The Holography Times, October 2009, Volume 3, Issue No 8
1. theholographytimes
TM
October 2009 | Vol. 3 | Issue 8 www.homai.org
www.homai.org
The Holography Times
The journal of hologram industry
ID Cards
Protecting People
But
WHAT
about their
protection?
Global trends for
document security
ALSO:
Innovation: Research team designing
holographic imaging system for ovarian
cancer • UK national ID card unveils • Indian
passports to go the e-way • Patent news
• Events & calendar & more...
1
Special Report
The Holography Times is quarterly published by HoMAI.
3. Holography :
A technology protecting
products & lives!
www.homai.org
The Holography Times
We are delighted to share with you our quarterly newsletter, The
Holography Times. This is perhaps the best means of staying in
touch with the holographic family, where we share with you latest
developments in the Indian and the international holographic industry, learnings
from around the world which have future potential and can be applied to your
business- where the aim is to establish a connection between the expanding
universe of holography and its importance in daily life.
Holography is a fast developing science having enormous impact on the society
at large. Worldwide innovations like scientists working on Holographic Imaging
Systems to fi ght ovarian cancer are leading to revolutionary changes in our
world. In this newsletter we discuss how this imaging instrument contributes
to a broader understanding of ovarian cancer - The Silent Killer.
Identity counterfeiting is an increasing global menace that has turned our
identities into highly valuable assets. Since being developed over 60 years ago
holograms have been the most successful anti-counterfeiting measure in this
battle against ID counterfeiting. While the fi rst DOVID appeared on a credit
card in 1982 and on a banknote in 1988, in 1985 the fi rst metallized hologram
appeared on the passport of Iraq. Here we discuss about the role of a hologram
offering protection against forgery of variable information like photograph and
personal data and global developments in ID document protection.
The issue talks about how holography is not only protecting identity documents,
saving tax revenues but also playing a social part by protecting human lives.
Once again we seek your feedback and valuable advice to take this newsletter
and association to greater heights.
Happy reading!
Team HoMAI!
In this issue
d li h d h i h l l Th
Editorial
Innovation
Holographic imaging
system for
ovarian cancer
4
Web Watch 5
News Bytes 6
Company Profi le
9
10
Cover Story
Global trends for
document security
Patent news related to identity 15
documents
3
Holographers
To The Globe
4. Technology
www.homai.org
The Holography Times
Innovation
Holographic imaging system for ovarian cancer
Two University of Arizona researchers
have formed a research team to
design, build and evaluate an ovarian
cancer medical imaging and screening
instrument that will use holographic
components in a new type of optical
microscope. By using holograms and
merging medical and optical science,
researchers Raymond Kostuk and
Jennifer K. Barton are developing a
way of seeing enough varied depth in
ovarian tissue to detect microscopic
cancer cells in their earliest stages.
This would be a huge advance in the
fi ght against an insidious disease that
kills most women within fi ve years of
diagnosis.
The system will work like a high-powered
microscope that can be used to
study tissue samples already removed. In
addition, an endoscopic version is in the
design stage to safely scan the ovaries for
cancer during laparoscopic screenings
in high-risk women. The system is
unique in that it will for the fi rst time
project multiple spatial images from
different depths within a tissue sample
and simultaneously provide spectral
information from optical markers in
order to better identify cancerous cells.
Raymond Kostuk and Jennifer Barton
have secured a fi ve-year; $2.4 million
grant from the National Institutes of
Health to build the instrument that they
hope will one day be used to monitor
women at high risk for ovarian cancer.
The grant was issued following the
successful two-year development of a
prototype system the team built.
During the past 25 years Kostuk
has researched different aspects of
holography and holographic materials
for use as optical elements. The
holographic imaging system being
designed combines an optical technique
that creates images capable of
detecting subtle tissue microstructure
changes. Together with fl uorescence
spectroscopy methods, the system
has demonstrated capability for early
cancer detection. Another member
of the team, UA research professor
Marek Romanowski, is working on the
development of targeted fl uorescent dyes
that will be used on tissue samples to
identify or confi rm suspected cancerous
areas shown in the spatial image.
Barton said ovarian cancer provides
a compelling case to test holographic
imaging and its effi cacy in detecting
cancers. At the present time the preferred
treatment is surgery, which is also often
needed to diagnose ovarian cancer. The
procedure includes taking tissue samples,
which may threaten the woman’s ability
to have children in the future.
The researchers expect to spend the
next fi ve years fi ne-tuning a wand-like
instrument that’s anticipated to
be a “game changer” for medicine if it
does what is intended - allow high-risk
women to know whether they actually
have ovarian cancer before having their
Human ovary
image captured
with the use of
the prototype
holo-graphic
imaging system
the team
developed.
For comparison,
an onion is imaged
with the use of
the prototype
system the team
developed.
Raymond Kostuk Jennifer Barton
4
5. The Holography Times Technology
ovaries removed. “The system
will image like an MRI or a
CT scan but with much higher
resolution than an ultrasonic
image and will be a lot less
expensive than an MRI. As an
additional benefi t no radiation
will be used or exposed to
sensitive ovary areas during
the cancer screenings,” Kostuk
said.
The researchers in the future
course will do three major things:
improve the performance of
a prototype of the technology
Kostuk and Barton already
have developed; package the
technology into a laparoscopic
system that can be taken into
the operating room; and perform
a pilot study on women who
already are having their ovaries
removed. Ultimately, Kostuk
and Barton want to help save
lives and contribute to a broader
understanding of how ovarian
cancer progresses. “Our hope is
that it would detect it earlier by
providing more information,”
said Barton, who heads the
university’s department of
biomedical engineering.
www.homai.org
“The Silent Killer “
Ovarian cancer is often called the “silent” killer because many times there are no symptoms
until the disease has progressed to an advanced stage.
Ovarian Cancer Facts to Know
Fact 1: Ovarian cancer is the leading cause of gynecologic cancer deaths among women.
Fact 2: If diagnosed in its early stage, the chance of survival is 90%.
Fact 3: Only 24 percent of ovarian cancers are diagnosed at an early stage, when the cancer is
confi ned to the ovary.
Fact 4. One woman out of every 55 (approximately 1.8 percent) will develop ovarian cancer at
some point in her lifetime.
Fact 5. Ovarian cancer is most common in women who have already gone through menopause.
The average age for developing ovarian cancer is 61 years old.
Fact 6. For the small number of women who are fortunate enough to have their cancer diagnosed
before it has spread beyond the ovary, the chance for recovery is 85 to 90 percent.
Fact 7: The risk for ovarian cancer is greater for women who have never had children, who had
their fi rst child at a later time in life or who have a personal history of breast cancer,
colorectal cancer or endometrial cancer.
Fact 8. The only sure way to diagnose ovarian cancer is through microscopic examination of
abnormal fl uid or tissue, obtained by needle aspiration (withdrawal of fl uid or tissue from
a suspicious area though a special, wide needle) or surgery.
Fact 9. Hycamtin is one of the fi rst of a new kind of anti-cancer drugs that kills cancer cells by
inhibiting an enzyme essential to the replication of human DNA.
Web watch section
Protecting vital information is of
utmost importance to companies
nowadays, whether it is printed
documentation or digital fi les. Thus, here
we mention certain websites armed with
useful tips on information security and
how to safeguard companies from threats
and violation of the rights to privacy.
1. Search security asia
(www.searchsecurityasia.com)
The goal of this website is to try & prevent,
detect, resolve, or repair internet and
network security issues in Asia. You can
get essential tips on how to protect both
the front and back end of your website.
You may also check how to secure data
through tips, articles, white papers, and
case studies that, ironically, spill over
information on information security.
2. Computer Security News
(www.computersecuritynow.com)
The purpose of this website is presenting
an almost perfect portal for ISO 17799
Information security. From general
information to implementation, this
website provides downloadable fi les
for your reference like ISO 17799
Toolkit, Security Policies., Security
Risk Assessment, and Risk Analysis:
How & Why-describes the method and
approach on Security Risk and manual
for Information Security management.
You may also fi nd news on the upgrade
of ISO 17799 to ISO 27002.
5
6. www.homai.org
The Holography Times
The UK government relied on
hologram for the protection of their
ID card.
The UK ID card’s image was offi cially
unveiled by the Home Secretary Alan
Johnson in Manchester in August 2009.
This ID card is voluntary for British
citizens and can also be used as a travel
document in Europe. The card image
shows the information contained
on the face of the card, including
photograph, name, date of birth and
signature, as well as the card’s unique
design. It holds similar information
to that currently contained in the UK
passport as well as fi ngerprints on a
secure electronic chip. This chip will
link to a biometric database holding a
person’s fi ngerprints and address.
The cards remain a central part of
the government’s plans to tighten up
Britain’s border controls and clamp
down on illegal working. Given the
growing problem of identity fraud and
the inconvenience of having to carry
passports, coupled with gas bills or six
months worth of bank statements to
prove identity, Mr. Johnson, believes
the ID card will be welcomed as an
important addition to the many plastic
cards that most people already carry.
“The fact that it can be used as a passport
when traveling in Europe will be an
added advantage,” he said.
Over the years the reason for issuing
documents has also shifted to being a
good proof of age tool. This approach
has received the backing of the National
Federation of Retailers and Newsagents,
whose spokesperson said: “Underage
sales are a problem across the UK and
we are always looking for new ways for
the public, especially those under the age
of 18 years old, to prove their identity.”
Source: news.bbc.co.uk
UK national ID card unveils
The UK government relied on hologram for the protection of their ID card.
News Bytes
JDSU increases security with holofuse technology
JDSU, a leading provider of
innovative optical solutions for brand
authentication, medical/environmental
instrumentation, semiconductor
processing, display, etc. has introduced
its HoloFuseTM polycarbonate fi lm,
a new highly integrated product that
helps protect government-issued identity
documents such as passports, national
identity documents and driver’s licenses
against counterfeiting and tampering.
HoloFuse is the fi rst solution that
includes a hologram that is integrated
into a polycarbonate fi lm without
the use of adhesives. This fi lm in
turn becomes the clear outer layer
of identity documents, helping to
reduce the ability of counterfeiters to
separate card layers and tamper with
their security. In addition, providing
an integrated solution simplifi es the
manufacturing process for card and
identity document makers.
The partially transparent and customized
hologram within the polycarbonate
fi lm includes overt, covert and forensic
security features that make it diffi cult
to reproduce. JDSU’s patented
technology also better preserves the
hologram, making it brighter and
easier to identify.
“The new HoloFuse product is based
on JDSU’s years of expertise in optical
science and provides a whole new way
to protect the integrity of high security
identity documents, while simplifying
the manufacturing process for card
makers,” said Garth Zambory, Document
Authentication product manager for the
Advanced Optical Technologies business
segment at JDSU.
The polycarbonate material is also more
environmentally friendly than plastics
typically used for the creation of cards
such as PET or PVC. JDSU has fi led a
patent for the new solution and expects
to be shipping it during the second half
of calendar year 2009.
Source: www.jdsu.com
6
7. NAFDAC likely to set up check points for counterfeit drugs
www.homai.org
The Holography Times
According to a WHO report, about
16.7% of the total pharma exports
to Nigeria are counterfeit. Following
recent apprehensions over sub-standard
drugs marketed in Nigeria, the
National Agency for Food and Drug
Administration and Control (Nafdac)
has proposed to set up overseas control
points in India and China to verify
the quality of all drugs and allied
pharmaceutical products sold in Nigeria
from these two countries. These check
points are expected to have state-of-the-art
technologies to check counterfeit
on the spot. This is said to be the fi rst
initiative to counter fake drug supply in
the generic business.
The Nigerian government also plans
to bring in lifetime jail term or
death penalty for manufacturers and
distributors of fake and substandard
drugs in Nigeria. “We would sign a
memorandum of understanding with
the Department of Pharmaceuticals,
government of India, on September
30, to put in place a joint regulatory
framework for both the countries to
check counterfeit drugs,’’ informed Paul
B Orhii, director general Nafdac. He
said that about 20 Indian pharmaceutical
companies in various categories
have expressed interest in setting up
manufacturing facilities in Nigeria. The
likes of Apollo Pharmacy and Hetero
Dugs, which have a wide network of
pharmacy outlets in the country, have
been approached to set up pharmacies
for marketing quality products and
dispel fears of sub-standard drugs.
Incidentally, Nafdac has had discussions
with Torrent Pharma and Ranbaxy
for setting up bio-equilance and bio-availability
study centres in Nigeria.
Nafdac is planning to join hands with
the National Institute of Pharmaceutical
Education and Research, Hyderabad, to
train its people.
The Nigerian government would give
rewards to informers and actively
encourage victims to gather evidence
that enable us to sue manufacturers and
distributors of these deadly products. He
also informed that a massive campaign
was being drawn up jointly by Nafdac,
the Indian government, China and the
US to build an international coalition
to fi ght counterfeit drugs.
Source: www.fi nancialexpress.com
News Bytes
TSSI has acquired a portfolio of
patents for specialist volume
and true colour holograms including
Biometrigram and HD-3D hologram
patents from authentication security
technology and consultancy fi rm
Ver-tec. The move follows the recent
launch of TSSI’s Magnetics Solutions
Division, which aims to drive growth
across TSSI’s document security and
brand protection products.
According to TSSI, counterfeiters are
becoming increasingly sophisticated,
producing highly realistic ID documents.
Additional security measures are
therefore required to provide the highest
level of protection possible and ensure
that ID documents such as passports,
ID cards and access cards cannot
be replicated. Hologram technology
provides an effective security solution
for all identity documents as each
hologram is unique making it impossible
to imitate.
HD-3D is a true colour hologram,
meaning the images always maintain
their original colours from any
viewing angle, unlike embossed
holograms which exhibit a rainbow
effect. Each hologram is unique with
different serial numbers and/or bar
codes, which can also be encrypted for
added security.
The Biometrigram, a volume
hologram, can store multiple
biometrics as well as analogue images
and encrypted digital information.
TSSI says these have a higher
information density than electronic
chips so are ideal for use on ID cards.
Each hologram is unique so ensures the
correct identity of the document holder
and provides an effective security
measure in the fi ght against identity
fraud.
“Both of these products are a welcome
addition to our portfolio of identity
and document security offerings. Our
customers want top quality security
solutions and these new patents will
meet this increased demand for fraud
proof identity documents,” says Danny
Chapchal, executive chairman, TSSI
Systems.
Source: www.securitydocumentworld.com
TSSI buys ver-tec patents
7
8. www.homai.org
The Holography Times
India will shortly switch over to e-passport
system, increasingly used
globally to check terrorism using false
identity. The government launched
its e-passport scheme on Jun. 25 this
year, where President Pratibha Patil,
Prime Minister Manmohan Singh and
Vice President Hamid Ansari were
the fi rst ones to receive their biometric
passports. E-passports have been issued
to diplomats since July this year, but are
expected to be extended to all citizens
from September next year. The Indian
government appears on track to issue
some 800,000 e-passports next year
and begin piloting its new backend
system touted to enable faster delivery
of passport services, baring no further
delays. Already, 35 countries have
shifted to the e-passport system, also
called biometric passports, which is an
offshoot of the 9/11 attacks in the U.S.
The e-passports are designed to
facilitate international travel by allowing
automatic identity verifi cation and
faster immigration inspections, as well
as provide effi cient border protection
and security. These would look like an
ordinary passport with an embedded
electronic chip. The chip would contain
the photograph, fi ngerprint and personal
information of the holder so that the
passport could not be duplicated. “An
e-passport is machine-readable, enabling
quick processing at airports. The passport
comes with a built-in security (biometric)
feature, which comprises an integrated
circuit (IC) embedded in the back cover
that stores the data, including photo.
These also make the passport tamper-proof.
In ordinary passports, this data is
typically displayed on the photo page.
E-passports support a combination of
electronic and optical security features
including watermark, optically
variable device and hologram.
If an e-passport is misused, the
immigration checkpoint will be able to
detect a mismatch between the printed
and digital information, and authorities
can take necessary action against the
offender.
The International Civil Aviation
Organization (ICAO) sets the standards
for e-passports that have been
implemented in
over 70 countries.
Data in the Indian e-passport
can be read
in other countries
as it adheres to the
ICAO global standards
for biometrics and
secure storage of personal data in travel
documents.
The Indian government next year will
also launch its Passport Seva Project.
Implemented by Tata Consultancy
Services (TCS) under a build-operate-transfer
scheme, the Passport Seva
Project entails digitization of the entire
passport services. It seeks to deliver all
passport-related services to citizens in a
timely, transparent, more accessible and
reliable manner, through streamlined
processes and trained workforce. This
US$207.3 million (10 billion rupees)
project is part of the government’s
National e-Governance Plan (NeGP).
Source: www.businessweek.com,
www.igovernment.in
Indian passports to go the e-way
News Bytes
Soiled notes may soon be a thing of
past with the Reserve Bank of India
(RBI) planning to introduce polymer
banknotes whose life span would be
four times the normal currency notes
and would be diffi cult to imitate. The
seizure of large quantities of fake Rs
1,000 and Rs. 500 notes has led the
RBI to toy with the idea of replacing
paper currency with polymer notes.
As a pilot project, the Central bank is
planning to introduce one billion pieces
of Rs. 10 polymer notes, for which the
bank has fl oated a global tender. The bank
has asked interested parties for 500 pieces
of sample banknotes, before the actual
global bids for the project go through.
Explaining the rationale for the
introduction of polymer notes, the
offi cial said these notes are extremely
diffi cult to counterfeit and have a
lifespan of fi ve years compared to
paper currency which lasts just one
year. They can also be washed, making
them more hygienic. Central banks the
world over believe that the only sure
way to control counterfeiting is through
continuous design change and innovation.
The polymer notes were fi rst introduced
in Australia to safeguard against
counterfeiting of currency. Besides
Australia, other countries which have
introduced plastic notes, include New
Zealand, Papua New Guinea, Romania,
Bermuda, Brunei and Vietnam.
Going by the increasing incidence
detection of fake notes, RBI may consider
introduction of higher denomination
plastic notes. The RBI had fi rst hinted
in 2007 that it may start using plastic
notes.
Source: Financial Chronicle, September
2009; India Today, September 2009
RBI plans to print Rs.10 plastic notes
8
9. Company Profi le
www.homai.org
The Holography Times
Holostik India Limited offers
security solutions for protection/
authentication of identity documents.
Holostik is the leading Security
Hologram manufacturer in India,
since 1991, and one of the largest
manufactures in the world with over
5000 customers in Government,
Public and Private sectors. Holostik
has all facilities under one roof under
high security environment. We supply
holographic security solutions to
various prestigious government bodies,
for identity document protection.
• Holostik has two types of
Master Origination machines-
Conventional 2D/3D machine
and 24000 DPI Dot Matrix
master origination machine,
which offers ability to produce
combination masters with added
security.
• Our R&D (master lab) team has
developed certain high security
features (both overt and covert),
which are very diffi cult for other
holographers to develop.
• Holostik has an in-house printing
facility, which offers up to 8
colour UV printing options on
paper and 10 colour printing
options on fi lm, providing latest
high security features in printing
available in the world.
• Our product range includes
regular security holograms, paper
products incorporating security
features, polyester / PVC / other
plastics based fi lm products and /
or a combination product of one
or more of the above substrates
with holographic security
There are a number of methods that
can be adopted for securitization
of identity documents depending
on volume of documents to be
securitized, method of application and
resources available. Thus, Holostik
offers security holograms in
(i) Pressure sensitive form (ii)
Hot Stamping Foil form (iii)
Transparent Holography form and
(iv) Laminate form, as per customer
requirements.
The most common form is to apply
Security Hologram on to the existing
identity document. This hologram
can be affi xed on the document
separately or in a manner so that it
partially covers the photograph of
the bearer. As it is ‘tamper evident’
in nature, any attempt to remove
it will result in its destruction. At
Holostik we offer, both Pressure
sensitive holograms that are affi xed
manually and automatically and Hot
Stamping Foil based holograms
that are affi xed using a Hot Stamping
machine, in standard and customised
shapes. Pressure sensitive security
hologram can be of Transparent /
Semi-Transparent type.
Another method is to use pre-printed
identity document having
holographic strip running through.
In this method, Holostik prints the
required identity document and
applies a strip of security hologram
as per design. This method does not
require hologram handling at the
end user, rather only printing of the
individual card details. The use of
a security strip offers a larger area
and is also visually appealing. In the
two forms of application discussed
above, the fi nal document can be
used as is basis or can be further
laminated within a pouch. The
use of pouch adds another layer of
security & also enhances life of the
document.
Holostik offers a third option which
combines benefi ts of tamper evident
transparent security holography with
transparent laminated holographic
pouch, offering high security with
fl exibility of use. Customer needs to
print data on to the document type,
paste photographs etc & then place
document in the pouch and pass it
through a pouch laminator. The end
product protected by the laminated
pouch, it has see-through holographic
features through out the fascia, is
tamper evident, visually appealing
and easy to authenticate, making
it is easy to protect, securitize and
authenticate identity documents.
Holostik provides tailor made
solutions for the I.D. Cards depending
on the customer’s requirement i.e.
security solutions, semi high security
solutions and high security solutions.
But, we always incorporate certain
security features in all of the above
three categories so that it becomes
extremely diffi cult for counterfeiters
to copy.
Today, many of the important and
sensitive documents worldwide are
protected using our tailor made
security products. What ever be
the customers’ need, Holostik can
provide the right solution because of
its rigorous R&D and wide exposure,
experience in holography and allied
products. Just allow us to become
your ‘Security Partner’ to help you in
securing your products and we assure
of your complete satisfaction.
For any queries/assistance, feel free
to contact us at
holostik@vsnl.com.
9
Holographers
To The Globe
10. Cover Story
www.homai.org
The Holography Times
Global trends for document security
Identity is an integral part of the Human subsystem. All livings being struggle for their unique identity in the universe- It may be
in the form of knowledge, Power or Wealth. In ordinary language, one can use the word “identity” to refer to characteristics
or attributes that cannot naturally be expressed in terms of a social category. However, realizing its importance, worldwide all
governments keep their Citizen in easy and quick access identity formats.
But today, Identity counterfeiting is a growing global menace that has turned our identities into highly valuable assets. The
potential risks associated with fake identifi cation documents can be high. With a fake identity, an individual can potentially gain
illegitimate access, qualify for government benefi ts, defraud credit companies or make illegal purchases. Even though today’s
card printing technology delivers superior image quality and exceptional card durability at a surprisingly affordable cost, but with
forgery and counterfeiting now a serious issue, what defense mechanism are solution providers putting in place to protect the
end users?
This article outlines how to reduce the risk of counterfeiting with latest document security trends, paying particular attention to
a system combining the most effective features.
Identity Cards:
ID Cards were introduced during the
First World War as part of a statutory
registration scheme. It ended in 1919.
They were introduced in 1939 and
remained in force for several years
after the war until they were abolished
by Churchill in 1952. Today, around
a hundred countries have offi cial,
compulsory, national IDs that are
used for variety of purposes.
In India, the recent national Unique
Identifi cation (UID) project launched
by the Government of India, with
the iconic technocrat, Mr. Nandan
Nilekani at its helm is indeed a
signifi cant project. With this, India
has embarked on an ambitious
e-governance project which targets
to provide a unique number to each
citizen.
Authentication
In this era of heightened security
concerns, we are keenly aware
of the role that ID Documents, or
credentials, play in our lives. Whether
a driver’s license, passport, social
security number, Unique Identity
number, etc. these documents are
used routinely not only to verify a
person’s identity but can also be
used to protect rights to privacy,
wealth and security.
Today, governments worldwide are
using e-Governance methods and
realizing that national security has
profound effects on the economy
and our way of life. To optimize
these issues, a diversity of security
features is available. A brief
overview of the most widely used
features is given below.
Commonly used security
features
Most people would agree that secure
identifi cation begins with a photo
ID card, the most representative of
which is the driver’s license. While
a good photo likeness and a legible
signature remain the key features
of a photo ID card, those features
alone are inadequate today. Issuing
authorities now incorporate
several additional features to deter
counterfeiting, while at the same
time making authentication easier
and more reliable.
The identity of a physical object
is uniquely determined by a set of
distinctive properties. Most ID cards
are fabricated today by direct printing
on composite CR-80 cards comprising
layers of cross-oriented polyester with
outer layers of PVC. Once printed, a
tough 0.001” (1 mil) thick polyester
laminate is typically applied to protect
both sides of the card.
After the process, companies used
a variety of integrated security
features, which can be classifi ed
mainly into three categories visible,
invisible and forensic. Finally,
there are machine-readable magnetic
stripes, bar codes and programmable
devices (smart cards) that can provide
even more security, plus the means for
automatic data checking and database
connectivity.
Level 1 (Overt features)
These are “fi rst line” validation
features, i.e. they can be seen
without the use of equipment or
special devices. The most frequently
encountered Level 1 device is a High
Refractive Index (HRI) hologram
printed on either the card or, more
10
11. Cover Story
www.homai.org
The Holography Times
commonly for drivers’ licenses,
on the underside of the protective
laminate. Recently developed de-metallization
and photo polymer
holographic techniques now offer
enhanced depth, transparency, and
fi ne line detail which most would
acknowledge being practically
counterfeit-proof.
Level 2 (Covert features)
Level 2 features are verifi able by
simple, inexpensive tests such
as visual inspection under a lens
or black light (UV), biometric
scanning, digital scanning and data
base checking. Examples of Level
2 features include: specialized
bar codes, micro-printing, and
covert background printing that is
incorporated in the card design.
Level 3 (Forensic features)
The majority of these must be kept
secret to remain useful. Analysis
of a card having Level 3 features is
essentially a post-mortem process,
often requiring some dismembering
of the card to determine its origin, and
to minutely inspect the features for
validity. Level 3 devices are images
or physical objects that are hidden
within the card structure or concealed
by special graphic effects on the card
surface. Typically, they can be fully
validated only by specialized optical
scanning devices, or other means of
machine-reading data.
SOLUTIONS TO IMPROVE
SECURITY OF ID’S- ADDING
EXTRA SECURITY
ID card security comes from a
combination of features inherent to
the card media (like overt, covert
and forensic), together with variable
features printed at the time of
issuance. To add security, growing
use is made of security features with
integrated personal data.
a) UV-Ink Personalization
One example is on-demand UV
ink personalization, which allows
cardholder’s photograph or personal
data to be printed in high-resolution
gradient UV ink. Pre-printed features
are very diffi cult to duplicate. User
defi ned text, with deliberate random
font changes and misspelling if
desired, may be micro-printed as an
added security features. Character
height of the micro-printing is fi ve
thousand of an inch. Other printed
security choices include Guilloche
patterns, serial numbering and micro-graphics.
b) Holographic Laminate
Since their use in 1989, holograms
were historically hard to copy;
they were used to provide cloning
resistance to products. Holographic
laminate may be used to extend
the useful life of a card while
simultaneously protecting it
against data manipulation. To
combat document tampering and
counterfeiting, the holographic
industry is developing and
implementing new security features
such as nano-text and images (very
small text and graphics including
entire city maps) created using
special diffractive techniques. Other
enhanced diffractive methods also
Figure 1: Security features in currently release UK National ID Card exist.
11
12. Cover Story
www.homai.org
The Holography Times
c) Holographic Personalization
Technology (HPT)
Database verifi cation is an important
element of ID card. To secure this,
a more recent trend is to combine
holographic laminates with personal
data, photos and other information.
One example is Identigram, as
found on the German ID Card and
e-passport. HPT allows unique or
generic diffractive images to be
coated on a card surface. The images
incorporate unique optical effects that
are extremely diffi cult to counterfeit.
Think, for example, of the card
holder’s photo, biographic data,
a logo, symbols, a coat of arms
or a combination thereof. This
technology, which is also available
for desktop personalization, allows
a much wider range of diffractive
optical images to be designed, this
effectively adding an additional level
of security to ID cards.
d) Holographic Biometrics
Security
The security of card can also be
enhanced by encrypting and storing
(biographic data) on high-capacity
chips, possibly in combination with
biometrics. Given the limited space
available on an ID cad, especially
compared to passport, the use of
electronic ID cards- or – eIDs –
likely to increase. Moreover, eIDs
can be used for various e-business
and e-governance applications,
including online banking,
shopping, and user registration
and with implementation of
government schemes. In this system,
the holographic photopolymer is
laminated to the plastic card, either
as a strip or patch. It is laminated
with a refl ective layer and protected
against wear of tampering. The
designated biometric (e.g. an iris
scan or fi ngerprint) is captured in
the normal way (cameras, fi ngerprint
scanner, etc), then encoded using a
code mask.
e) Enhanced Security with
Laser Engraving
A growing number of industry
participants are calling for laser
engraving technology to be used on
a broader scale. Laser engraving
Figure 3: German ID card using HPT
Figure 2: Lamination Security features
12
13. www.homai.org
The Holography Times
involves ‘burning’ data into
the substrate of an ID card or
polycarbonate biographic data
page. The data may consist of text,
images and graphics (including
security features such as micro
text).
As such, laser engraving is a
technology rather than a security
feature. The actual security is derived
from the application method used.
If properly applied, laser engraving
provides protection against alteration
and reproduction. In fact, laser
engraving provides unsurpassed
security. The application of heat (in
the form of a laser beam) creates a
chemical reaction inside the core
of the card, causing molecules to
move to the surface. The resultant
characters or images are virtually
impossible to modify - any attempt
to alter or remove laser engraved
data invariably destroys the substrate
surface. Another advantage of laser
engraving is that the data does not
fade or deteriorate due to UV light or
surface abrasion.
f) Advanced Laser Engraving
Laser engraving facilitates the creation
of Multiple Laser Images (MLI) and
Changeable Laser
Images (CLI),
which cannot be
produced using
othertechnologies.
The process used
to integrate CLI/
MLI images into
the card body is
highly specialised.
CLI/MLI images
are similar to
holograms in that
alternate images
are produced,
albeit using direct
laser engraving.
The alternate
images are positioned close to each
other and engraved at different angles.
In contrast with holograms, CLI/MLI
data forms an integral yet unique part
of the card body (it is applied during
personalisation). CLI/MLI allows
personal data to be engraved on
individual cards. Think, for example,
of the document ID number or
expiration date in combination with
non-standard ‘fl ipping’ images of the
cardholder’s photograph or signature.
As the data cannot be copied or
tampered, advanced laser engraving
offers an additional level of security.
It also creates a much higher entry
barrier for counterfeiters compared
with other personalisation techniques.
The result is a highly tamper-resistant
card.
g) Creating Uniform Security
Standards:
With the lack of consistent standards
across identifi cation documents today,
it is often diffi cult to give reasonable
assurance of a given document’s
authenticity. For e.g. MasterCard and
Visa addressed the counterfeiting
problem by mandating a uniform
security feature in the form of a hot
stamped hologram in the same place
on each card, while leaving the rest
of the design up to the discretion of
the member banks. This resulted in a
dramatic reduction in the incidence
of credit card counterfeiting. This
solution works because each layer of
the security chain: consumer, issuer
and law enforcement offi cial alike,
know where and what to look for to
authenticate a given card.
In the end, no single security feature
is able to provide adequate protection.
Instead, security is optimized if several
features are combined.
A clear laminate can be used to
extend the card’s life. If the laminate
also contains holographic images,
security is improved at the same time.
Holographic laminate is therefore
highly recommended for national
IDs.
Conclusion
Improving the security of identity
documents is a matter of urgent
national security. Most identity
documents in use today were not
designed as secure documents,
and there are no uniform security
standards in place to assist the
public and law enforcement in the
recognition of genuine versus
counterfeit identity documents.
Government should understand
that counterfeiters will attempt
to counterfeit the least secure
document.
Although no-one can stop a
counterfeiter from trying to modify
or copy a document, the right
combination of security features
and technologies make it impossible
for him to be successful. These
security features must be practical
for document issuers to implement,
easy for the public to recognize and
provide specifi c identifying features
for law enforcement and forensic
investigators.
Cover Story
Figure 4: Phenostar, a holographic photopolymer storage
medium for plastic cards, invented by Bayer Material Science
13
15. www.homai.org
The Holography Times
Patents related to identity documents
Security Hologram for Identity
Document
United States Patent Application
20090051986 (This invention relates
to improved techniques for using
holograms to provide security for
documents and the like.)
Abstract: Overlaying a security document
such as a driving license or passport with
a hologram, which is diffi cult to copy,
can afford additional security value. For
example in the British passport document,
embossed holography has been used in
the form of a translucent thin layer coated
on its reverse side with a layer of material
such as zinc sulphide, whose refractive
index is signifi cantly higher than the
carrier. Thus light is refl ected from the
interface in such a way as to reconstruct
the holographic image, whilst permitting
the viewer to see simultaneously, printed
matter behind the holographic fi lm.
The idea is that an attempt to remove the
covering layer will result in destruction
of the document but in practice one of
the most common forms of passport/ID
forgery is where the protective laminate
is lifted off, allowing the print underneath
to be tampered with or the laminate to be
reused on other documents. Background
prior art can be found in EP 0 754
987A, WO 2006/077447 A2, U.S. Pat.
Nos. 4,971,646A, 5,834,096 A and US
2006/0289114 A1. There is therefore a
need for improved anti-counterfeiting
techniques for security documents and
the like.
Hologram laminate and
hologram label
United States Patent Application
20060193021
Abstract: A hologram laminate allows
traces of separation of the hologram to
be clearly left on both the adherend and
the hologram label and hence makes it
possible to prevent re-use of the hologram
and is excellent in graphical design
function and suitable for certifi cation
purposes. A hologram label used for the
fabrication of the hologram laminate is
also provided. The hologram laminate
has a colored layer, a release pattern, a
transparent fi lm, a hologram layer and
a surface protective layer laminated on
an adherend in the order mentioned.
The hologram layer includes a volume
hologram layer and a relief hologram
layer having a transparent thin-fi lm layer
over the surface of the relief interference
fringe pattern. The volume hologram
layer and the relief hologram layer are
superimposed so as to be switch able from
one to another. The hologram laminate is
separable between the adherend and the
transparent fi lm. When the hologram is
separated, the colored layer is left on the
adherend in a pattern corresponding to the
release pattern. The hologram label has a
release sheet in place of the adherend in
the hologram laminate
Digitally watermarking
holograms for identity
documents
United States Patent Application
20030210805
Abstract: The present invention relates
to digital watermarks integrated into
holograms, watermarked hologram
structures, and related applications as an
authentication technique. One method
creates a watermark image, and then
embeds the watermark image into a
holographic structure. The holographic
structure is carried by a smart card.
The smart card includes additional
information. In one embodiment, the
digital watermark includes information
bits, and these information bits are used
to authenticate the hologram, or the
smart card. In another embodiment,
the watermark’s information bits are
compared with the additional information
carried by the smart card. The result of
the comparison is used to authenticate the
smart card or the hologram.
Events & Calendar
HOLO-PACK•HOLO-PRINT® 2009
11-13 November 2009, Budapest, Hungary
www.holopackholoprint.info
LABEL EXPO ASIA 2009
1-4 December 2009, Shanghai
www.labelexpo-asia.com
PRINTECH 2009
18-21 December 2009, Mumbai
www.mmsprintech.com
OPTICAL DOCUMENT SECURITY
January 20-22, 2010, San Francisco, CA, USA
www.opticaldocumentsecurity.com/
5TH GLOBAL FORUM ON PHARMACEUTICAL
ANTICOUNTERFEITING
February 24-26, 2010, Miami, FL, USA
www.reconnaissance-intl.com
PAN-EUROPEAN HIGH SECURITY PRINTING
CONFERENCE
April 13-15, 2010, Berlin, Germany
www.cross-conferences.com
Editorial Board
Neha Gupta | C S Jeena
The Holography Times is published by
HOLOGRAM MANUFACTURERS
ASSOCIATION OF INDIA (HoMAI)
21-Ground Floor, Devika Tower 6, Nehru Place,
New Delhi - 110019, INDIA
Telefax: +91-11-4161 7369,
Email: cjhomai@gmail.com
Web: www.homai.org
Designed and Printed by
Chandan Kumar
connectchandan@gmail.com
on behalf of HoMAI
Disclaimer: The data used here are from various
published and electronically available primary and
secondary sources. Despite due diligence the source
data may contain occasional errors. In such instances,
HoMAI would not be responsible for such errors.
15