SlideShare a Scribd company logo
1 of 16
Download to read offline
theholographytimes 
TM 
October 2009 | Vol. 3 | Issue 8 www.homai.org 
www.homai.org 
The Holography Times 
The journal of hologram industry 
ID Cards 
Protecting People 
But 
WHAT 
about their 
protection? 
Global trends for 
document security 
ALSO: 
Innovation: Research team designing 
holographic imaging system for ovarian 
cancer • UK national ID card unveils • Indian 
passports to go the e-way • Patent news 
• Events & calendar & more... 
1 
Special Report 
The Holography Times is quarterly published by HoMAI.
www.homai.org 
The Holography Times 
2 
Holographers 
To The Globe
Holography : 
A technology protecting 
products & lives! 
www.homai.org 
The Holography Times 
We are delighted to share with you our quarterly newsletter, The 
Holography Times. This is perhaps the best means of staying in 
touch with the holographic family, where we share with you latest 
developments in the Indian and the international holographic industry, learnings 
from around the world which have future potential and can be applied to your 
business- where the aim is to establish a connection between the expanding 
universe of holography and its importance in daily life. 
Holography is a fast developing science having enormous impact on the society 
at large. Worldwide innovations like scientists working on Holographic Imaging 
Systems to fi ght ovarian cancer are leading to revolutionary changes in our 
world. In this newsletter we discuss how this imaging instrument contributes 
to a broader understanding of ovarian cancer - The Silent Killer. 
Identity counterfeiting is an increasing global menace that has turned our 
identities into highly valuable assets. Since being developed over 60 years ago 
holograms have been the most successful anti-counterfeiting measure in this 
battle against ID counterfeiting. While the fi rst DOVID appeared on a credit 
card in 1982 and on a banknote in 1988, in 1985 the fi rst metallized hologram 
appeared on the passport of Iraq. Here we discuss about the role of a hologram 
offering protection against forgery of variable information like photograph and 
personal data and global developments in ID document protection. 
The issue talks about how holography is not only protecting identity documents, 
saving tax revenues but also playing a social part by protecting human lives. 
Once again we seek your feedback and valuable advice to take this newsletter 
and association to greater heights. 
Happy reading! 
Team HoMAI! 
In this issue 
d li h d h i h l l Th 
Editorial 
Innovation 
Holographic imaging 
system for 
ovarian cancer 
4 
Web Watch 5 
News Bytes 6 
Company Profi le 
9 
10 
Cover Story 
Global trends for 
document security 
Patent news related to identity 15 
documents 
3 
Holographers 
To The Globe
Technology 
www.homai.org 
The Holography Times 
Innovation 
Holographic imaging system for ovarian cancer 
Two University of Arizona researchers 
have formed a research team to 
design, build and evaluate an ovarian 
cancer medical imaging and screening 
instrument that will use holographic 
components in a new type of optical 
microscope. By using holograms and 
merging medical and optical science, 
researchers Raymond Kostuk and 
Jennifer K. Barton are developing a 
way of seeing enough varied depth in 
ovarian tissue to detect microscopic 
cancer cells in their earliest stages. 
This would be a huge advance in the 
fi ght against an insidious disease that 
kills most women within fi ve years of 
diagnosis. 
The system will work like a high-powered 
microscope that can be used to 
study tissue samples already removed. In 
addition, an endoscopic version is in the 
design stage to safely scan the ovaries for 
cancer during laparoscopic screenings 
in high-risk women. The system is 
unique in that it will for the fi rst time 
project multiple spatial images from 
different depths within a tissue sample 
and simultaneously provide spectral 
information from optical markers in 
order to better identify cancerous cells. 
Raymond Kostuk and Jennifer Barton 
have secured a fi ve-year; $2.4 million 
grant from the National Institutes of 
Health to build the instrument that they 
hope will one day be used to monitor 
women at high risk for ovarian cancer. 
The grant was issued following the 
successful two-year development of a 
prototype system the team built. 
During the past 25 years Kostuk 
has researched different aspects of 
holography and holographic materials 
for use as optical elements. The 
holographic imaging system being 
designed combines an optical technique 
that creates images capable of 
detecting subtle tissue microstructure 
changes. Together with fl uorescence 
spectroscopy methods, the system 
has demonstrated capability for early 
cancer detection. Another member 
of the team, UA research professor 
Marek Romanowski, is working on the 
development of targeted fl uorescent dyes 
that will be used on tissue samples to 
identify or confi rm suspected cancerous 
areas shown in the spatial image. 
Barton said ovarian cancer provides 
a compelling case to test holographic 
imaging and its effi cacy in detecting 
cancers. At the present time the preferred 
treatment is surgery, which is also often 
needed to diagnose ovarian cancer. The 
procedure includes taking tissue samples, 
which may threaten the woman’s ability 
to have children in the future. 
The researchers expect to spend the 
next fi ve years fi ne-tuning a wand-like 
instrument that’s anticipated to 
be a “game changer” for medicine if it 
does what is intended - allow high-risk 
women to know whether they actually 
have ovarian cancer before having their 
Human ovary 
image captured 
with the use of 
the prototype 
holo-graphic 
imaging system 
the team 
developed. 
For comparison, 
an onion is imaged 
with the use of 
the prototype 
system the team 
developed. 
Raymond Kostuk Jennifer Barton 
4
The Holography Times Technology 
ovaries removed. “The system 
will image like an MRI or a 
CT scan but with much higher 
resolution than an ultrasonic 
image and will be a lot less 
expensive than an MRI. As an 
additional benefi t no radiation 
will be used or exposed to 
sensitive ovary areas during 
the cancer screenings,” Kostuk 
said. 
The researchers in the future 
course will do three major things: 
improve the performance of 
a prototype of the technology 
Kostuk and Barton already 
have developed; package the 
technology into a laparoscopic 
system that can be taken into 
the operating room; and perform 
a pilot study on women who 
already are having their ovaries 
removed. Ultimately, Kostuk 
and Barton want to help save 
lives and contribute to a broader 
understanding of how ovarian 
cancer progresses. “Our hope is 
that it would detect it earlier by 
providing more information,” 
said Barton, who heads the 
university’s department of 
biomedical engineering. 
www.homai.org 
“The Silent Killer “ 
Ovarian cancer is often called the “silent” killer because many times there are no symptoms 
until the disease has progressed to an advanced stage. 
Ovarian Cancer Facts to Know 
Fact 1: Ovarian cancer is the leading cause of gynecologic cancer deaths among women. 
Fact 2: If diagnosed in its early stage, the chance of survival is 90%. 
Fact 3: Only 24 percent of ovarian cancers are diagnosed at an early stage, when the cancer is 
confi ned to the ovary. 
Fact 4. One woman out of every 55 (approximately 1.8 percent) will develop ovarian cancer at 
some point in her lifetime. 
Fact 5. Ovarian cancer is most common in women who have already gone through menopause. 
The average age for developing ovarian cancer is 61 years old. 
Fact 6. For the small number of women who are fortunate enough to have their cancer diagnosed 
before it has spread beyond the ovary, the chance for recovery is 85 to 90 percent. 
Fact 7: The risk for ovarian cancer is greater for women who have never had children, who had 
their fi rst child at a later time in life or who have a personal history of breast cancer, 
colorectal cancer or endometrial cancer. 
Fact 8. The only sure way to diagnose ovarian cancer is through microscopic examination of 
abnormal fl uid or tissue, obtained by needle aspiration (withdrawal of fl uid or tissue from 
a suspicious area though a special, wide needle) or surgery. 
Fact 9. Hycamtin is one of the fi rst of a new kind of anti-cancer drugs that kills cancer cells by 
inhibiting an enzyme essential to the replication of human DNA. 
Web watch section 
Protecting vital information is of 
utmost importance to companies 
nowadays, whether it is printed 
documentation or digital fi les. Thus, here 
we mention certain websites armed with 
useful tips on information security and 
how to safeguard companies from threats 
and violation of the rights to privacy. 
1. Search security asia 
(www.searchsecurityasia.com) 
The goal of this website is to try & prevent, 
detect, resolve, or repair internet and 
network security issues in Asia. You can 
get essential tips on how to protect both 
the front and back end of your website. 
You may also check how to secure data 
through tips, articles, white papers, and 
case studies that, ironically, spill over 
information on information security. 
2. Computer Security News 
(www.computersecuritynow.com) 
The purpose of this website is presenting 
an almost perfect portal for ISO 17799 
Information security. From general 
information to implementation, this 
website provides downloadable fi les 
for your reference like ISO 17799 
Toolkit, Security Policies., Security 
Risk Assessment, and Risk Analysis: 
How & Why-describes the method and 
approach on Security Risk and manual 
for Information Security management. 
You may also fi nd news on the upgrade 
of ISO 17799 to ISO 27002. 
5
www.homai.org 
The Holography Times 
The UK government relied on 
hologram for the protection of their 
ID card. 
The UK ID card’s image was offi cially 
unveiled by the Home Secretary Alan 
Johnson in Manchester in August 2009. 
This ID card is voluntary for British 
citizens and can also be used as a travel 
document in Europe. The card image 
shows the information contained 
on the face of the card, including 
photograph, name, date of birth and 
signature, as well as the card’s unique 
design. It holds similar information 
to that currently contained in the UK 
passport as well as fi ngerprints on a 
secure electronic chip. This chip will 
link to a biometric database holding a 
person’s fi ngerprints and address. 
The cards remain a central part of 
the government’s plans to tighten up 
Britain’s border controls and clamp 
down on illegal working. Given the 
growing problem of identity fraud and 
the inconvenience of having to carry 
passports, coupled with gas bills or six 
months worth of bank statements to 
prove identity, Mr. Johnson, believes 
the ID card will be welcomed as an 
important addition to the many plastic 
cards that most people already carry. 
“The fact that it can be used as a passport 
when traveling in Europe will be an 
added advantage,” he said. 
Over the years the reason for issuing 
documents has also shifted to being a 
good proof of age tool. This approach 
has received the backing of the National 
Federation of Retailers and Newsagents, 
whose spokesperson said: “Underage 
sales are a problem across the UK and 
we are always looking for new ways for 
the public, especially those under the age 
of 18 years old, to prove their identity.” 
Source: news.bbc.co.uk 
UK national ID card unveils 
The UK government relied on hologram for the protection of their ID card. 
News Bytes 
JDSU increases security with holofuse technology 
JDSU, a leading provider of 
innovative optical solutions for brand 
authentication, medical/environmental 
instrumentation, semiconductor 
processing, display, etc. has introduced 
its HoloFuseTM polycarbonate fi lm, 
a new highly integrated product that 
helps protect government-issued identity 
documents such as passports, national 
identity documents and driver’s licenses 
against counterfeiting and tampering. 
HoloFuse is the fi rst solution that 
includes a hologram that is integrated 
into a polycarbonate fi lm without 
the use of adhesives. This fi lm in 
turn becomes the clear outer layer 
of identity documents, helping to 
reduce the ability of counterfeiters to 
separate card layers and tamper with 
their security. In addition, providing 
an integrated solution simplifi es the 
manufacturing process for card and 
identity document makers. 
The partially transparent and customized 
hologram within the polycarbonate 
fi lm includes overt, covert and forensic 
security features that make it diffi cult 
to reproduce. JDSU’s patented 
technology also better preserves the 
hologram, making it brighter and 
easier to identify. 
“The new HoloFuse product is based 
on JDSU’s years of expertise in optical 
science and provides a whole new way 
to protect the integrity of high security 
identity documents, while simplifying 
the manufacturing process for card 
makers,” said Garth Zambory, Document 
Authentication product manager for the 
Advanced Optical Technologies business 
segment at JDSU. 
The polycarbonate material is also more 
environmentally friendly than plastics 
typically used for the creation of cards 
such as PET or PVC. JDSU has fi led a 
patent for the new solution and expects 
to be shipping it during the second half 
of calendar year 2009. 
Source: www.jdsu.com 
6
NAFDAC likely to set up check points for counterfeit drugs 
www.homai.org 
The Holography Times 
According to a WHO report, about 
16.7% of the total pharma exports 
to Nigeria are counterfeit. Following 
recent apprehensions over sub-standard 
drugs marketed in Nigeria, the 
National Agency for Food and Drug 
Administration and Control (Nafdac) 
has proposed to set up overseas control 
points in India and China to verify 
the quality of all drugs and allied 
pharmaceutical products sold in Nigeria 
from these two countries. These check 
points are expected to have state-of-the-art 
technologies to check counterfeit 
on the spot. This is said to be the fi rst 
initiative to counter fake drug supply in 
the generic business. 
The Nigerian government also plans 
to bring in lifetime jail term or 
death penalty for manufacturers and 
distributors of fake and substandard 
drugs in Nigeria. “We would sign a 
memorandum of understanding with 
the Department of Pharmaceuticals, 
government of India, on September 
30, to put in place a joint regulatory 
framework for both the countries to 
check counterfeit drugs,’’ informed Paul 
B Orhii, director general Nafdac. He 
said that about 20 Indian pharmaceutical 
companies in various categories 
have expressed interest in setting up 
manufacturing facilities in Nigeria. The 
likes of Apollo Pharmacy and Hetero 
Dugs, which have a wide network of 
pharmacy outlets in the country, have 
been approached to set up pharmacies 
for marketing quality products and 
dispel fears of sub-standard drugs. 
Incidentally, Nafdac has had discussions 
with Torrent Pharma and Ranbaxy 
for setting up bio-equilance and bio-availability 
study centres in Nigeria. 
Nafdac is planning to join hands with 
the National Institute of Pharmaceutical 
Education and Research, Hyderabad, to 
train its people. 
The Nigerian government would give 
rewards to informers and actively 
encourage victims to gather evidence 
that enable us to sue manufacturers and 
distributors of these deadly products. He 
also informed that a massive campaign 
was being drawn up jointly by Nafdac, 
the Indian government, China and the 
US to build an international coalition 
to fi ght counterfeit drugs. 
Source: www.fi nancialexpress.com 
News Bytes 
TSSI has acquired a portfolio of 
patents for specialist volume 
and true colour holograms including 
Biometrigram and HD-3D hologram 
patents from authentication security 
technology and consultancy fi rm 
Ver-tec. The move follows the recent 
launch of TSSI’s Magnetics Solutions 
Division, which aims to drive growth 
across TSSI’s document security and 
brand protection products. 
According to TSSI, counterfeiters are 
becoming increasingly sophisticated, 
producing highly realistic ID documents. 
Additional security measures are 
therefore required to provide the highest 
level of protection possible and ensure 
that ID documents such as passports, 
ID cards and access cards cannot 
be replicated. Hologram technology 
provides an effective security solution 
for all identity documents as each 
hologram is unique making it impossible 
to imitate. 
HD-3D is a true colour hologram, 
meaning the images always maintain 
their original colours from any 
viewing angle, unlike embossed 
holograms which exhibit a rainbow 
effect. Each hologram is unique with 
different serial numbers and/or bar 
codes, which can also be encrypted for 
added security. 
The Biometrigram, a volume 
hologram, can store multiple 
biometrics as well as analogue images 
and encrypted digital information. 
TSSI says these have a higher 
information density than electronic 
chips so are ideal for use on ID cards. 
Each hologram is unique so ensures the 
correct identity of the document holder 
and provides an effective security 
measure in the fi ght against identity 
fraud. 
“Both of these products are a welcome 
addition to our portfolio of identity 
and document security offerings. Our 
customers want top quality security 
solutions and these new patents will 
meet this increased demand for fraud 
proof identity documents,” says Danny 
Chapchal, executive chairman, TSSI 
Systems. 
Source: www.securitydocumentworld.com 
TSSI buys ver-tec patents 
7
www.homai.org 
The Holography Times 
India will shortly switch over to e-passport 
system, increasingly used 
globally to check terrorism using false 
identity. The government launched 
its e-passport scheme on Jun. 25 this 
year, where President Pratibha Patil, 
Prime Minister Manmohan Singh and 
Vice President Hamid Ansari were 
the fi rst ones to receive their biometric 
passports. E-passports have been issued 
to diplomats since July this year, but are 
expected to be extended to all citizens 
from September next year. The Indian 
government appears on track to issue 
some 800,000 e-passports next year 
and begin piloting its new backend 
system touted to enable faster delivery 
of passport services, baring no further 
delays. Already, 35 countries have 
shifted to the e-passport system, also 
called biometric passports, which is an 
offshoot of the 9/11 attacks in the U.S. 
The e-passports are designed to 
facilitate international travel by allowing 
automatic identity verifi cation and 
faster immigration inspections, as well 
as provide effi cient border protection 
and security. These would look like an 
ordinary passport with an embedded 
electronic chip. The chip would contain 
the photograph, fi ngerprint and personal 
information of the holder so that the 
passport could not be duplicated. “An 
e-passport is machine-readable, enabling 
quick processing at airports. The passport 
comes with a built-in security (biometric) 
feature, which comprises an integrated 
circuit (IC) embedded in the back cover 
that stores the data, including photo. 
These also make the passport tamper-proof. 
In ordinary passports, this data is 
typically displayed on the photo page. 
E-passports support a combination of 
electronic and optical security features 
including watermark, optically 
variable device and hologram. 
If an e-passport is misused, the 
immigration checkpoint will be able to 
detect a mismatch between the printed 
and digital information, and authorities 
can take necessary action against the 
offender. 
The International Civil Aviation 
Organization (ICAO) sets the standards 
for e-passports that have been 
implemented in 
over 70 countries. 
Data in the Indian e-passport 
can be read 
in other countries 
as it adheres to the 
ICAO global standards 
for biometrics and 
secure storage of personal data in travel 
documents. 
The Indian government next year will 
also launch its Passport Seva Project. 
Implemented by Tata Consultancy 
Services (TCS) under a build-operate-transfer 
scheme, the Passport Seva 
Project entails digitization of the entire 
passport services. It seeks to deliver all 
passport-related services to citizens in a 
timely, transparent, more accessible and 
reliable manner, through streamlined 
processes and trained workforce. This 
US$207.3 million (10 billion rupees) 
project is part of the government’s 
National e-Governance Plan (NeGP). 
Source: www.businessweek.com, 
www.igovernment.in 
Indian passports to go the e-way 
News Bytes 
Soiled notes may soon be a thing of 
past with the Reserve Bank of India 
(RBI) planning to introduce polymer 
banknotes whose life span would be 
four times the normal currency notes 
and would be diffi cult to imitate. The 
seizure of large quantities of fake Rs 
1,000 and Rs. 500 notes has led the 
RBI to toy with the idea of replacing 
paper currency with polymer notes. 
As a pilot project, the Central bank is 
planning to introduce one billion pieces 
of Rs. 10 polymer notes, for which the 
bank has fl oated a global tender. The bank 
has asked interested parties for 500 pieces 
of sample banknotes, before the actual 
global bids for the project go through. 
Explaining the rationale for the 
introduction of polymer notes, the 
offi cial said these notes are extremely 
diffi cult to counterfeit and have a 
lifespan of fi ve years compared to 
paper currency which lasts just one 
year. They can also be washed, making 
them more hygienic. Central banks the 
world over believe that the only sure 
way to control counterfeiting is through 
continuous design change and innovation. 
The polymer notes were fi rst introduced 
in Australia to safeguard against 
counterfeiting of currency. Besides 
Australia, other countries which have 
introduced plastic notes, include New 
Zealand, Papua New Guinea, Romania, 
Bermuda, Brunei and Vietnam. 
Going by the increasing incidence 
detection of fake notes, RBI may consider 
introduction of higher denomination 
plastic notes. The RBI had fi rst hinted 
in 2007 that it may start using plastic 
notes. 
Source: Financial Chronicle, September 
2009; India Today, September 2009 
RBI plans to print Rs.10 plastic notes 
8
Company Profi le 
www.homai.org 
The Holography Times 
Holostik India Limited offers 
security solutions for protection/ 
authentication of identity documents. 
Holostik is the leading Security 
Hologram manufacturer in India, 
since 1991, and one of the largest 
manufactures in the world with over 
5000 customers in Government, 
Public and Private sectors. Holostik 
has all facilities under one roof under 
high security environment. We supply 
holographic security solutions to 
various prestigious government bodies, 
for identity document protection. 
• Holostik has two types of 
Master Origination machines- 
Conventional 2D/3D machine 
and 24000 DPI Dot Matrix 
master origination machine, 
which offers ability to produce 
combination masters with added 
security. 
• Our R&D (master lab) team has 
developed certain high security 
features (both overt and covert), 
which are very diffi cult for other 
holographers to develop. 
• Holostik has an in-house printing 
facility, which offers up to 8 
colour UV printing options on 
paper and 10 colour printing 
options on fi lm, providing latest 
high security features in printing 
available in the world. 
• Our product range includes 
regular security holograms, paper 
products incorporating security 
features, polyester / PVC / other 
plastics based fi lm products and / 
or a combination product of one 
or more of the above substrates 
with holographic security 
There are a number of methods that 
can be adopted for securitization 
of identity documents depending 
on volume of documents to be 
securitized, method of application and 
resources available. Thus, Holostik 
offers security holograms in 
(i) Pressure sensitive form (ii) 
Hot Stamping Foil form (iii) 
Transparent Holography form and 
(iv) Laminate form, as per customer 
requirements. 
The most common form is to apply 
Security Hologram on to the existing 
identity document. This hologram 
can be affi xed on the document 
separately or in a manner so that it 
partially covers the photograph of 
the bearer. As it is ‘tamper evident’ 
in nature, any attempt to remove 
it will result in its destruction. At 
Holostik we offer, both Pressure 
sensitive holograms that are affi xed 
manually and automatically and Hot 
Stamping Foil based holograms 
that are affi xed using a Hot Stamping 
machine, in standard and customised 
shapes. Pressure sensitive security 
hologram can be of Transparent / 
Semi-Transparent type. 
Another method is to use pre-printed 
identity document having 
holographic strip running through. 
In this method, Holostik prints the 
required identity document and 
applies a strip of security hologram 
as per design. This method does not 
require hologram handling at the 
end user, rather only printing of the 
individual card details. The use of 
a security strip offers a larger area 
and is also visually appealing. In the 
two forms of application discussed 
above, the fi nal document can be 
used as is basis or can be further 
laminated within a pouch. The 
use of pouch adds another layer of 
security & also enhances life of the 
document. 
Holostik offers a third option which 
combines benefi ts of tamper evident 
transparent security holography with 
transparent laminated holographic 
pouch, offering high security with 
fl exibility of use. Customer needs to 
print data on to the document type, 
paste photographs etc & then place 
document in the pouch and pass it 
through a pouch laminator. The end 
product protected by the laminated 
pouch, it has see-through holographic 
features through out the fascia, is 
tamper evident, visually appealing 
and easy to authenticate, making 
it is easy to protect, securitize and 
authenticate identity documents. 
Holostik provides tailor made 
solutions for the I.D. Cards depending 
on the customer’s requirement i.e. 
security solutions, semi high security 
solutions and high security solutions. 
But, we always incorporate certain 
security features in all of the above 
three categories so that it becomes 
extremely diffi cult for counterfeiters 
to copy. 
Today, many of the important and 
sensitive documents worldwide are 
protected using our tailor made 
security products. What ever be 
the customers’ need, Holostik can 
provide the right solution because of 
its rigorous R&D and wide exposure, 
experience in holography and allied 
products. Just allow us to become 
your ‘Security Partner’ to help you in 
securing your products and we assure 
of your complete satisfaction. 
For any queries/assistance, feel free 
to contact us at 
holostik@vsnl.com. 
9 
Holographers 
To The Globe
Cover Story 
www.homai.org 
The Holography Times 
Global trends for document security 
Identity is an integral part of the Human subsystem. All livings being struggle for their unique identity in the universe- It may be 
in the form of knowledge, Power or Wealth. In ordinary language, one can use the word “identity” to refer to characteristics 
or attributes that cannot naturally be expressed in terms of a social category. However, realizing its importance, worldwide all 
governments keep their Citizen in easy and quick access identity formats. 
But today, Identity counterfeiting is a growing global menace that has turned our identities into highly valuable assets. The 
potential risks associated with fake identifi cation documents can be high. With a fake identity, an individual can potentially gain 
illegitimate access, qualify for government benefi ts, defraud credit companies or make illegal purchases. Even though today’s 
card printing technology delivers superior image quality and exceptional card durability at a surprisingly affordable cost, but with 
forgery and counterfeiting now a serious issue, what defense mechanism are solution providers putting in place to protect the 
end users? 
This article outlines how to reduce the risk of counterfeiting with latest document security trends, paying particular attention to 
a system combining the most effective features. 
Identity Cards: 
ID Cards were introduced during the 
First World War as part of a statutory 
registration scheme. It ended in 1919. 
They were introduced in 1939 and 
remained in force for several years 
after the war until they were abolished 
by Churchill in 1952. Today, around 
a hundred countries have offi cial, 
compulsory, national IDs that are 
used for variety of purposes. 
In India, the recent national Unique 
Identifi cation (UID) project launched 
by the Government of India, with 
the iconic technocrat, Mr. Nandan 
Nilekani at its helm is indeed a 
signifi cant project. With this, India 
has embarked on an ambitious 
e-governance project which targets 
to provide a unique number to each 
citizen. 
Authentication 
In this era of heightened security 
concerns, we are keenly aware 
of the role that ID Documents, or 
credentials, play in our lives. Whether 
a driver’s license, passport, social 
security number, Unique Identity 
number, etc. these documents are 
used routinely not only to verify a 
person’s identity but can also be 
used to protect rights to privacy, 
wealth and security. 
Today, governments worldwide are 
using e-Governance methods and 
realizing that national security has 
profound effects on the economy 
and our way of life. To optimize 
these issues, a diversity of security 
features is available. A brief 
overview of the most widely used 
features is given below. 
Commonly used security 
features 
Most people would agree that secure 
identifi cation begins with a photo 
ID card, the most representative of 
which is the driver’s license. While 
a good photo likeness and a legible 
signature remain the key features 
of a photo ID card, those features 
alone are inadequate today. Issuing 
authorities now incorporate 
several additional features to deter 
counterfeiting, while at the same 
time making authentication easier 
and more reliable. 
The identity of a physical object 
is uniquely determined by a set of 
distinctive properties. Most ID cards 
are fabricated today by direct printing 
on composite CR-80 cards comprising 
layers of cross-oriented polyester with 
outer layers of PVC. Once printed, a 
tough 0.001” (1 mil) thick polyester 
laminate is typically applied to protect 
both sides of the card. 
After the process, companies used 
a variety of integrated security 
features, which can be classifi ed 
mainly into three categories visible, 
invisible and forensic. Finally, 
there are machine-readable magnetic 
stripes, bar codes and programmable 
devices (smart cards) that can provide 
even more security, plus the means for 
automatic data checking and database 
connectivity. 
Level 1 (Overt features) 
These are “fi rst line” validation 
features, i.e. they can be seen 
without the use of equipment or 
special devices. The most frequently 
encountered Level 1 device is a High 
Refractive Index (HRI) hologram 
printed on either the card or, more 
10
Cover Story 
www.homai.org 
The Holography Times 
commonly for drivers’ licenses, 
on the underside of the protective 
laminate. Recently developed de-metallization 
and photo polymer 
holographic techniques now offer 
enhanced depth, transparency, and 
fi ne line detail which most would 
acknowledge being practically 
counterfeit-proof. 
Level 2 (Covert features) 
Level 2 features are verifi able by 
simple, inexpensive tests such 
as visual inspection under a lens 
or black light (UV), biometric 
scanning, digital scanning and data 
base checking. Examples of Level 
2 features include: specialized 
bar codes, micro-printing, and 
covert background printing that is 
incorporated in the card design. 
Level 3 (Forensic features) 
The majority of these must be kept 
secret to remain useful. Analysis 
of a card having Level 3 features is 
essentially a post-mortem process, 
often requiring some dismembering 
of the card to determine its origin, and 
to minutely inspect the features for 
validity. Level 3 devices are images 
or physical objects that are hidden 
within the card structure or concealed 
by special graphic effects on the card 
surface. Typically, they can be fully 
validated only by specialized optical 
scanning devices, or other means of 
machine-reading data. 
SOLUTIONS TO IMPROVE 
SECURITY OF ID’S- ADDING 
EXTRA SECURITY 
ID card security comes from a 
combination of features inherent to 
the card media (like overt, covert 
and forensic), together with variable 
features printed at the time of 
issuance. To add security, growing 
use is made of security features with 
integrated personal data. 
a) UV-Ink Personalization 
One example is on-demand UV 
ink personalization, which allows 
cardholder’s photograph or personal 
data to be printed in high-resolution 
gradient UV ink. Pre-printed features 
are very diffi cult to duplicate. User 
defi ned text, with deliberate random 
font changes and misspelling if 
desired, may be micro-printed as an 
added security features. Character 
height of the micro-printing is fi ve 
thousand of an inch. Other printed 
security choices include Guilloche 
patterns, serial numbering and micro-graphics. 
b) Holographic Laminate 
Since their use in 1989, holograms 
were historically hard to copy; 
they were used to provide cloning 
resistance to products. Holographic 
laminate may be used to extend 
the useful life of a card while 
simultaneously protecting it 
against data manipulation. To 
combat document tampering and 
counterfeiting, the holographic 
industry is developing and 
implementing new security features 
such as nano-text and images (very 
small text and graphics including 
entire city maps) created using 
special diffractive techniques. Other 
enhanced diffractive methods also 
Figure 1: Security features in currently release UK National ID Card exist. 
11
Cover Story 
www.homai.org 
The Holography Times 
c) Holographic Personalization 
Technology (HPT) 
Database verifi cation is an important 
element of ID card. To secure this, 
a more recent trend is to combine 
holographic laminates with personal 
data, photos and other information. 
One example is Identigram, as 
found on the German ID Card and 
e-passport. HPT allows unique or 
generic diffractive images to be 
coated on a card surface. The images 
incorporate unique optical effects that 
are extremely diffi cult to counterfeit. 
Think, for example, of the card 
holder’s photo, biographic data, 
a logo, symbols, a coat of arms 
or a combination thereof. This 
technology, which is also available 
for desktop personalization, allows 
a much wider range of diffractive 
optical images to be designed, this 
effectively adding an additional level 
of security to ID cards. 
d) Holographic Biometrics 
Security 
The security of card can also be 
enhanced by encrypting and storing 
(biographic data) on high-capacity 
chips, possibly in combination with 
biometrics. Given the limited space 
available on an ID cad, especially 
compared to passport, the use of 
electronic ID cards- or – eIDs – 
likely to increase. Moreover, eIDs 
can be used for various e-business 
and e-governance applications, 
including online banking, 
shopping, and user registration 
and with implementation of 
government schemes. In this system, 
the holographic photopolymer is 
laminated to the plastic card, either 
as a strip or patch. It is laminated 
with a refl ective layer and protected 
against wear of tampering. The 
designated biometric (e.g. an iris 
scan or fi ngerprint) is captured in 
the normal way (cameras, fi ngerprint 
scanner, etc), then encoded using a 
code mask. 
e) Enhanced Security with 
Laser Engraving 
A growing number of industry 
participants are calling for laser 
engraving technology to be used on 
a broader scale. Laser engraving 
Figure 3: German ID card using HPT 
Figure 2: Lamination Security features 
12
www.homai.org 
The Holography Times 
involves ‘burning’ data into 
the substrate of an ID card or 
polycarbonate biographic data 
page. The data may consist of text, 
images and graphics (including 
security features such as micro 
text). 
As such, laser engraving is a 
technology rather than a security 
feature. The actual security is derived 
from the application method used. 
If properly applied, laser engraving 
provides protection against alteration 
and reproduction. In fact, laser 
engraving provides unsurpassed 
security. The application of heat (in 
the form of a laser beam) creates a 
chemical reaction inside the core 
of the card, causing molecules to 
move to the surface. The resultant 
characters or images are virtually 
impossible to modify - any attempt 
to alter or remove laser engraved 
data invariably destroys the substrate 
surface. Another advantage of laser 
engraving is that the data does not 
fade or deteriorate due to UV light or 
surface abrasion. 
f) Advanced Laser Engraving 
Laser engraving facilitates the creation 
of Multiple Laser Images (MLI) and 
Changeable Laser 
Images (CLI), 
which cannot be 
produced using 
othertechnologies. 
The process used 
to integrate CLI/ 
MLI images into 
the card body is 
highly specialised. 
CLI/MLI images 
are similar to 
holograms in that 
alternate images 
are produced, 
albeit using direct 
laser engraving. 
The alternate 
images are positioned close to each 
other and engraved at different angles. 
In contrast with holograms, CLI/MLI 
data forms an integral yet unique part 
of the card body (it is applied during 
personalisation). CLI/MLI allows 
personal data to be engraved on 
individual cards. Think, for example, 
of the document ID number or 
expiration date in combination with 
non-standard ‘fl ipping’ images of the 
cardholder’s photograph or signature. 
As the data cannot be copied or 
tampered, advanced laser engraving 
offers an additional level of security. 
It also creates a much higher entry 
barrier for counterfeiters compared 
with other personalisation techniques. 
The result is a highly tamper-resistant 
card. 
g) Creating Uniform Security 
Standards: 
With the lack of consistent standards 
across identifi cation documents today, 
it is often diffi cult to give reasonable 
assurance of a given document’s 
authenticity. For e.g. MasterCard and 
Visa addressed the counterfeiting 
problem by mandating a uniform 
security feature in the form of a hot 
stamped hologram in the same place 
on each card, while leaving the rest 
of the design up to the discretion of 
the member banks. This resulted in a 
dramatic reduction in the incidence 
of credit card counterfeiting. This 
solution works because each layer of 
the security chain: consumer, issuer 
and law enforcement offi cial alike, 
know where and what to look for to 
authenticate a given card. 
In the end, no single security feature 
is able to provide adequate protection. 
Instead, security is optimized if several 
features are combined. 
A clear laminate can be used to 
extend the card’s life. If the laminate 
also contains holographic images, 
security is improved at the same time. 
Holographic laminate is therefore 
highly recommended for national 
IDs. 
Conclusion 
Improving the security of identity 
documents is a matter of urgent 
national security. Most identity 
documents in use today were not 
designed as secure documents, 
and there are no uniform security 
standards in place to assist the 
public and law enforcement in the 
recognition of genuine versus 
counterfeit identity documents. 
Government should understand 
that counterfeiters will attempt 
to counterfeit the least secure 
document. 
Although no-one can stop a 
counterfeiter from trying to modify 
or copy a document, the right 
combination of security features 
and technologies make it impossible 
for him to be successful. These 
security features must be practical 
for document issuers to implement, 
easy for the public to recognize and 
provide specifi c identifying features 
for law enforcement and forensic 
investigators. 
Cover Story 
Figure 4: Phenostar, a holographic photopolymer storage 
medium for plastic cards, invented by Bayer Material Science 
13
The Holography Times Industry Updates 
www.homai.org 
14
www.homai.org 
The Holography Times 
Patents related to identity documents 
Security Hologram for Identity 
Document 
United States Patent Application 
20090051986 (This invention relates 
to improved techniques for using 
holograms to provide security for 
documents and the like.) 
Abstract: Overlaying a security document 
such as a driving license or passport with 
a hologram, which is diffi cult to copy, 
can afford additional security value. For 
example in the British passport document, 
embossed holography has been used in 
the form of a translucent thin layer coated 
on its reverse side with a layer of material 
such as zinc sulphide, whose refractive 
index is signifi cantly higher than the 
carrier. Thus light is refl ected from the 
interface in such a way as to reconstruct 
the holographic image, whilst permitting 
the viewer to see simultaneously, printed 
matter behind the holographic fi lm. 
The idea is that an attempt to remove the 
covering layer will result in destruction 
of the document but in practice one of 
the most common forms of passport/ID 
forgery is where the protective laminate 
is lifted off, allowing the print underneath 
to be tampered with or the laminate to be 
reused on other documents. Background 
prior art can be found in EP 0 754 
987A, WO 2006/077447 A2, U.S. Pat. 
Nos. 4,971,646A, 5,834,096 A and US 
2006/0289114 A1. There is therefore a 
need for improved anti-counterfeiting 
techniques for security documents and 
the like. 
Hologram laminate and 
hologram label 
United States Patent Application 
20060193021 
Abstract: A hologram laminate allows 
traces of separation of the hologram to 
be clearly left on both the adherend and 
the hologram label and hence makes it 
possible to prevent re-use of the hologram 
and is excellent in graphical design 
function and suitable for certifi cation 
purposes. A hologram label used for the 
fabrication of the hologram laminate is 
also provided. The hologram laminate 
has a colored layer, a release pattern, a 
transparent fi lm, a hologram layer and 
a surface protective layer laminated on 
an adherend in the order mentioned. 
The hologram layer includes a volume 
hologram layer and a relief hologram 
layer having a transparent thin-fi lm layer 
over the surface of the relief interference 
fringe pattern. The volume hologram 
layer and the relief hologram layer are 
superimposed so as to be switch able from 
one to another. The hologram laminate is 
separable between the adherend and the 
transparent fi lm. When the hologram is 
separated, the colored layer is left on the 
adherend in a pattern corresponding to the 
release pattern. The hologram label has a 
release sheet in place of the adherend in 
the hologram laminate 
Digitally watermarking 
holograms for identity 
documents 
United States Patent Application 
20030210805 
Abstract: The present invention relates 
to digital watermarks integrated into 
holograms, watermarked hologram 
structures, and related applications as an 
authentication technique. One method 
creates a watermark image, and then 
embeds the watermark image into a 
holographic structure. The holographic 
structure is carried by a smart card. 
The smart card includes additional 
information. In one embodiment, the 
digital watermark includes information 
bits, and these information bits are used 
to authenticate the hologram, or the 
smart card. In another embodiment, 
the watermark’s information bits are 
compared with the additional information 
carried by the smart card. The result of 
the comparison is used to authenticate the 
smart card or the hologram. 
Events & Calendar 
HOLO-PACK•HOLO-PRINT® 2009 
11-13 November 2009, Budapest, Hungary 
www.holopackholoprint.info 
LABEL EXPO ASIA 2009 
1-4 December 2009, Shanghai 
www.labelexpo-asia.com 
PRINTECH 2009 
18-21 December 2009, Mumbai 
www.mmsprintech.com 
OPTICAL DOCUMENT SECURITY 
January 20-22, 2010, San Francisco, CA, USA 
www.opticaldocumentsecurity.com/ 
5TH GLOBAL FORUM ON PHARMACEUTICAL 
ANTICOUNTERFEITING 
February 24-26, 2010, Miami, FL, USA 
www.reconnaissance-intl.com 
PAN-EUROPEAN HIGH SECURITY PRINTING 
CONFERENCE 
April 13-15, 2010, Berlin, Germany 
www.cross-conferences.com 
Editorial Board 
Neha Gupta | C S Jeena 
The Holography Times is published by 
HOLOGRAM MANUFACTURERS 
ASSOCIATION OF INDIA (HoMAI) 
21-Ground Floor, Devika Tower 6, Nehru Place, 
New Delhi - 110019, INDIA 
Telefax: +91-11-4161 7369, 
Email: cjhomai@gmail.com 
Web: www.homai.org 
Designed and Printed by 
Chandan Kumar 
connectchandan@gmail.com 
on behalf of HoMAI 
Disclaimer: The data used here are from various 
published and electronically available primary and 
secondary sources. Despite due diligence the source 
data may contain occasional errors. In such instances, 
HoMAI would not be responsible for such errors. 
15
The Holography Times Industry Updates 
www.homai.org 
16

More Related Content

Viewers also liked

The Holography Times, November 2007, Volume 1, Issue 1
The Holography Times, November 2007, Volume 1, Issue 1The Holography Times, November 2007, Volume 1, Issue 1
The Holography Times, November 2007, Volume 1, Issue 1The Authentication Times
 
The authentication times march 2015 volume 9 issue 26
The authentication times march 2015 volume 9 issue 26The authentication times march 2015 volume 9 issue 26
The authentication times march 2015 volume 9 issue 26The Authentication Times
 
The Holography Times, March 2008, Volume 1, Issue 2
The Holography Times, March 2008, Volume 1, Issue 2The Holography Times, March 2008, Volume 1, Issue 2
The Holography Times, March 2008, Volume 1, Issue 2The Authentication Times
 
The Holography Times, July 2009, Volume 3, Issue No 7
The Holography Times, July 2009, Volume 3, Issue No 7The Holography Times, July 2009, Volume 3, Issue No 7
The Holography Times, July 2009, Volume 3, Issue No 7The Authentication Times
 
The Holography Times, May 2014, Volume 8, Issue no 24
The Holography Times, May 2014, Volume 8, Issue no 24The Holography Times, May 2014, Volume 8, Issue no 24
The Holography Times, May 2014, Volume 8, Issue no 24The Authentication Times
 
The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20The Authentication Times
 
The Holography Times, October 2012, Volume 6, Issue no 19
The Holography Times, October 2012, Volume 6, Issue no 19The Holography Times, October 2012, Volume 6, Issue no 19
The Holography Times, October 2012, Volume 6, Issue no 19The Authentication Times
 
The Holography Times, April 2009, Volume 3, Issue No 6
The Holography Times, April 2009, Volume 3, Issue No 6The Holography Times, April 2009, Volume 3, Issue No 6
The Holography Times, April 2009, Volume 3, Issue No 6The Authentication Times
 
The Authentication Times issue 27 August 2015
The Authentication Times issue 27 August 2015The Authentication Times issue 27 August 2015
The Authentication Times issue 27 August 2015The Authentication Times
 
The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18The Authentication Times
 
The Holography Times, June 2008, Volume 2, Issue No 3
The Holography Times, June 2008, Volume 2, Issue No 3 The Holography Times, June 2008, Volume 2, Issue No 3
The Holography Times, June 2008, Volume 2, Issue No 3 The Authentication Times
 

Viewers also liked (20)

The Holography Times, November 2007, Volume 1, Issue 1
The Holography Times, November 2007, Volume 1, Issue 1The Holography Times, November 2007, Volume 1, Issue 1
The Holography Times, November 2007, Volume 1, Issue 1
 
The authentication times march 2015 volume 9 issue 26
The authentication times march 2015 volume 9 issue 26The authentication times march 2015 volume 9 issue 26
The authentication times march 2015 volume 9 issue 26
 
The Holography Times, March 2008, Volume 1, Issue 2
The Holography Times, March 2008, Volume 1, Issue 2The Holography Times, March 2008, Volume 1, Issue 2
The Holography Times, March 2008, Volume 1, Issue 2
 
Counterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-itCounterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-it
 
The Holography Times, July 2009, Volume 3, Issue No 7
The Holography Times, July 2009, Volume 3, Issue No 7The Holography Times, July 2009, Volume 3, Issue No 7
The Holography Times, July 2009, Volume 3, Issue No 7
 
Authentication Solutions to stop the Scourge of Spurious Medicines
Authentication Solutions to stop the Scourge of Spurious MedicinesAuthentication Solutions to stop the Scourge of Spurious Medicines
Authentication Solutions to stop the Scourge of Spurious Medicines
 
The Holography Times, May 2014, Volume 8, Issue no 24
The Holography Times, May 2014, Volume 8, Issue no 24The Holography Times, May 2014, Volume 8, Issue no 24
The Holography Times, May 2014, Volume 8, Issue no 24
 
Is Hologram Packaging the 6th P of marketing?
Is Hologram Packaging the 6th P of marketing?Is Hologram Packaging the 6th P of marketing?
Is Hologram Packaging the 6th P of marketing?
 
Steps to identify authentication solutions to curb counterfeiting
Steps to identify authentication solutions to curb counterfeitingSteps to identify authentication solutions to curb counterfeiting
Steps to identify authentication solutions to curb counterfeiting
 
The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20
 
The Holography Times, October 2012, Volume 6, Issue no 19
The Holography Times, October 2012, Volume 6, Issue no 19The Holography Times, October 2012, Volume 6, Issue no 19
The Holography Times, October 2012, Volume 6, Issue no 19
 
The Authentication Times, Issue 30
The Authentication Times, Issue 30The Authentication Times, Issue 30
The Authentication Times, Issue 30
 
The Holography Times, April 2009, Volume 3, Issue No 6
The Holography Times, April 2009, Volume 3, Issue No 6The Holography Times, April 2009, Volume 3, Issue No 6
The Holography Times, April 2009, Volume 3, Issue No 6
 
Identity document challenges and solutions
Identity document challenges and solutionsIdentity document challenges and solutions
Identity document challenges and solutions
 
Ht issue 16 201112
Ht issue 16 201112Ht issue 16 201112
Ht issue 16 201112
 
Ht issue 15 201109
Ht issue 15 201109Ht issue 15 201109
Ht issue 15 201109
 
The Authentication Times issue 27 August 2015
The Authentication Times issue 27 August 2015The Authentication Times issue 27 August 2015
The Authentication Times issue 27 August 2015
 
The Holography Times, Vol 8, Issue 24
The Holography Times, Vol 8, Issue 24The Holography Times, Vol 8, Issue 24
The Holography Times, Vol 8, Issue 24
 
The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18
 
The Holography Times, June 2008, Volume 2, Issue No 3
The Holography Times, June 2008, Volume 2, Issue No 3 The Holography Times, June 2008, Volume 2, Issue No 3
The Holography Times, June 2008, Volume 2, Issue No 3
 

Similar to The Holography Times, October 2009, Volume 3, Issue No 8

Non animal technology the future is amazing, and animal-free. #vivisection ...
Non animal technology   the future is amazing, and animal-free. #vivisection ...Non animal technology   the future is amazing, and animal-free. #vivisection ...
Non animal technology the future is amazing, and animal-free. #vivisection ...All Animal Rights
 
The Future of mHealth - Jay Srini - March 2011
The Future of mHealth - Jay Srini - March 2011The Future of mHealth - Jay Srini - March 2011
The Future of mHealth - Jay Srini - March 2011LifeWIRE Corp
 
Newsletter 224
Newsletter 224Newsletter 224
Newsletter 224ESTHHUB
 
How does machine learning help in cancer detection
How does machine learning help in cancer detection How does machine learning help in cancer detection
How does machine learning help in cancer detection GlobalTechCouncil
 
The Evolution and Impact of Medical Science Journals in Advancing Healthcare
The Evolution and Impact of Medical Science Journals in Advancing HealthcareThe Evolution and Impact of Medical Science Journals in Advancing Healthcare
The Evolution and Impact of Medical Science Journals in Advancing Healthcaresana473753
 
journals on medical
journals on medicaljournals on medical
journals on medicalsana473753
 
Technology versus Cancer (How can technology help?)
Technology versus Cancer (How can technology help?)Technology versus Cancer (How can technology help?)
Technology versus Cancer (How can technology help?)Gary Monk
 
Medical device daily 2016-12-14
Medical device daily 2016-12-14Medical device daily 2016-12-14
Medical device daily 2016-12-14Oliver T. Ernst
 
Critical Remarks to Endoscopic Surgery for Endometrial Cancer and Sarcoma, Ce...
Critical Remarks to Endoscopic Surgery for Endometrial Cancer and Sarcoma, Ce...Critical Remarks to Endoscopic Surgery for Endometrial Cancer and Sarcoma, Ce...
Critical Remarks to Endoscopic Surgery for Endometrial Cancer and Sarcoma, Ce...CrimsonpublishersCancer
 
Advanced_Science_future_of_gov_en (6)
Advanced_Science_future_of_gov_en (6)Advanced_Science_future_of_gov_en (6)
Advanced_Science_future_of_gov_en (6)Michael Martins
 
Aging experts want Zukerberg and Brin to live longer - Upgrade Weekly
Aging experts want Zukerberg and Brin to live longer - Upgrade WeeklyAging experts want Zukerberg and Brin to live longer - Upgrade Weekly
Aging experts want Zukerberg and Brin to live longer - Upgrade WeeklyNatalie Jones
 

Similar to The Holography Times, October 2009, Volume 3, Issue No 8 (20)

Healthcare and Robotics
Healthcare and RoboticsHealthcare and Robotics
Healthcare and Robotics
 
Non animal technology the future is amazing, and animal-free. #vivisection ...
Non animal technology   the future is amazing, and animal-free. #vivisection ...Non animal technology   the future is amazing, and animal-free. #vivisection ...
Non animal technology the future is amazing, and animal-free. #vivisection ...
 
IDEATING HEALTH2030
IDEATING HEALTH2030IDEATING HEALTH2030
IDEATING HEALTH2030
 
X.pdf
X.pdfX.pdf
X.pdf
 
The Future of mHealth - Jay Srini - March 2011
The Future of mHealth - Jay Srini - March 2011The Future of mHealth - Jay Srini - March 2011
The Future of mHealth - Jay Srini - March 2011
 
P2 lesson part two
P2 lesson part twoP2 lesson part two
P2 lesson part two
 
The future of medicine
The future of medicineThe future of medicine
The future of medicine
 
The future of medicine
The future of medicineThe future of medicine
The future of medicine
 
Newsletter 224
Newsletter 224Newsletter 224
Newsletter 224
 
Crowd emotion
Crowd emotionCrowd emotion
Crowd emotion
 
How does machine learning help in cancer detection
How does machine learning help in cancer detection How does machine learning help in cancer detection
How does machine learning help in cancer detection
 
The Evolution and Impact of Medical Science Journals in Advancing Healthcare
The Evolution and Impact of Medical Science Journals in Advancing HealthcareThe Evolution and Impact of Medical Science Journals in Advancing Healthcare
The Evolution and Impact of Medical Science Journals in Advancing Healthcare
 
journals on medical
journals on medicaljournals on medical
journals on medical
 
Technology versus Cancer (How can technology help?)
Technology versus Cancer (How can technology help?)Technology versus Cancer (How can technology help?)
Technology versus Cancer (How can technology help?)
 
Medical device daily 2016-12-14
Medical device daily 2016-12-14Medical device daily 2016-12-14
Medical device daily 2016-12-14
 
Critical Remarks to Endoscopic Surgery for Endometrial Cancer and Sarcoma, Ce...
Critical Remarks to Endoscopic Surgery for Endometrial Cancer and Sarcoma, Ce...Critical Remarks to Endoscopic Surgery for Endometrial Cancer and Sarcoma, Ce...
Critical Remarks to Endoscopic Surgery for Endometrial Cancer and Sarcoma, Ce...
 
Advanced_Science_future_of_gov_en (6)
Advanced_Science_future_of_gov_en (6)Advanced_Science_future_of_gov_en (6)
Advanced_Science_future_of_gov_en (6)
 
isisimpacts-low
isisimpacts-lowisisimpacts-low
isisimpacts-low
 
Aging experts want Zukerberg and Brin to live longer - Upgrade Weekly
Aging experts want Zukerberg and Brin to live longer - Upgrade WeeklyAging experts want Zukerberg and Brin to live longer - Upgrade Weekly
Aging experts want Zukerberg and Brin to live longer - Upgrade Weekly
 
Tumor detecting app
Tumor detecting appTumor detecting app
Tumor detecting app
 

More from The Authentication Times

The Authentication Times, October 2014, Volume 8, Issue 25
The Authentication Times, October 2014, Volume 8, Issue 25The Authentication Times, October 2014, Volume 8, Issue 25
The Authentication Times, October 2014, Volume 8, Issue 25The Authentication Times
 
The Holography Times, January 2014, Volume 8, Issue no 23
The Holography Times, January 2014, Volume 8, Issue no 23The Holography Times, January 2014, Volume 8, Issue no 23
The Holography Times, January 2014, Volume 8, Issue no 23The Authentication Times
 
The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22The Authentication Times
 
The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21The Authentication Times
 
The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17The Authentication Times
 
The Holography Times, April 2010, Volume 4, Issue no 10
The Holography Times, April 2010, Volume 4, Issue no 10The Holography Times, April 2010, Volume 4, Issue no 10
The Holography Times, April 2010, Volume 4, Issue no 10The Authentication Times
 

More from The Authentication Times (20)

The Authentication Times Issue 39
The Authentication Times Issue 39The Authentication Times Issue 39
The Authentication Times Issue 39
 
The Authentication Times Issue 38
The Authentication Times Issue 38The Authentication Times Issue 38
The Authentication Times Issue 38
 
The Authentication Times, Issue 37
The Authentication Times, Issue 37The Authentication Times, Issue 37
The Authentication Times, Issue 37
 
The Authentication Times Issue 36
The Authentication Times Issue 36The Authentication Times Issue 36
The Authentication Times Issue 36
 
The authentication times issue 35
The authentication times issue 35The authentication times issue 35
The authentication times issue 35
 
The Authentication Times Issue 34
The Authentication Times Issue 34The Authentication Times Issue 34
The Authentication Times Issue 34
 
The Authentication Times Issue 33
The Authentication Times Issue 33The Authentication Times Issue 33
The Authentication Times Issue 33
 
The Authentication Times issue 32
The Authentication Times issue 32The Authentication Times issue 32
The Authentication Times issue 32
 
The Authentication Times Issue 31
The Authentication Times Issue 31The Authentication Times Issue 31
The Authentication Times Issue 31
 
The Authentication Times Issue 29
The Authentication Times Issue 29The Authentication Times Issue 29
The Authentication Times Issue 29
 
The Authentication Times Issue 28
The Authentication Times Issue 28The Authentication Times Issue 28
The Authentication Times Issue 28
 
The Authentication Times, October 2014, Volume 8, Issue 25
The Authentication Times, October 2014, Volume 8, Issue 25The Authentication Times, October 2014, Volume 8, Issue 25
The Authentication Times, October 2014, Volume 8, Issue 25
 
The Holography Times, January 2014, Volume 8, Issue no 23
The Holography Times, January 2014, Volume 8, Issue no 23The Holography Times, January 2014, Volume 8, Issue no 23
The Holography Times, January 2014, Volume 8, Issue no 23
 
The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22
 
The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21
 
The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17
 
Ht issue 14 201106
Ht issue 14 201106Ht issue 14 201106
Ht issue 14 201106
 
Ht issue 13 201102
Ht issue 13 201102Ht issue 13 201102
Ht issue 13 201102
 
Ht issue 12 201011
Ht issue 12 201011Ht issue 12 201011
Ht issue 12 201011
 
The Holography Times, April 2010, Volume 4, Issue no 10
The Holography Times, April 2010, Volume 4, Issue no 10The Holography Times, April 2010, Volume 4, Issue no 10
The Holography Times, April 2010, Volume 4, Issue no 10
 

Recently uploaded

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

The Holography Times, October 2009, Volume 3, Issue No 8

  • 1. theholographytimes TM October 2009 | Vol. 3 | Issue 8 www.homai.org www.homai.org The Holography Times The journal of hologram industry ID Cards Protecting People But WHAT about their protection? Global trends for document security ALSO: Innovation: Research team designing holographic imaging system for ovarian cancer • UK national ID card unveils • Indian passports to go the e-way • Patent news • Events & calendar & more... 1 Special Report The Holography Times is quarterly published by HoMAI.
  • 2. www.homai.org The Holography Times 2 Holographers To The Globe
  • 3. Holography : A technology protecting products & lives! www.homai.org The Holography Times We are delighted to share with you our quarterly newsletter, The Holography Times. This is perhaps the best means of staying in touch with the holographic family, where we share with you latest developments in the Indian and the international holographic industry, learnings from around the world which have future potential and can be applied to your business- where the aim is to establish a connection between the expanding universe of holography and its importance in daily life. Holography is a fast developing science having enormous impact on the society at large. Worldwide innovations like scientists working on Holographic Imaging Systems to fi ght ovarian cancer are leading to revolutionary changes in our world. In this newsletter we discuss how this imaging instrument contributes to a broader understanding of ovarian cancer - The Silent Killer. Identity counterfeiting is an increasing global menace that has turned our identities into highly valuable assets. Since being developed over 60 years ago holograms have been the most successful anti-counterfeiting measure in this battle against ID counterfeiting. While the fi rst DOVID appeared on a credit card in 1982 and on a banknote in 1988, in 1985 the fi rst metallized hologram appeared on the passport of Iraq. Here we discuss about the role of a hologram offering protection against forgery of variable information like photograph and personal data and global developments in ID document protection. The issue talks about how holography is not only protecting identity documents, saving tax revenues but also playing a social part by protecting human lives. Once again we seek your feedback and valuable advice to take this newsletter and association to greater heights. Happy reading! Team HoMAI! In this issue d li h d h i h l l Th Editorial Innovation Holographic imaging system for ovarian cancer 4 Web Watch 5 News Bytes 6 Company Profi le 9 10 Cover Story Global trends for document security Patent news related to identity 15 documents 3 Holographers To The Globe
  • 4. Technology www.homai.org The Holography Times Innovation Holographic imaging system for ovarian cancer Two University of Arizona researchers have formed a research team to design, build and evaluate an ovarian cancer medical imaging and screening instrument that will use holographic components in a new type of optical microscope. By using holograms and merging medical and optical science, researchers Raymond Kostuk and Jennifer K. Barton are developing a way of seeing enough varied depth in ovarian tissue to detect microscopic cancer cells in their earliest stages. This would be a huge advance in the fi ght against an insidious disease that kills most women within fi ve years of diagnosis. The system will work like a high-powered microscope that can be used to study tissue samples already removed. In addition, an endoscopic version is in the design stage to safely scan the ovaries for cancer during laparoscopic screenings in high-risk women. The system is unique in that it will for the fi rst time project multiple spatial images from different depths within a tissue sample and simultaneously provide spectral information from optical markers in order to better identify cancerous cells. Raymond Kostuk and Jennifer Barton have secured a fi ve-year; $2.4 million grant from the National Institutes of Health to build the instrument that they hope will one day be used to monitor women at high risk for ovarian cancer. The grant was issued following the successful two-year development of a prototype system the team built. During the past 25 years Kostuk has researched different aspects of holography and holographic materials for use as optical elements. The holographic imaging system being designed combines an optical technique that creates images capable of detecting subtle tissue microstructure changes. Together with fl uorescence spectroscopy methods, the system has demonstrated capability for early cancer detection. Another member of the team, UA research professor Marek Romanowski, is working on the development of targeted fl uorescent dyes that will be used on tissue samples to identify or confi rm suspected cancerous areas shown in the spatial image. Barton said ovarian cancer provides a compelling case to test holographic imaging and its effi cacy in detecting cancers. At the present time the preferred treatment is surgery, which is also often needed to diagnose ovarian cancer. The procedure includes taking tissue samples, which may threaten the woman’s ability to have children in the future. The researchers expect to spend the next fi ve years fi ne-tuning a wand-like instrument that’s anticipated to be a “game changer” for medicine if it does what is intended - allow high-risk women to know whether they actually have ovarian cancer before having their Human ovary image captured with the use of the prototype holo-graphic imaging system the team developed. For comparison, an onion is imaged with the use of the prototype system the team developed. Raymond Kostuk Jennifer Barton 4
  • 5. The Holography Times Technology ovaries removed. “The system will image like an MRI or a CT scan but with much higher resolution than an ultrasonic image and will be a lot less expensive than an MRI. As an additional benefi t no radiation will be used or exposed to sensitive ovary areas during the cancer screenings,” Kostuk said. The researchers in the future course will do three major things: improve the performance of a prototype of the technology Kostuk and Barton already have developed; package the technology into a laparoscopic system that can be taken into the operating room; and perform a pilot study on women who already are having their ovaries removed. Ultimately, Kostuk and Barton want to help save lives and contribute to a broader understanding of how ovarian cancer progresses. “Our hope is that it would detect it earlier by providing more information,” said Barton, who heads the university’s department of biomedical engineering. www.homai.org “The Silent Killer “ Ovarian cancer is often called the “silent” killer because many times there are no symptoms until the disease has progressed to an advanced stage. Ovarian Cancer Facts to Know Fact 1: Ovarian cancer is the leading cause of gynecologic cancer deaths among women. Fact 2: If diagnosed in its early stage, the chance of survival is 90%. Fact 3: Only 24 percent of ovarian cancers are diagnosed at an early stage, when the cancer is confi ned to the ovary. Fact 4. One woman out of every 55 (approximately 1.8 percent) will develop ovarian cancer at some point in her lifetime. Fact 5. Ovarian cancer is most common in women who have already gone through menopause. The average age for developing ovarian cancer is 61 years old. Fact 6. For the small number of women who are fortunate enough to have their cancer diagnosed before it has spread beyond the ovary, the chance for recovery is 85 to 90 percent. Fact 7: The risk for ovarian cancer is greater for women who have never had children, who had their fi rst child at a later time in life or who have a personal history of breast cancer, colorectal cancer or endometrial cancer. Fact 8. The only sure way to diagnose ovarian cancer is through microscopic examination of abnormal fl uid or tissue, obtained by needle aspiration (withdrawal of fl uid or tissue from a suspicious area though a special, wide needle) or surgery. Fact 9. Hycamtin is one of the fi rst of a new kind of anti-cancer drugs that kills cancer cells by inhibiting an enzyme essential to the replication of human DNA. Web watch section Protecting vital information is of utmost importance to companies nowadays, whether it is printed documentation or digital fi les. Thus, here we mention certain websites armed with useful tips on information security and how to safeguard companies from threats and violation of the rights to privacy. 1. Search security asia (www.searchsecurityasia.com) The goal of this website is to try & prevent, detect, resolve, or repair internet and network security issues in Asia. You can get essential tips on how to protect both the front and back end of your website. You may also check how to secure data through tips, articles, white papers, and case studies that, ironically, spill over information on information security. 2. Computer Security News (www.computersecuritynow.com) The purpose of this website is presenting an almost perfect portal for ISO 17799 Information security. From general information to implementation, this website provides downloadable fi les for your reference like ISO 17799 Toolkit, Security Policies., Security Risk Assessment, and Risk Analysis: How & Why-describes the method and approach on Security Risk and manual for Information Security management. You may also fi nd news on the upgrade of ISO 17799 to ISO 27002. 5
  • 6. www.homai.org The Holography Times The UK government relied on hologram for the protection of their ID card. The UK ID card’s image was offi cially unveiled by the Home Secretary Alan Johnson in Manchester in August 2009. This ID card is voluntary for British citizens and can also be used as a travel document in Europe. The card image shows the information contained on the face of the card, including photograph, name, date of birth and signature, as well as the card’s unique design. It holds similar information to that currently contained in the UK passport as well as fi ngerprints on a secure electronic chip. This chip will link to a biometric database holding a person’s fi ngerprints and address. The cards remain a central part of the government’s plans to tighten up Britain’s border controls and clamp down on illegal working. Given the growing problem of identity fraud and the inconvenience of having to carry passports, coupled with gas bills or six months worth of bank statements to prove identity, Mr. Johnson, believes the ID card will be welcomed as an important addition to the many plastic cards that most people already carry. “The fact that it can be used as a passport when traveling in Europe will be an added advantage,” he said. Over the years the reason for issuing documents has also shifted to being a good proof of age tool. This approach has received the backing of the National Federation of Retailers and Newsagents, whose spokesperson said: “Underage sales are a problem across the UK and we are always looking for new ways for the public, especially those under the age of 18 years old, to prove their identity.” Source: news.bbc.co.uk UK national ID card unveils The UK government relied on hologram for the protection of their ID card. News Bytes JDSU increases security with holofuse technology JDSU, a leading provider of innovative optical solutions for brand authentication, medical/environmental instrumentation, semiconductor processing, display, etc. has introduced its HoloFuseTM polycarbonate fi lm, a new highly integrated product that helps protect government-issued identity documents such as passports, national identity documents and driver’s licenses against counterfeiting and tampering. HoloFuse is the fi rst solution that includes a hologram that is integrated into a polycarbonate fi lm without the use of adhesives. This fi lm in turn becomes the clear outer layer of identity documents, helping to reduce the ability of counterfeiters to separate card layers and tamper with their security. In addition, providing an integrated solution simplifi es the manufacturing process for card and identity document makers. The partially transparent and customized hologram within the polycarbonate fi lm includes overt, covert and forensic security features that make it diffi cult to reproduce. JDSU’s patented technology also better preserves the hologram, making it brighter and easier to identify. “The new HoloFuse product is based on JDSU’s years of expertise in optical science and provides a whole new way to protect the integrity of high security identity documents, while simplifying the manufacturing process for card makers,” said Garth Zambory, Document Authentication product manager for the Advanced Optical Technologies business segment at JDSU. The polycarbonate material is also more environmentally friendly than plastics typically used for the creation of cards such as PET or PVC. JDSU has fi led a patent for the new solution and expects to be shipping it during the second half of calendar year 2009. Source: www.jdsu.com 6
  • 7. NAFDAC likely to set up check points for counterfeit drugs www.homai.org The Holography Times According to a WHO report, about 16.7% of the total pharma exports to Nigeria are counterfeit. Following recent apprehensions over sub-standard drugs marketed in Nigeria, the National Agency for Food and Drug Administration and Control (Nafdac) has proposed to set up overseas control points in India and China to verify the quality of all drugs and allied pharmaceutical products sold in Nigeria from these two countries. These check points are expected to have state-of-the-art technologies to check counterfeit on the spot. This is said to be the fi rst initiative to counter fake drug supply in the generic business. The Nigerian government also plans to bring in lifetime jail term or death penalty for manufacturers and distributors of fake and substandard drugs in Nigeria. “We would sign a memorandum of understanding with the Department of Pharmaceuticals, government of India, on September 30, to put in place a joint regulatory framework for both the countries to check counterfeit drugs,’’ informed Paul B Orhii, director general Nafdac. He said that about 20 Indian pharmaceutical companies in various categories have expressed interest in setting up manufacturing facilities in Nigeria. The likes of Apollo Pharmacy and Hetero Dugs, which have a wide network of pharmacy outlets in the country, have been approached to set up pharmacies for marketing quality products and dispel fears of sub-standard drugs. Incidentally, Nafdac has had discussions with Torrent Pharma and Ranbaxy for setting up bio-equilance and bio-availability study centres in Nigeria. Nafdac is planning to join hands with the National Institute of Pharmaceutical Education and Research, Hyderabad, to train its people. The Nigerian government would give rewards to informers and actively encourage victims to gather evidence that enable us to sue manufacturers and distributors of these deadly products. He also informed that a massive campaign was being drawn up jointly by Nafdac, the Indian government, China and the US to build an international coalition to fi ght counterfeit drugs. Source: www.fi nancialexpress.com News Bytes TSSI has acquired a portfolio of patents for specialist volume and true colour holograms including Biometrigram and HD-3D hologram patents from authentication security technology and consultancy fi rm Ver-tec. The move follows the recent launch of TSSI’s Magnetics Solutions Division, which aims to drive growth across TSSI’s document security and brand protection products. According to TSSI, counterfeiters are becoming increasingly sophisticated, producing highly realistic ID documents. Additional security measures are therefore required to provide the highest level of protection possible and ensure that ID documents such as passports, ID cards and access cards cannot be replicated. Hologram technology provides an effective security solution for all identity documents as each hologram is unique making it impossible to imitate. HD-3D is a true colour hologram, meaning the images always maintain their original colours from any viewing angle, unlike embossed holograms which exhibit a rainbow effect. Each hologram is unique with different serial numbers and/or bar codes, which can also be encrypted for added security. The Biometrigram, a volume hologram, can store multiple biometrics as well as analogue images and encrypted digital information. TSSI says these have a higher information density than electronic chips so are ideal for use on ID cards. Each hologram is unique so ensures the correct identity of the document holder and provides an effective security measure in the fi ght against identity fraud. “Both of these products are a welcome addition to our portfolio of identity and document security offerings. Our customers want top quality security solutions and these new patents will meet this increased demand for fraud proof identity documents,” says Danny Chapchal, executive chairman, TSSI Systems. Source: www.securitydocumentworld.com TSSI buys ver-tec patents 7
  • 8. www.homai.org The Holography Times India will shortly switch over to e-passport system, increasingly used globally to check terrorism using false identity. The government launched its e-passport scheme on Jun. 25 this year, where President Pratibha Patil, Prime Minister Manmohan Singh and Vice President Hamid Ansari were the fi rst ones to receive their biometric passports. E-passports have been issued to diplomats since July this year, but are expected to be extended to all citizens from September next year. The Indian government appears on track to issue some 800,000 e-passports next year and begin piloting its new backend system touted to enable faster delivery of passport services, baring no further delays. Already, 35 countries have shifted to the e-passport system, also called biometric passports, which is an offshoot of the 9/11 attacks in the U.S. The e-passports are designed to facilitate international travel by allowing automatic identity verifi cation and faster immigration inspections, as well as provide effi cient border protection and security. These would look like an ordinary passport with an embedded electronic chip. The chip would contain the photograph, fi ngerprint and personal information of the holder so that the passport could not be duplicated. “An e-passport is machine-readable, enabling quick processing at airports. The passport comes with a built-in security (biometric) feature, which comprises an integrated circuit (IC) embedded in the back cover that stores the data, including photo. These also make the passport tamper-proof. In ordinary passports, this data is typically displayed on the photo page. E-passports support a combination of electronic and optical security features including watermark, optically variable device and hologram. If an e-passport is misused, the immigration checkpoint will be able to detect a mismatch between the printed and digital information, and authorities can take necessary action against the offender. The International Civil Aviation Organization (ICAO) sets the standards for e-passports that have been implemented in over 70 countries. Data in the Indian e-passport can be read in other countries as it adheres to the ICAO global standards for biometrics and secure storage of personal data in travel documents. The Indian government next year will also launch its Passport Seva Project. Implemented by Tata Consultancy Services (TCS) under a build-operate-transfer scheme, the Passport Seva Project entails digitization of the entire passport services. It seeks to deliver all passport-related services to citizens in a timely, transparent, more accessible and reliable manner, through streamlined processes and trained workforce. This US$207.3 million (10 billion rupees) project is part of the government’s National e-Governance Plan (NeGP). Source: www.businessweek.com, www.igovernment.in Indian passports to go the e-way News Bytes Soiled notes may soon be a thing of past with the Reserve Bank of India (RBI) planning to introduce polymer banknotes whose life span would be four times the normal currency notes and would be diffi cult to imitate. The seizure of large quantities of fake Rs 1,000 and Rs. 500 notes has led the RBI to toy with the idea of replacing paper currency with polymer notes. As a pilot project, the Central bank is planning to introduce one billion pieces of Rs. 10 polymer notes, for which the bank has fl oated a global tender. The bank has asked interested parties for 500 pieces of sample banknotes, before the actual global bids for the project go through. Explaining the rationale for the introduction of polymer notes, the offi cial said these notes are extremely diffi cult to counterfeit and have a lifespan of fi ve years compared to paper currency which lasts just one year. They can also be washed, making them more hygienic. Central banks the world over believe that the only sure way to control counterfeiting is through continuous design change and innovation. The polymer notes were fi rst introduced in Australia to safeguard against counterfeiting of currency. Besides Australia, other countries which have introduced plastic notes, include New Zealand, Papua New Guinea, Romania, Bermuda, Brunei and Vietnam. Going by the increasing incidence detection of fake notes, RBI may consider introduction of higher denomination plastic notes. The RBI had fi rst hinted in 2007 that it may start using plastic notes. Source: Financial Chronicle, September 2009; India Today, September 2009 RBI plans to print Rs.10 plastic notes 8
  • 9. Company Profi le www.homai.org The Holography Times Holostik India Limited offers security solutions for protection/ authentication of identity documents. Holostik is the leading Security Hologram manufacturer in India, since 1991, and one of the largest manufactures in the world with over 5000 customers in Government, Public and Private sectors. Holostik has all facilities under one roof under high security environment. We supply holographic security solutions to various prestigious government bodies, for identity document protection. • Holostik has two types of Master Origination machines- Conventional 2D/3D machine and 24000 DPI Dot Matrix master origination machine, which offers ability to produce combination masters with added security. • Our R&D (master lab) team has developed certain high security features (both overt and covert), which are very diffi cult for other holographers to develop. • Holostik has an in-house printing facility, which offers up to 8 colour UV printing options on paper and 10 colour printing options on fi lm, providing latest high security features in printing available in the world. • Our product range includes regular security holograms, paper products incorporating security features, polyester / PVC / other plastics based fi lm products and / or a combination product of one or more of the above substrates with holographic security There are a number of methods that can be adopted for securitization of identity documents depending on volume of documents to be securitized, method of application and resources available. Thus, Holostik offers security holograms in (i) Pressure sensitive form (ii) Hot Stamping Foil form (iii) Transparent Holography form and (iv) Laminate form, as per customer requirements. The most common form is to apply Security Hologram on to the existing identity document. This hologram can be affi xed on the document separately or in a manner so that it partially covers the photograph of the bearer. As it is ‘tamper evident’ in nature, any attempt to remove it will result in its destruction. At Holostik we offer, both Pressure sensitive holograms that are affi xed manually and automatically and Hot Stamping Foil based holograms that are affi xed using a Hot Stamping machine, in standard and customised shapes. Pressure sensitive security hologram can be of Transparent / Semi-Transparent type. Another method is to use pre-printed identity document having holographic strip running through. In this method, Holostik prints the required identity document and applies a strip of security hologram as per design. This method does not require hologram handling at the end user, rather only printing of the individual card details. The use of a security strip offers a larger area and is also visually appealing. In the two forms of application discussed above, the fi nal document can be used as is basis or can be further laminated within a pouch. The use of pouch adds another layer of security & also enhances life of the document. Holostik offers a third option which combines benefi ts of tamper evident transparent security holography with transparent laminated holographic pouch, offering high security with fl exibility of use. Customer needs to print data on to the document type, paste photographs etc & then place document in the pouch and pass it through a pouch laminator. The end product protected by the laminated pouch, it has see-through holographic features through out the fascia, is tamper evident, visually appealing and easy to authenticate, making it is easy to protect, securitize and authenticate identity documents. Holostik provides tailor made solutions for the I.D. Cards depending on the customer’s requirement i.e. security solutions, semi high security solutions and high security solutions. But, we always incorporate certain security features in all of the above three categories so that it becomes extremely diffi cult for counterfeiters to copy. Today, many of the important and sensitive documents worldwide are protected using our tailor made security products. What ever be the customers’ need, Holostik can provide the right solution because of its rigorous R&D and wide exposure, experience in holography and allied products. Just allow us to become your ‘Security Partner’ to help you in securing your products and we assure of your complete satisfaction. For any queries/assistance, feel free to contact us at holostik@vsnl.com. 9 Holographers To The Globe
  • 10. Cover Story www.homai.org The Holography Times Global trends for document security Identity is an integral part of the Human subsystem. All livings being struggle for their unique identity in the universe- It may be in the form of knowledge, Power or Wealth. In ordinary language, one can use the word “identity” to refer to characteristics or attributes that cannot naturally be expressed in terms of a social category. However, realizing its importance, worldwide all governments keep their Citizen in easy and quick access identity formats. But today, Identity counterfeiting is a growing global menace that has turned our identities into highly valuable assets. The potential risks associated with fake identifi cation documents can be high. With a fake identity, an individual can potentially gain illegitimate access, qualify for government benefi ts, defraud credit companies or make illegal purchases. Even though today’s card printing technology delivers superior image quality and exceptional card durability at a surprisingly affordable cost, but with forgery and counterfeiting now a serious issue, what defense mechanism are solution providers putting in place to protect the end users? This article outlines how to reduce the risk of counterfeiting with latest document security trends, paying particular attention to a system combining the most effective features. Identity Cards: ID Cards were introduced during the First World War as part of a statutory registration scheme. It ended in 1919. They were introduced in 1939 and remained in force for several years after the war until they were abolished by Churchill in 1952. Today, around a hundred countries have offi cial, compulsory, national IDs that are used for variety of purposes. In India, the recent national Unique Identifi cation (UID) project launched by the Government of India, with the iconic technocrat, Mr. Nandan Nilekani at its helm is indeed a signifi cant project. With this, India has embarked on an ambitious e-governance project which targets to provide a unique number to each citizen. Authentication In this era of heightened security concerns, we are keenly aware of the role that ID Documents, or credentials, play in our lives. Whether a driver’s license, passport, social security number, Unique Identity number, etc. these documents are used routinely not only to verify a person’s identity but can also be used to protect rights to privacy, wealth and security. Today, governments worldwide are using e-Governance methods and realizing that national security has profound effects on the economy and our way of life. To optimize these issues, a diversity of security features is available. A brief overview of the most widely used features is given below. Commonly used security features Most people would agree that secure identifi cation begins with a photo ID card, the most representative of which is the driver’s license. While a good photo likeness and a legible signature remain the key features of a photo ID card, those features alone are inadequate today. Issuing authorities now incorporate several additional features to deter counterfeiting, while at the same time making authentication easier and more reliable. The identity of a physical object is uniquely determined by a set of distinctive properties. Most ID cards are fabricated today by direct printing on composite CR-80 cards comprising layers of cross-oriented polyester with outer layers of PVC. Once printed, a tough 0.001” (1 mil) thick polyester laminate is typically applied to protect both sides of the card. After the process, companies used a variety of integrated security features, which can be classifi ed mainly into three categories visible, invisible and forensic. Finally, there are machine-readable magnetic stripes, bar codes and programmable devices (smart cards) that can provide even more security, plus the means for automatic data checking and database connectivity. Level 1 (Overt features) These are “fi rst line” validation features, i.e. they can be seen without the use of equipment or special devices. The most frequently encountered Level 1 device is a High Refractive Index (HRI) hologram printed on either the card or, more 10
  • 11. Cover Story www.homai.org The Holography Times commonly for drivers’ licenses, on the underside of the protective laminate. Recently developed de-metallization and photo polymer holographic techniques now offer enhanced depth, transparency, and fi ne line detail which most would acknowledge being practically counterfeit-proof. Level 2 (Covert features) Level 2 features are verifi able by simple, inexpensive tests such as visual inspection under a lens or black light (UV), biometric scanning, digital scanning and data base checking. Examples of Level 2 features include: specialized bar codes, micro-printing, and covert background printing that is incorporated in the card design. Level 3 (Forensic features) The majority of these must be kept secret to remain useful. Analysis of a card having Level 3 features is essentially a post-mortem process, often requiring some dismembering of the card to determine its origin, and to minutely inspect the features for validity. Level 3 devices are images or physical objects that are hidden within the card structure or concealed by special graphic effects on the card surface. Typically, they can be fully validated only by specialized optical scanning devices, or other means of machine-reading data. SOLUTIONS TO IMPROVE SECURITY OF ID’S- ADDING EXTRA SECURITY ID card security comes from a combination of features inherent to the card media (like overt, covert and forensic), together with variable features printed at the time of issuance. To add security, growing use is made of security features with integrated personal data. a) UV-Ink Personalization One example is on-demand UV ink personalization, which allows cardholder’s photograph or personal data to be printed in high-resolution gradient UV ink. Pre-printed features are very diffi cult to duplicate. User defi ned text, with deliberate random font changes and misspelling if desired, may be micro-printed as an added security features. Character height of the micro-printing is fi ve thousand of an inch. Other printed security choices include Guilloche patterns, serial numbering and micro-graphics. b) Holographic Laminate Since their use in 1989, holograms were historically hard to copy; they were used to provide cloning resistance to products. Holographic laminate may be used to extend the useful life of a card while simultaneously protecting it against data manipulation. To combat document tampering and counterfeiting, the holographic industry is developing and implementing new security features such as nano-text and images (very small text and graphics including entire city maps) created using special diffractive techniques. Other enhanced diffractive methods also Figure 1: Security features in currently release UK National ID Card exist. 11
  • 12. Cover Story www.homai.org The Holography Times c) Holographic Personalization Technology (HPT) Database verifi cation is an important element of ID card. To secure this, a more recent trend is to combine holographic laminates with personal data, photos and other information. One example is Identigram, as found on the German ID Card and e-passport. HPT allows unique or generic diffractive images to be coated on a card surface. The images incorporate unique optical effects that are extremely diffi cult to counterfeit. Think, for example, of the card holder’s photo, biographic data, a logo, symbols, a coat of arms or a combination thereof. This technology, which is also available for desktop personalization, allows a much wider range of diffractive optical images to be designed, this effectively adding an additional level of security to ID cards. d) Holographic Biometrics Security The security of card can also be enhanced by encrypting and storing (biographic data) on high-capacity chips, possibly in combination with biometrics. Given the limited space available on an ID cad, especially compared to passport, the use of electronic ID cards- or – eIDs – likely to increase. Moreover, eIDs can be used for various e-business and e-governance applications, including online banking, shopping, and user registration and with implementation of government schemes. In this system, the holographic photopolymer is laminated to the plastic card, either as a strip or patch. It is laminated with a refl ective layer and protected against wear of tampering. The designated biometric (e.g. an iris scan or fi ngerprint) is captured in the normal way (cameras, fi ngerprint scanner, etc), then encoded using a code mask. e) Enhanced Security with Laser Engraving A growing number of industry participants are calling for laser engraving technology to be used on a broader scale. Laser engraving Figure 3: German ID card using HPT Figure 2: Lamination Security features 12
  • 13. www.homai.org The Holography Times involves ‘burning’ data into the substrate of an ID card or polycarbonate biographic data page. The data may consist of text, images and graphics (including security features such as micro text). As such, laser engraving is a technology rather than a security feature. The actual security is derived from the application method used. If properly applied, laser engraving provides protection against alteration and reproduction. In fact, laser engraving provides unsurpassed security. The application of heat (in the form of a laser beam) creates a chemical reaction inside the core of the card, causing molecules to move to the surface. The resultant characters or images are virtually impossible to modify - any attempt to alter or remove laser engraved data invariably destroys the substrate surface. Another advantage of laser engraving is that the data does not fade or deteriorate due to UV light or surface abrasion. f) Advanced Laser Engraving Laser engraving facilitates the creation of Multiple Laser Images (MLI) and Changeable Laser Images (CLI), which cannot be produced using othertechnologies. The process used to integrate CLI/ MLI images into the card body is highly specialised. CLI/MLI images are similar to holograms in that alternate images are produced, albeit using direct laser engraving. The alternate images are positioned close to each other and engraved at different angles. In contrast with holograms, CLI/MLI data forms an integral yet unique part of the card body (it is applied during personalisation). CLI/MLI allows personal data to be engraved on individual cards. Think, for example, of the document ID number or expiration date in combination with non-standard ‘fl ipping’ images of the cardholder’s photograph or signature. As the data cannot be copied or tampered, advanced laser engraving offers an additional level of security. It also creates a much higher entry barrier for counterfeiters compared with other personalisation techniques. The result is a highly tamper-resistant card. g) Creating Uniform Security Standards: With the lack of consistent standards across identifi cation documents today, it is often diffi cult to give reasonable assurance of a given document’s authenticity. For e.g. MasterCard and Visa addressed the counterfeiting problem by mandating a uniform security feature in the form of a hot stamped hologram in the same place on each card, while leaving the rest of the design up to the discretion of the member banks. This resulted in a dramatic reduction in the incidence of credit card counterfeiting. This solution works because each layer of the security chain: consumer, issuer and law enforcement offi cial alike, know where and what to look for to authenticate a given card. In the end, no single security feature is able to provide adequate protection. Instead, security is optimized if several features are combined. A clear laminate can be used to extend the card’s life. If the laminate also contains holographic images, security is improved at the same time. Holographic laminate is therefore highly recommended for national IDs. Conclusion Improving the security of identity documents is a matter of urgent national security. Most identity documents in use today were not designed as secure documents, and there are no uniform security standards in place to assist the public and law enforcement in the recognition of genuine versus counterfeit identity documents. Government should understand that counterfeiters will attempt to counterfeit the least secure document. Although no-one can stop a counterfeiter from trying to modify or copy a document, the right combination of security features and technologies make it impossible for him to be successful. These security features must be practical for document issuers to implement, easy for the public to recognize and provide specifi c identifying features for law enforcement and forensic investigators. Cover Story Figure 4: Phenostar, a holographic photopolymer storage medium for plastic cards, invented by Bayer Material Science 13
  • 14. The Holography Times Industry Updates www.homai.org 14
  • 15. www.homai.org The Holography Times Patents related to identity documents Security Hologram for Identity Document United States Patent Application 20090051986 (This invention relates to improved techniques for using holograms to provide security for documents and the like.) Abstract: Overlaying a security document such as a driving license or passport with a hologram, which is diffi cult to copy, can afford additional security value. For example in the British passport document, embossed holography has been used in the form of a translucent thin layer coated on its reverse side with a layer of material such as zinc sulphide, whose refractive index is signifi cantly higher than the carrier. Thus light is refl ected from the interface in such a way as to reconstruct the holographic image, whilst permitting the viewer to see simultaneously, printed matter behind the holographic fi lm. The idea is that an attempt to remove the covering layer will result in destruction of the document but in practice one of the most common forms of passport/ID forgery is where the protective laminate is lifted off, allowing the print underneath to be tampered with or the laminate to be reused on other documents. Background prior art can be found in EP 0 754 987A, WO 2006/077447 A2, U.S. Pat. Nos. 4,971,646A, 5,834,096 A and US 2006/0289114 A1. There is therefore a need for improved anti-counterfeiting techniques for security documents and the like. Hologram laminate and hologram label United States Patent Application 20060193021 Abstract: A hologram laminate allows traces of separation of the hologram to be clearly left on both the adherend and the hologram label and hence makes it possible to prevent re-use of the hologram and is excellent in graphical design function and suitable for certifi cation purposes. A hologram label used for the fabrication of the hologram laminate is also provided. The hologram laminate has a colored layer, a release pattern, a transparent fi lm, a hologram layer and a surface protective layer laminated on an adherend in the order mentioned. The hologram layer includes a volume hologram layer and a relief hologram layer having a transparent thin-fi lm layer over the surface of the relief interference fringe pattern. The volume hologram layer and the relief hologram layer are superimposed so as to be switch able from one to another. The hologram laminate is separable between the adherend and the transparent fi lm. When the hologram is separated, the colored layer is left on the adherend in a pattern corresponding to the release pattern. The hologram label has a release sheet in place of the adherend in the hologram laminate Digitally watermarking holograms for identity documents United States Patent Application 20030210805 Abstract: The present invention relates to digital watermarks integrated into holograms, watermarked hologram structures, and related applications as an authentication technique. One method creates a watermark image, and then embeds the watermark image into a holographic structure. The holographic structure is carried by a smart card. The smart card includes additional information. In one embodiment, the digital watermark includes information bits, and these information bits are used to authenticate the hologram, or the smart card. In another embodiment, the watermark’s information bits are compared with the additional information carried by the smart card. The result of the comparison is used to authenticate the smart card or the hologram. Events & Calendar HOLO-PACK•HOLO-PRINT® 2009 11-13 November 2009, Budapest, Hungary www.holopackholoprint.info LABEL EXPO ASIA 2009 1-4 December 2009, Shanghai www.labelexpo-asia.com PRINTECH 2009 18-21 December 2009, Mumbai www.mmsprintech.com OPTICAL DOCUMENT SECURITY January 20-22, 2010, San Francisco, CA, USA www.opticaldocumentsecurity.com/ 5TH GLOBAL FORUM ON PHARMACEUTICAL ANTICOUNTERFEITING February 24-26, 2010, Miami, FL, USA www.reconnaissance-intl.com PAN-EUROPEAN HIGH SECURITY PRINTING CONFERENCE April 13-15, 2010, Berlin, Germany www.cross-conferences.com Editorial Board Neha Gupta | C S Jeena The Holography Times is published by HOLOGRAM MANUFACTURERS ASSOCIATION OF INDIA (HoMAI) 21-Ground Floor, Devika Tower 6, Nehru Place, New Delhi - 110019, INDIA Telefax: +91-11-4161 7369, Email: cjhomai@gmail.com Web: www.homai.org Designed and Printed by Chandan Kumar connectchandan@gmail.com on behalf of HoMAI Disclaimer: The data used here are from various published and electronically available primary and secondary sources. Despite due diligence the source data may contain occasional errors. In such instances, HoMAI would not be responsible for such errors. 15
  • 16. The Holography Times Industry Updates www.homai.org 16