulation of the problem to be solved, and then meeting the defined security objectives. Excellent communication among all the stakeholders in a particular project is critical to the success of the project. The results of this dialogue inform the design of the security hologram.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.