The Holography Times, October 2009, Volume 3, Issue No 8

16
www.homai.org 1 theholographytimes The journal of hologram industry October 2009 | Vol. 3 | Issue 8 www.homai.org TM The Holography Times is quarterly published by HoMAI. Special Report ALSO: Innovation: Research team designing holographic imaging system for ovarian cancer • UK national ID card unveils • Indian passports to go the e-way • Patent news • Events & calendar & more... Global trends for document security ID Cards Protecting People But WHAT about their protection?

description

ID Cards, protecting people, But what about their protection

Transcript of The Holography Times, October 2009, Volume 3, Issue No 8

Page 1: The Holography Times, October 2009, Volume 3, Issue No 8

www.homai.org

The Holography Times

1

theholographytimesThe journal of hologram industry

October 2009 | Vol. 3 | Issue 8 www.homai.org

TM

The Holography Times is quarterly published by HoMAI.

Special Report

ALSO:Innovation: Research team designing holographic imaging system for ovarian cancer • UK national ID card unveils • Indian passports to go the e-way • Patent news • Events & calendar & more...

Global trends for document security

ID Cards Protecting People

ButWHAT about their protection?

Page 2: The Holography Times, October 2009, Volume 3, Issue No 8

www.homai.org

The Holography Times

2

HolographersTo The Globe

Page 3: The Holography Times, October 2009, Volume 3, Issue No 8

www.homai.org

The Holography Times

We are delighted to share with you our quarterly newsletter, The Holography Times. This is perhaps the best means of staying in touch with the holographic family, where we share with you latest

developments in the Indian and the international holographic industry, learnings from around the world which have future potential and can be applied to your business- where the aim is to establish a connection between the expanding universe of holography and its importance in daily life.

Holography is a fast developing science having enormous impact on the society at large. Worldwide innovations like scientists working on Holographic Imaging Systems to fi ght ovarian cancer are leading to revolutionary changes in our world. In this newsletter we discuss how this imaging instrument contributes to a broader understanding of ovarian cancer - The Silent Killer.

Identity counterfeiting is an increasing global menace that has turned our identities into highly valuable assets. Since being developed over 60 years ago holograms have been the most successful anti-counterfeiting measure in this battle against ID counterfeiting. While the fi rst DOVID appeared on a credit card in 1982 and on a banknote in 1988, in 1985 the fi rst metallized hologram appeared on the passport of Iraq. Here we discuss about the role of a hologram offering protection against forgery of variable information like photograph and personal data and global developments in ID document protection.

The issue talks about how holography is not only protecting identity documents, saving tax revenues but also playing a social part by protecting human lives.

Once again we seek your feedback and valuable advice to take this newsletter and association to greater heights.

Happy reading!

Team HoMAI!

In this issue

d li h d h i h l l Th

Holography :A technology protecting products & lives!

Editorial

Innovation Holographic imaging system for ovarian cancer

4Web Watch 5

News Bytes 6

Company Profi le

9

Patent news related to identity 15documents

Cover StoryGlobal trends for document security

10

3

HolographersTo The Globe

Page 4: The Holography Times, October 2009, Volume 3, Issue No 8

www.homai.org

The Holography Times

Innovation

Two University of Arizona researchers have formed a research team to

design, build and evaluate an ovarian cancer medical imaging and screening instrument that will use holographic components in a new type of optical microscope. By using holograms and merging medical and optical science, researchers Raymond Kostuk and Jennifer K. Barton are developing a way of seeing enough varied depth in ovarian tissue to detect microscopic cancer cells in their earliest stages. This would be a huge advance in the fi ght against an insidious disease that kills most women within fi ve years of diagnosis.

The system will work like a high-powered microscope that can be used to study tissue samples already removed. In addition, an endoscopic version is in the design stage to safely scan the ovaries for cancer during laparoscopic screenings in high-risk women. The system is unique in that it will for the fi rst time project multiple spatial images from different depths within a tissue sample and simultaneously provide spectral information from optical markers in order to better identify cancerous cells.

Raymond Kostuk and Jennifer Barton have secured a fi ve-year; $2.4 million grant from the National Institutes of Health to build the instrument that they hope will one day be used to monitor

women at high risk for ovarian cancer. The grant was issued following the successful two-year development of a prototype system the team built.

During the past 25 years Kostuk has researched different aspects of holography and holographic materials for use as optical elements. The holographic imaging system being designed combines an optical technique that creates images capable of detecting subtle tissue microstructure changes. Together with fl uorescence spectroscopy methods, the system has demonstrated capability for early cancer detection. Another member of the team, UA research professor Marek Romanowski, is working on the development of targeted fl uorescent dyes that will be used on tissue samples to

identify or confi rm suspected cancerous areas shown in the spatial image.

Barton said ovarian cancer provides a compelling case to test holographic imaging and its effi cacy in detecting cancers. At the present time the preferred treatment is surgery, which is also often needed to diagnose ovarian cancer. The procedure includes taking tissue samples, which may threaten the woman’s ability to have children in the future.

The researchers expect to spend the next fi ve years fi ne-tuning a wand-like instrument that’s anticipated to be a “game changer” for medicine if it does what is intended - allow high-risk women to know whether they actually have ovarian cancer before having their

Holographic imaging system for ovarian cancer

Human ovary image captured with the use of the prototype holo-graphic imaging system the team developed.

For comparison, an onion is imaged

with the use of the prototype

system the team developed.

Raymond Kostuk Jennifer Barton

Technology

4

Page 5: The Holography Times, October 2009, Volume 3, Issue No 8

www.homai.org

The Holography TimesTechnology

ovaries removed. “The system will image like an MRI or a CT scan but with much higher resolution than an ultrasonic image and will be a lot less expensive than an MRI. As an additional benefi t no radiation will be used or exposed to sensitive ovary areas during the cancer screenings,” Kostuk said.

The researchers in the future course will do three major things: improve the performance of a prototype of the technology Kostuk and Barton already have developed; package the technology into a laparoscopic system that can be taken into the operating room; and perform a pilot study on women who already are having their ovaries removed. Ultimately, Kostuk and Barton want to help save lives and contribute to a broader understanding of how ovarian cancer progresses. “Our hope is that it would detect it earlier by providing more information,” said Barton, who heads the university’s department of biomedical engineering.

“The Silent Killer “ Ovarian cancer is often called the “silent” killer because many times there are no symptoms until the disease has progressed to an advanced stage.

Ovarian Cancer Facts to KnowFact 1: Ovarian cancer is the leading cause of gynecologic cancer deaths among women.

Fact 2: If diagnosed in its early stage, the chance of survival is 90%.

Fact 3: Only 24 percent of ovarian cancers are diagnosed at an early stage, when the cancer is confi ned to the ovary.

Fact 4. One woman out of every 55 (approximately 1.8 percent) will develop ovarian cancer at some point in her lifetime.

Fact 5. Ovarian cancer is most common in women who have already gone through menopause. The average age for developing ovarian cancer is 61 years old.

Fact 6. For the small number of women who are fortunate enough to have their cancer diagnosed before it has spread beyond the ovary, the chance for recovery is 85 to 90 percent.

Fact 7: The risk for ovarian cancer is greater for women who have never had children, who had their fi rst child at a later time in life or who have a personal history of breast cancer, colorectal cancer or endometrial cancer.

Fact 8. The only sure way to diagnose ovarian cancer is through microscopic examination of abnormal fl uid or tissue, obtained by needle aspiration (withdrawal of fl uid or tissue from a suspicious area though a special, wide needle) or surgery.

Fact 9. Hycamtin is one of the fi rst of a new kind of anti-cancer drugs that kills cancer cells by inhibiting an enzyme essential to the replication of human DNA.

Web watch sectionProtecting vital information is of

utmost importance to companies nowadays, whether it is printed documentation or digital fi les. Thus, here we mention certain websites armed with useful tips on information security and how to safeguard companies from threats and violation of the rights to privacy.

1. Search security asia(www.searchsecurityasia.com)

The goal of this website is to try & prevent, detect, resolve, or repair internet and network security issues in Asia. You can get essential tips on how to protect both the front and back end of your website. You may also check how to secure data through tips, articles, white papers, and case studies that, ironically, spill over information on information security.

2. Computer Security News (www.computersecuritynow.com)The purpose of this website is presenting an almost perfect portal for ISO 17799 Information security. From general information to implementation, this website provides downloadable fi les for your reference like ISO 17799

Toolkit, Security Policies., Security Risk Assessment, and Risk Analysis: How & Why-describes the method and approach on Security Risk and manual for Information Security management. You may also fi nd news on the upgrade of ISO 17799 to ISO 27002.

5

Page 6: The Holography Times, October 2009, Volume 3, Issue No 8

www.homai.org

The Holography Times

The UK government relied on hologram for the protection of their

ID card.

The UK ID card’s image was offi cially unveiled by the Home Secretary Alan Johnson in Manchester in August 2009. This ID card is voluntary for British

citizens and can also be used as a travel document in Europe. The card image shows the information contained on the face of the card, including photograph, name, date of birth and signature, as well as the card’s unique design. It holds similar information to that currently contained in the UK

passport as well as fi ngerprints on a secure electronic chip. This chip will link to a biometric database holding a person’s fi ngerprints and address.

The cards remain a central part of the government’s plans to tighten up Britain’s border controls and clamp down on illegal working. Given the growing problem of identity fraud and the inconvenience of having to carry passports, coupled with gas bills or six months worth of bank statements to prove identity, Mr. Johnson, believes the ID card will be welcomed as an important addition to the many plastic cards that most people already carry. “The fact that it can be used as a passport when traveling in Europe will be an added advantage,” he said.

Over the years the reason for issuing documents has also shifted to being a good proof of age tool. This approach has received the backing of the National Federation of Retailers and Newsagents, whose spokesperson said: “Underage sales are a problem across the UK and we are always looking for new ways for the public, especially those under the age of 18 years old, to prove their identity.”

Source: news.bbc.co.uk

UK national ID card unveils

The UK government relied on hologram for the protection of their ID card.

News Bytes

JDSU, a leading provider of innovative optical solutions for brand

authentication, medical/environmental instrumentation, semiconductor processing, display, etc. has introduced its HoloFuseTM polycarbonate fi lm, a new highly integrated product that helps protect government-issued identity documents such as passports, national identity documents and driver’s licenses against counterfeiting and tampering.

HoloFuse is the fi rst solution that includes a hologram that is integrated into a polycarbonate fi lm without the use of adhesives. This fi lm in turn becomes the clear outer layer of identity documents, helping to

reduce the ability of counterfeiters to separate card layers and tamper with their security. In addition, providing an integrated solution simplifi es the manufacturing process for card and identity document makers.

The partially transparent and customized hologram within the polycarbonate fi lm includes overt, covert and forensic security features that make it diffi cult to reproduce. JDSU’s patented technology also better preserves the hologram, making it brighter and easier to identify.

“The new HoloFuse product is based on JDSU’s years of expertise in optical

science and provides a whole new way to protect the integrity of high security identity documents, while simplifying the manufacturing process for card makers,” said Garth Zambory, Document Authentication product manager for the Advanced Optical Technologies business segment at JDSU.

The polycarbonate material is also more environmentally friendly than plastics typically used for the creation of cards such as PET or PVC. JDSU has fi led a patent for the new solution and expects to be shipping it during the second half of calendar year 2009.

Source: www.jdsu.com

JDSU increases security with holofuse technology

6

Page 7: The Holography Times, October 2009, Volume 3, Issue No 8

www.homai.org

The Holography Times

According to a WHO report, about 16.7% of the total pharma exports

to Nigeria are counterfeit. Following recent apprehensions over sub-standard drugs marketed in Nigeria, the National Agency for Food and Drug Administration and Control (Nafdac) has proposed to set up overseas control points in India and China to verify the quality of all drugs and allied pharmaceutical products sold in Nigeria from these two countries. These check points are expected to have state-of-the-art technologies to check counterfeit on the spot. This is said to be the fi rst initiative to counter fake drug supply in the generic business.

The Nigerian government also plans to bring in lifetime jail term or death penalty for manufacturers and distributors of fake and substandard drugs in Nigeria. “We would sign a memorandum of understanding with the Department of Pharmaceuticals, government of India, on September 30, to put in place a joint regulatory framework for both the countries to check counterfeit drugs,’’ informed Paul B Orhii, director general Nafdac. He

said that about 20 Indian pharmaceutical companies in various categories have expressed interest in setting up manufacturing facilities in Nigeria. The likes of Apollo Pharmacy and Hetero Dugs, which have a wide network of pharmacy outlets in the country, have been approached to set up pharmacies for marketing quality products and dispel fears of sub-standard drugs. Incidentally, Nafdac has had discussions with Torrent Pharma and Ranbaxy for setting up bio-equilance and bio-availability study centres in Nigeria. Nafdac is planning to join hands with the National Institute of Pharmaceutical

Education and Research, Hyderabad, to train its people.

The Nigerian government would give rewards to informers and actively encourage victims to gather evidence that enable us to sue manufacturers and distributors of these deadly products. He also informed that a massive campaign was being drawn up jointly by Nafdac, the Indian government, China and the US to build an international coalition to fi ght counterfeit drugs.

Source: www.fi nancialexpress.com

NAFDAC likely to set up check points for counterfeit drugs

News Bytes

TSSI has acquired a portfolio of patents for specialist volume

and true colour holograms including Biometrigram and HD-3D hologram patents from authentication security technology and consultancy fi rm Ver-tec. The move follows the recent launch of TSSI’s Magnetics Solutions Division, which aims to drive growth across TSSI’s document security and brand protection products.

According to TSSI, counterfeiters are becoming increasingly sophisticated, producing highly realistic ID documents. Additional security measures are therefore required to provide the highest level of protection possible and ensure that ID documents such as passports, ID cards and access cards cannot

be replicated. Hologram technology provides an effective security solution for all identity documents as each hologram is unique making it impossible to imitate.

HD-3D is a true colour hologram, meaning the images always maintain their original colours from any viewing angle, unlike embossed holograms which exhibit a rainbow effect. Each hologram is unique with different serial numbers and/or bar codes, which can also be encrypted for added security.

The Biometrigram, a volume hologram, can store multiple biometrics as well as analogue images and encrypted digital information.

TSSI says these have a higher information density than electronic chips so are ideal for use on ID cards. Each hologram is unique so ensures the correct identity of the document holder and provides an effective security measure in the fi ght against identity fraud.

“Both of these products are a welcome addition to our portfolio of identity and document security offerings. Our customers want top quality security solutions and these new patents will meet this increased demand for fraud proof identity documents,” says Danny Chapchal, executive chairman, TSSI Systems.

Source: www.securitydocumentworld.com

TSSI buys ver-tec patents

7

Page 8: The Holography Times, October 2009, Volume 3, Issue No 8

www.homai.org

The Holography Times

India will shortly switch over to e-passport system, increasingly used

globally to check terrorism using false identity. The government launched its e-passport scheme on Jun. 25 this year, where President Pratibha Patil, Prime Minister Manmohan Singh and Vice President Hamid Ansari were the fi rst ones to receive their biometric passports. E-passports have been issued to diplomats since July this year, but are expected to be extended to all citizens from September next year. The Indian government appears on track to issue some 800,000 e-passports next year and begin piloting its new backend system touted to enable faster delivery of passport services, baring no further delays. Already, 35 countries have shifted to the e-passport system, also called biometric passports, which is an offshoot of the 9/11 attacks in the U.S.

The e-passports are designed to facilitate international travel by allowing automatic identity verifi cation and faster immigration inspections, as well as provide effi cient border protection and security. These would look like an

ordinary passport with an embedded electronic chip. The chip would contain the photograph, fi ngerprint and personal information of the holder so that the passport could not be duplicated. “An e-passport is machine-readable, enabling quick processing at airports. The passport comes with a built-in security (biometric) feature, which comprises an integrated circuit (IC) embedded in the back cover that stores the data, including photo. These also make the passport tamper-proof. In ordinary passports, this data is typically displayed on the photo page.E-passports support a combination of electronic and optical security features including watermark, optically variable device and hologram.

If an e-passport is misused, the immigration checkpoint will be able to detect a mismatch between the printed and digital information, and authorities can take necessary action against the offender.

The International Civil Aviation Organization (ICAO) sets the standards for e-passports that have been

implemented in over 70 countries. Data in the Indian e-passport can be read in other countries as it adheres to the ICAO global standards for biometrics and secure storage of personal data in travel documents.

The Indian government next year will also launch its Passport Seva Project. Implemented by Tata Consultancy Services (TCS) under a build-operate-transfer scheme, the Passport Seva Project entails digitization of the entire passport services. It seeks to deliver all passport-related services to citizens in a timely, transparent, more accessible and reliable manner, through streamlined processes and trained workforce. This US$207.3 million (10 billion rupees) project is part of the government’s National e-Governance Plan (NeGP). Source: www.businessweek.com,www.igovernment.in

Indian passports to go the e-way

News Bytes

Soiled notes may soon be a thing of past with the Reserve Bank of India

(RBI) planning to introduce polymer banknotes whose life span would be four times the normal currency notes and would be diffi cult to imitate. The seizure of large quantities of fake Rs 1,000 and Rs. 500 notes has led the RBI to toy with the idea of replacing paper currency with polymer notes.

As a pilot project, the Central bank is planning to introduce one billion pieces of Rs. 10 polymer notes, for which the bank has fl oated a global tender. The bank has asked interested parties for 500 pieces of sample banknotes, before the actual global bids for the project go through.

Explaining the rationale for the introduction of polymer notes, the offi cial said these notes are extremely diffi cult to counterfeit and have a lifespan of fi ve years compared to paper currency which lasts just one year. They can also be washed, making them more hygienic. Central banks the world over believe that the only sure way to control counterfeiting is through continuous design change and innovation. The polymer notes were fi rst introduced in Australia to safeguard against counterfeiting of currency. Besides Australia, other countries which have introduced plastic notes, include New Zealand, Papua New Guinea, Romania, Bermuda, Brunei and Vietnam.

Going by the increasing incidence detection of fake notes, RBI may consider introduction of higher denomination plastic notes. The RBI had fi rst hinted in 2007 that it may start using plastic notes.

Source: Financial Chronicle, September 2009; India Today, September 2009

RBI plans to print Rs.10 plastic notes

8

Page 9: The Holography Times, October 2009, Volume 3, Issue No 8

www.homai.org

The Holography Times

Holostik India Limited offers security solutions for protection/

authentication of identity documents. Holostik is the leading Security Hologram manufacturer in India, since 1991, and one of the largest manufactures in the world with over 5000 customers in Government, Public and Private sectors. Holostik has all facilities under one roof under high security environment. We supply holographic security solutions to various prestigious government bodies, for identity document protection.

• Holostik has two types of Master Origination machines- Conventional 2D/3D machine and 24000 DPI Dot Matrix master origination machine, which offers ability to produce combination masters with added security.

• Our R&D (master lab) team has developed certain high security features (both overt and covert), which are very diffi cult for other holographers to develop.

• Holostik has an in-house printing facility, which offers up to 8 colour UV printing options on paper and 10 colour printing options on fi lm, providing latest high security features in printing available in the world.

• Our product range includes regular security holograms, paper products incorporating security features, polyester / PVC / other plastics based fi lm products and / or a combination product of one or more of the above substrates with holographic security

There are a number of methods that can be adopted for securitization of identity documents depending on volume of documents to be securitized, method of application and resources available. Thus, Holostik offers security holograms in (i) Pressure sensitive form (ii) Hot Stamping Foil form (iii) Transparent Holography form and (iv) Laminate form, as per customer requirements.

The most common form is to apply Security Hologram on to the existing identity document. This hologram can be affi xed on the document separately or in a manner so that it partially covers the photograph of the bearer. As it is ‘tamper evident’ in nature, any attempt to remove it will result in its destruction. At Holostik we offer, both Pressure sensitive holograms that are affi xed manually and automatically and Hot Stamping Foil based holograms that are affi xed using a Hot Stamping machine, in standard and customised shapes. Pressure sensitive security hologram can be of Transparent / Semi-Transparent type. Another method is to use pre-printed identity document having holographic strip running through. In this method, Holostik prints the required identity document and applies a strip of security hologram as per design. This method does not require hologram handling at the end user, rather only printing of the individual card details. The use of a security strip offers a larger area and is also visually appealing. In the

two forms of application discussed above, the fi nal document can be used as is basis or can be further laminated within a pouch. The use of pouch adds another layer of security & also enhances life of the document.

Holostik offers a third option which combines benefi ts of tamper evident transparent security holography with transparent laminated holographic pouch, offering high security with fl exibility of use. Customer needs to print data on to the document type, paste photographs etc & then place document in the pouch and pass it through a pouch laminator. The end product protected by the laminated pouch, it has see-through holographic features through out the fascia, is tamper evident, visually appealing and easy to authenticate, making it is easy to protect, securitize and authenticate identity documents.

Holostik provides tailor made solutions for the I.D. Cards depending on the customer’s requirement i.e. security solutions, semi high security solutions and high security solutions. But, we always incorporate certain security features in all of the above three categories so that it becomes extremely diffi cult for counterfeiters to copy.

Today, many of the important and sensitive documents worldwide are protected using our tailor made security products. What ever be the customers’ need, Holostik can provide the right solution because of its rigorous R&D and wide exposure, experience in holography and allied products. Just allow us to become your ‘Security Partner’ to help you in securing your products and we assure of your complete satisfaction.

For any queries/assistance, feel free to contact us at [email protected].

9

HolographersTo The Globe

Company Profi le

Page 10: The Holography Times, October 2009, Volume 3, Issue No 8

www.homai.org

The Holography Times

Identity is an integral part of the Human subsystem. All livings being struggle for their unique identity in the universe- It may be in the form of knowledge, Power or Wealth. In ordinary language, one can use the word “identity” to refer to characteristics

or attributes that cannot naturally be expressed in terms of a social category. However, realizing its importance, worldwide all governments keep their Citizen in easy and quick access identity formats.

But today, Identity counterfeiting is a growing global menace that has turned our identities into highly valuable assets. The potential risks associated with fake identifi cation documents can be high. With a fake identity, an individual can potentially gain illegitimate access, qualify for government benefi ts, defraud credit companies or make illegal purchases. Even though today’s card printing technology delivers superior image quality and exceptional card durability at a surprisingly affordable cost, but with forgery and counterfeiting now a serious issue, what defense mechanism are solution providers putting in place to protect the end users?

This article outlines how to reduce the risk of counterfeiting with latest document security trends, paying particular attention to a system combining the most effective features.

Identity Cards:

ID Cards were introduced during the First World War as part of a statutory registration scheme. It ended in 1919. They were introduced in 1939 and remained in force for several years after the war until they were abolished by Churchill in 1952. Today, around a hundred countries have offi cial, compulsory, national IDs that are used for variety of purposes.

In India, the recent national Unique Identifi cation (UID) project launched by the Government of India, with the iconic technocrat, Mr. Nandan Nilekani at its helm is indeed a signifi cant project. With this, India has embarked on an ambitious e-governance project which targets to provide a unique number to each citizen.

Authentication

In this era of heightened security concerns, we are keenly aware of the role that ID Documents, or credentials, play in our lives. Whether a driver’s license, passport, social security number, Unique Identity

number, etc. these documents are used routinely not only to verify a person’s identity but can also be used to protect rights to privacy, wealth and security.

Today, governments worldwide are using e-Governance methods and realizing that national security has profound effects on the economy and our way of life. To optimize these issues, a diversity of security features is available. A brief overview of the most widely used features is given below.

Commonly used security features

Most people would agree that secure identifi cation begins with a photo ID card, the most representative of which is the driver’s license. While a good photo likeness and a legible signature remain the key features of a photo ID card, those features alone are inadequate today. Issuing authorities now incorporate several additional features to deter counterfeiting, while at the same time making authentication easier and more reliable.

The identity of a physical object is uniquely determined by a set of distinctive properties. Most ID cards are fabricated today by direct printing on composite CR-80 cards comprising layers of cross-oriented polyester with outer layers of PVC. Once printed, a tough 0.001” (1 mil) thick polyester laminate is typically applied to protect both sides of the card.

After the process, companies used a variety of integrated security features, which can be classifi ed mainly into three categories visible, invisible and forensic. Finally, there are machine-readable magnetic stripes, bar codes and programmable devices (smart cards) that can provide even more security, plus the means for automatic data checking and database connectivity.

Level 1 (Overt features)

These are “fi rst line” validation features, i.e. they can be seen without the use of equipment or special devices. The most frequently encountered Level 1 device is a High Refractive Index (HRI) hologram printed on either the card or, more

Cover Story

Global trends for document security

10

Page 11: The Holography Times, October 2009, Volume 3, Issue No 8

www.homai.org

The Holography Times

commonly for drivers’ licenses, on the underside of the protective laminate. Recently developed de-metallization and photo polymer holographic techniques now offer enhanced depth, transparency, and fi ne line detail which most would acknowledge being practically counterfeit-proof.

Level 2 (Covert features)

Level 2 features are verifi able by simple, inexpensive tests such as visual inspection under a lens or black light (UV), biometric scanning, digital scanning and data base checking. Examples of Level 2 features include: specialized bar codes, micro-printing, and

covert background printing that is incorporated in the card design.

Level 3 (Forensic features)

The majority of these must be kept secret to remain useful. Analysis of a card having Level 3 features is essentially a post-mortem process, often requiring some dismembering of the card to determine its origin, and to minutely inspect the features for validity. Level 3 devices are images or physical objects that are hidden within the card structure or concealed by special graphic effects on the card surface. Typically, they can be fully validated only by specialized optical scanning devices, or other means of machine-reading data.

SOLUTIONS TO IMPROVE SECURITY OF ID’S- ADDING EXTRA SECURITY

ID card security comes from a combination of features inherent to the card media (like overt, covert and forensic), together with variable features printed at the time of issuance. To add security, growing use is made of security features with integrated personal data.

a) UV-Ink Personalization

One example is on-demand UV ink personalization, which allows cardholder’s photograph or personal data to be printed in high-resolution gradient UV ink. Pre-printed features are very diffi cult to duplicate. User defi ned text, with deliberate random font changes and misspelling if desired, may be micro-printed as an added security features. Character height of the micro-printing is fi ve thousand of an inch. Other printed security choices include Guilloche patterns, serial numbering and micro-graphics.

b) Holographic Laminate

Since their use in 1989, holograms were historically hard to copy; they were used to provide cloning resistance to products. Holographic laminate may be used to extend the useful life of a card while simultaneously protecting it against data manipulation. To combat document tampering and counterfeiting, the holographic industry is developing and implementing new security features such as nano-text and images (very small text and graphics including entire city maps) created using special diffractive techniques. Other enhanced diffractive methods also exist. Figure 1: Security features in currently release UK National ID Card

Cover Story

11

Page 12: The Holography Times, October 2009, Volume 3, Issue No 8

www.homai.org

The Holography Times

c) Holographic Personalization Technology (HPT)

Database verifi cation is an important element of ID card. To secure this, a more recent trend is to combine holographic laminates with personal data, photos and other information. One example is Identigram, as found on the German ID Card and e-passport. HPT allows unique or generic diffractive images to be coated on a card surface. The images incorporate unique optical effects that are extremely diffi cult to counterfeit.

Think, for example, of the card holder’s photo, biographic data, a logo, symbols, a coat of arms or a combination thereof. This technology, which is also available for desktop personalization, allows a much wider range of diffractive optical images to be designed, this effectively adding an additional level of security to ID cards.

d) Holographic Biometrics Security

The security of card can also be enhanced by encrypting and storing (biographic data) on high-capacity chips, possibly in combination with biometrics. Given the limited space available on an ID cad, especially compared to passport, the use of electronic ID cards- or – eIDs – likely to increase. Moreover, eIDs

can be used for various e-business and e-governance applications, including online banking, shopping, and user registration and with implementation of government schemes. In this system, the holographic photopolymer is laminated to the plastic card, either as a strip or patch. It is laminated with a refl ective layer and protected against wear of tampering. The designated biometric (e.g. an iris scan or fi ngerprint) is captured in the normal way (cameras, fi ngerprint scanner, etc), then encoded using a code mask.

e) Enhanced Security with Laser Engraving

A growing number of industry participants are calling for laser engraving technology to be used on a broader scale. Laser engraving

Cover Story

Figure 3: German ID card using HPT

Figure 2: Lamination Security features

12

Page 13: The Holography Times, October 2009, Volume 3, Issue No 8

www.homai.org

The Holography Times

involves ‘burning’ data into the substrate of an ID card or polycarbonate biographic data page. The data may consist of text, images and graphics (including security features such as micro text).

As such, laser engraving is a technology rather than a security feature. The actual security is derived from the application method used. If properly applied, laser engraving provides protection against alteration and reproduction. In fact, laser engraving provides unsurpassed security. The application of heat (in the form of a laser beam) creates a chemical reaction inside the core of the card, causing molecules to move to the surface. The resultant characters or images are virtually impossible to modify - any attempt to alter or remove laser engraved data invariably destroys the substrate surface. Another advantage of laser engraving is that the data does not fade or deteriorate due to UV light or surface abrasion.

f) Advanced Laser Engraving

Laser engraving facilitates the creation of Multiple Laser Images (MLI) and

Changeable Laser Images (CLI), which cannot be produced using other technologies. The process used to integrate CLI/MLI images into the card body is highly specialised. CLI/MLI images are similar to holograms in that alternate images are produced, albeit using direct laser engraving. The alternate

images are positioned close to each other and engraved at different angles. In contrast with holograms, CLI/MLI data forms an integral yet unique part of the card body (it is applied during personalisation). CLI/MLI allows personal data to be engraved on individual cards. Think, for example, of the document ID number or expiration date in combination with non-standard ‘fl ipping’ images of the cardholder’s photograph or signature. As the data cannot be copied or tampered, advanced laser engraving offers an additional level of security. It also creates a much higher entry barrier for counterfeiters compared with other personalisation techniques. The result is a highly tamper-resistant card.

g) Creating Uniform Security Standards:

With the lack of consistent standards across identifi cation documents today, it is often diffi cult to give reasonable assurance of a given document’s authenticity. For e.g. MasterCard and Visa addressed the counterfeiting problem by mandating a uniform security feature in the form of a hot stamped hologram in the same place

on each card, while leaving the rest of the design up to the discretion of the member banks. This resulted in a dramatic reduction in the incidence of credit card counterfeiting. This solution works because each layer of the security chain: consumer, issuer and law enforcement offi cial alike, know where and what to look for to authenticate a given card.

In the end, no single security feature is able to provide adequate protection. Instead, security is optimized if several features are combined.

A clear laminate can be used to extend the card’s life. If the laminate also contains holographic images, security is improved at the same time. Holographic laminate is therefore highly recommended for national IDs.

ConclusionImproving the security of identity documents is a matter of urgent national security. Most identity documents in use today were not designed as secure documents, and there are no uniform security standards in place to assist the public and law enforcement in the recognition of genuine versus counterfeit identity documents. Government should understand that counterfeiters will attempt to counterfeit the least secure document.

Although no-one can stop a counterfeiter from trying to modify or copy a document, the right combination of security features and technologies make it impossible for him to be successful. These security features must be practical for document issuers to implement, easy for the public to recognize and provide specifi c identifying features for law enforcement and forensic investigators.

Cover Story

Figure 4: Phenostar, a holographic photopolymer storage medium for plastic cards, invented by Bayer Material Science

13

Page 14: The Holography Times, October 2009, Volume 3, Issue No 8

www.homai.org

The Holography TimesIndustry Updates

14

Page 15: The Holography Times, October 2009, Volume 3, Issue No 8

www.homai.org

The Holography Times

Patents related to identity documentsSecurity Hologram for Identity Document

United States Patent Application 20090051986 (This invention relates to improved techniques for using holograms to provide security for documents and the like.)

Abstract: Overlaying a security document such as a driving license or passport with a hologram, which is diffi cult to copy, can afford additional security value. For example in the British passport document, embossed holography has been used in the form of a translucent thin layer coated on its reverse side with a layer of material such as zinc sulphide, whose refractive index is signifi cantly higher than the carrier. Thus light is refl ected from the interface in such a way as to reconstruct the holographic image, whilst permitting the viewer to see simultaneously, printed matter behind the holographic fi lm.

The idea is that an attempt to remove the covering layer will result in destruction of the document but in practice one of the most common forms of passport/ID forgery is where the protective laminate is lifted off, allowing the print underneath to be tampered with or the laminate to be reused on other documents. Background prior art can be found in EP 0 754 987A, WO 2006/077447 A2, U.S. Pat. Nos. 4,971,646A, 5,834,096 A and US 2006/0289114 A1. There is therefore a need for improved anti-counterfeiting techniques for security documents and the like.

Hologram laminate and hologram label

United States Patent Application 20060193021

Abstract: A hologram laminate allows traces of separation of the hologram to be clearly left on both the adherend and the hologram label and hence makes it possible to prevent re-use of the hologram

and is excellent in graphical design function and suitable for certifi cation purposes. A hologram label used for the fabrication of the hologram laminate is also provided. The hologram laminate has a colored layer, a release pattern, a transparent fi lm, a hologram layer and a surface protective layer laminated on an adherend in the order mentioned. The hologram layer includes a volume hologram layer and a relief hologram layer having a transparent thin-fi lm layer over the surface of the relief interference fringe pattern. The volume hologram layer and the relief hologram layer are superimposed so as to be switch able from one to another. The hologram laminate is separable between the adherend and the transparent fi lm. When the hologram is separated, the colored layer is left on the adherend in a pattern corresponding to the release pattern. The hologram label has a release sheet in place of the adherend in the hologram laminate

Digitally watermarking holograms for identity documents

United States Patent Application 20030210805

Abstract: The present invention relates to digital watermarks integrated into holograms, watermarked hologram structures, and related applications as an authentication technique. One method creates a watermark image, and then embeds the watermark image into a holographic structure. The holographic structure is carried by a smart card. The smart card includes additional information. In one embodiment, the digital watermark includes information bits, and these information bits are used to authenticate the hologram, or the smart card. In another embodiment, the watermark’s information bits are compared with the additional information carried by the smart card. The result of the comparison is used to authenticate the smart card or the hologram.

Events & CalendarHOLO-PACK•HOLO-PRINT® 2009

11-13 November 2009, Budapest, Hungarywww.holopackholoprint.info

LABEL EXPO ASIA 20091-4 December 2009, Shanghai

www.labelexpo-asia.com

PRINTECH 200918-21 December 2009, Mumbai

www.mmsprintech.com

OPTICAL DOCUMENT SECURITYJanuary 20-22, 2010, San Francisco, CA, USA

www.opticaldocumentsecurity.com/

5TH GLOBAL FORUM ON PHARMACEUTICAL ANTICOUNTERFEITING

February 24-26, 2010, Miami, FL, USAwww.reconnaissance-intl.com

PAN-EUROPEAN HIGH SECURITY PRINTING CONFERENCE

April 13-15, 2010, Berlin, Germanywww.cross-conferences.com

Editorial Board

Neha Gupta | C S Jeena

The Holography Times is published by

HOLOGRAM MANUFACTURERS ASSOCIATION OF INDIA (HoMAI)

21-Ground Floor, Devika Tower 6, Nehru Place, New Delhi - 110019, INDIA

Telefax: +91-11-4161 7369, Email: [email protected]

Web: www.homai.org

Designed and Printed byChandan Kumar

[email protected] behalf of HoMAI

Disclaimer: The data used here are from various published and electronically available primary and secondary sources. Despite due diligence the source data may contain occasional errors. In such instances, HoMAI would not be responsible for such errors.

15

Page 16: The Holography Times, October 2009, Volume 3, Issue No 8

www.homai.org

The Holography TimesIndustry Updates

16