1. Use of Computer-Generated Holograms in Security Hologram Applications
- Author
-
Bulanovs, A., Bakanas, Ramūnas, Institute of Physical Energetics, and De Gruyter
- Subjects
Computer science ,business.industry ,Physics ,QC1-999 ,General Engineering ,Holography ,protective holograms ,General Physics and Astronomy ,digital holography ,01 natural sciences ,law.invention ,010309 optics ,Optics ,diffractive optical elements ,law ,0103 physical sciences ,010306 general physics ,business ,Digital holography ,ComputingMethodologies_COMPUTERGRAPHICS - Abstract
The article discusses the use of computer-generated holograms (CGHs) for the application as one of the security features in the relief-phase protective holograms. An improved method of calculating CGHs is presented, based on ray-tracing approach in the case of interference of parallel rays. Software is developed for the calculation of multilevel phase CGHs and their integration in the application of security holograms. Topology of calculated computer-generated phase holograms was recorded on the photoresist by the optical greyscale lithography. Parameters of the recorded microstructures were investigated with the help of the atomic-force microscopy (AFM) and scanning electron microscopy (SEM) methods. The results of the research have shown highly protective properties of the security elements based on CGH microstructures. In our opinion, a wide use of CGHs is very promising in the structure of complex security holograms for increasing the level of protection against counterfeit.
- Published
- 2016
- Full Text
- View/download PDF