2 research outputs found

    Computer-Generated Holograms Application in Security Printing

    No full text
    In the present article the application of computer-generated holograms in security printing was considered. The main subject was creation of informative memory marks based on CGH for automatic read out of the information embedded in this marks that can be used for identification, copyrighting, or other types of authentication control of security elements. The fundamental theoretical basics of computer-generated holograms and its applications were given. The proposed technical solutions, such as “Printed hologram”, “Smart verification”, and “Holomemory”, were considered in detail. The announced solutions were presented in the schemes of interaction between manufacturers of security printing and its potential consumers—citizens and regulatory government agencies

    Computer-Generated Holograms Application in Security Printing

    No full text
    In the present article the application of computer-generated holograms in security printing was considered. The main subject was creation of informative memory marks based on CGH for automatic read out of the information embedded in this marks that can be used for identification, copyrighting, or other types of authentication control of security elements. The fundamental theoretical basics of computer-generated holograms and its applications were given. The proposed technical solutions, such as “Printed hologram”, “Smart verification”, and “Holomemory”, were considered in detail. The announced solutions were presented in the schemes of interaction between manufacturers of security printing and its potential consumers—citizens and regulatory government agencies
    corecore