Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,098,306 papers from all fields of science
Search
Sign In
Create Free Account
Security hologram
Known as:
Security holograms
Security holograms are labels with a hologram printed onto it for sale security reasons. Security holograms are very difficult to forge because they…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Broader (1)
Holography
Kinebar
Rainbow hologram
Security printing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The device for automated quality inspection and authentication of security holograms
V. Kolyuchkin
,
S. Odinokov
,
V. Talalaev
,
I. Tsyganov
,
V. Cheburkanov
,
E. Zlokazov
Photonics Europe
2018
Corpus ID: 65445846
Security holograms are widely used for anti-counterfeiting of banknotes, documents and consumer products. The development of…
Expand
2012
2012
Beam shaping optics to improve holographic and interferometric nanomanufacturing techniques
A. Laskin
,
V. Laskin
2012
Corpus ID: 51784772
Performance of various holographic and interferometric nanomanufacturing techniques can be essentially improved by homogenizing…
Expand
2005
2005
Simulation, registration, and reconstruction of digital holograms of arbitrary objects by means of liquid crystal on silicon spatial light modulator
A. Michalkiewicz
,
M. Kujawińska
,
R. Lymarenko
,
O. Budnyk
,
Xingua Wang
,
P. Bos
SPIE Optics + Optoelectronics
2005
Corpus ID: 109956371
Each hologram: optical, digital and computer generated represents the phase and amplitude of an object. Therefore the process of…
Expand
2004
2004
Designing security holograms
R. James
,
Michael Long
,
D. Newcomb
IS&T/SPIE Electronic Imaging
2004
Corpus ID: 62201491
Over the years, holograms have evolved from purely decorative images to bona fide security devices. During this evolution, highly…
Expand
2004
2004
Interferometry based security hologram readable with an encoded key hologram
A. Aggarwal
,
S. Kaura
,
A. Sharma
,
Raj Kumar
,
D. P. Chhachhia
2004
Corpus ID: 99920876
A simple and cost-effective method for making security holograms has been presented, which incorporates holographic…
Expand
2004
2004
Visual hologram security
P. Stepien
,
Roman Stachowiak
Other Conferences
2004
Corpus ID: 62164710
Visual features of classical and high-tech security holograms are described and their advantages and shortbacks discussed. New…
Expand
2003
2003
Security Holograms Readable with an Encoded Key Hologram
S. Kaura
,
D. P. Chhachhia
,
A. Sharma
,
A. Aggarwal
2003
Corpus ID: 54934447
A simple and cost effective two-step method for making security holograms, which are readable with an encoded key hologram, has…
Expand
2003
2003
Optical encryption and decryption in security-volume holograms
Wei-Chia Su
,
Ching-Cherng Sun
,
Yueh Ouyang
SPIE Optics + Photonics
2003
Corpus ID: 60985218
An optical security holographic memory encrypted by a random phase key and decrypted by a holographic key (a holographic optical…
Expand
2002
2002
Holographic applications of As-S-Se inorganic resist
S. A. Kostyukevych
,
M. Vlcek
,
+4 authors
E. Venger
International Conference on Correlation Optics
2002
Corpus ID: 135990862
The present paper is concerned with the investigation of imaging properties of As-S-Se media in application for fabrication of…
Expand
1999
1999
Computer-generated fractal kinetic images and their applications in security holograms
Hanqiang Cao
,
G. Zhu
,
Yaoting Zhu
,
Zhaoqun Zhang
,
Hongwei Ge
,
Xuan Li
Electronic imaging
1999
Corpus ID: 121444825
In this paper, we propose a new kind of fractal kinetic hologram using fractal hypercomplex model for security purposes. The…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE