The Holography Times, Vol 3, Issue 8

download The Holography Times, Vol 3, Issue 8

of 16

Transcript of The Holography Times, Vol 3, Issue 8

  • 8/6/2019 The Holography Times, Vol 3, Issue 8

    1/16

    www.homai.org

    The Holography Times

    1

    theholographytimesThe journal of hologram industry

    October 2009 | Vol. 3 | Issue 8 www.homai.org

    TM

    The Holography Times is quarterly published by HoMAI.

    Special Report

    ALSO:

    Innovation: Research team designingholographic imaging system for ovarian

    cancer UK national ID card unveils Indianpassports to go the e-way Patent news Events & calendar & more...

    Global trends fordocument security

    ID CardsProtecting People

    But

    WHATabout theirprotection?

  • 8/6/2019 The Holography Times, Vol 3, Issue 8

    2/16

    www.homai.org

    The Holography Times

    2

    Holographers

    To The Globe

  • 8/6/2019 The Holography Times, Vol 3, Issue 8

    3/16

    www.homai.org

    The Holography Times

    W

    e are delighted to share with you our quarterly newsletter, The

    Holography Times. This is perhaps the best means of staying in

    touch with the holographic family, where we share with you latestdevelopments in the Indian and the international holographic industry, learnings

    from around the world which have future potential and can be applied to your

    business- where the aim is to establish a connection between the expanding

    universe of holography and its importance in daily life.

    Holography is a fast developing science having enormous impact on the society

    at large. Worldwide innovations like scientists working on Holographic Imaging

    Systems to fight ovarian cancer are leading to revolutionary changes in our

    world. In this newsletter we discuss how this imaging instrument contributes

    to a broader understanding of ovarian cancer - The Silent Killer.

    Identity counterfeiting is an increasing global menace that has turned our

    identities into highly valuable assets. Since being developed over 60 years ago

    holograms have been the most successful anti-counterfeiting measure in this

    battle against ID counterfeiting. While the first DOVID appeared on a credit

    card in 1982 and on a banknote in 1988, in 1985 the first metallized hologram

    appeared on the passport of Iraq. Here we discuss about the role of a hologram

    offering protection against forgery of variable information like photograph and

    personal data and global developments in ID document protection.

    The issue talks about how holography is not only protecting identity documents,

    saving tax revenues but also playing a social part by protecting human lives.

    Once again we seek your feedback and valuable advice to take this newsletter

    and association to greater heights.

    Happy reading!

    Team HoMAI!

    In this issueHolography :

    A technology protectingproducts & lives!

    Editorial

    Innovation

    Holographic imagingsystem forovarian cancer

    4Web Watch 5

    News Bytes 6

    Company Profile

    9

    Patent news related to identity 15documents

    Cover Story

    Global trends for

    document security

    10

    3

    Holographers

    To The Globe

  • 8/6/2019 The Holography Times, Vol 3, Issue 8

    4/16

    www.homai.org

    The Holography Times

    Innovation

    Two University of Arizona researchershave formed a research team todesign, build and evaluate an ovarian

    cancer medical imaging and screening

    instrument that will use holographic

    components in a new type of optical

    microscope. By using holograms and

    merging medical and optical science,

    researchers Raymond Kostuk and

    Jennifer K. Barton are developing a

    way of seeing enough varied depth in

    ovarian tissue to detect microscopic

    cancer cells in their earliest stages.

    This would be a huge advance in the

    fight against an insidious disease that

    kills most women within five years of

    diagnosis.

    The system will work like a high-

    powered microscope that can be used to

    study tissue samples already removed. In

    addition, an endoscopic version is in thedesign stage to safely scan the ovaries for

    cancer during laparoscopic screenings

    in high-risk women. The system is

    unique in that it will for the first time

    project multiple spatial images from

    different depths within a tissue sample

    and simultaneously provide spectral

    information from optical markers in

    order to better identify cancerous cells.

    Raymond Kostuk and Jennifer Barton

    have secured a five-year; $2.4 million

    grant from the National Institutes of

    Health to build the instrument that they

    hope will one day be used to monitor

    women at high risk for ovarian cancer.

    The grant was issued following the

    successful two-year development of a

    prototype system the team built.

    During the past 25 years Kostuk

    has researched different aspects of

    holography and holographic materials

    for use as optical elements. The

    holographic imaging system being

    designed combines an optical technique

    that creates images capable of

    detecting subtle tissue microstructure

    changes. Together with fluorescence

    spectroscopy methods, the system

    has demonstrated capability for early

    cancer detection. Another member

    of the team, UA research professor

    Marek Romanowski, is working on the

    development of targeted fluorescent dyes

    that will be used on tissue samples to

    identify or confirm suspected cancerous

    areas shown in the spatial image.

    Barton said ovarian cancer provides

    a compelling case to test holographic

    imaging and its efficacy in detecting

    cancers. At the present time the preferred

    treatment is surgery, which is also often

    needed to diagnose ovarian cancer. The

    procedure includes taking tissue samples,which may threaten the womans ability

    to have children in the future.

    The researchers expect to spend the

    next five years fine-tuning a wand-

    like instrument thats anticipated to

    be a game changer for medicine if it

    does what is intended - allow high-risk

    women to know whether they actually

    have ovarian cancer before having their

    Holographic imaging system for ovarian cancer

    Human ovary

    image captured

    with the use of

    the prototype

    holo-graphic

    imaging system

    the team

    developed.

    For comparison,

    an onion is imaged

    with the use of

    the prototype

    system the team

    developed.

    Raymond Kostuk Jennifer Barton

    Technology

    4

  • 8/6/2019 The Holography Times, Vol 3, Issue 8

    5/16

    www.homai.org

    The Holography TimesTechnology

    ovaries removed. The system

    will image like an MRI or a

    CT scan but with much higher

    resolution than an ultrasonic

    image and will be a lot less

    expensive than an MRI. As an

    additional benefit no radiation

    will be used or exposed to

    sensitive ovary areas during

    the cancer screenings, Kostuk

    said.

    The researchers in the future

    course will do three major things:

    improve the performance of

    a prototype of the technology

    Kostuk and Barton already

    have developed; package thetechnology into a laparoscopic

    system that can be taken into

    the operating room; and perform

    a pilot study on women who

    already are having their ovaries

    removed. Ultimately, Kostuk

    and Barton want to help save

    lives and contribute to a broader

    understanding of how ovarian

    cancer progresses. Our hope is

    that it would detect it earlier by

    providing more information,said Barton, who heads the

    universitys department of

    biomedical engineering.

    The Silent Killer Ovarian cancer is often called the silent killer because many times there are no symptomsuntil the disease has progressed to an advanced stage.

    Ovarian Cancer Facts to KnowFact 1: Ovarian cancer is the leading cause of gynecologic cancer deaths among women.

    Fact 2: If diagnosed in its early stage, the chance of survival is 90%.

    Fact 3: Only 24 percent of ovarian cancers are diagnosed at an early stage, when the cancer isconfined to the ovary.

    Fact 4. One woman out of every 55 (approximately 1.8 percent) will develop ovarian cancer atsome point in her lifetime.

    Fact 5. Ovarian cancer is most common in women who have already gone through menopause.The average age for developing ovarian cancer is 61 years old.

    Fact 6. For the small number of women who are fortunate enough to have their cancer diagnosedbefore it has spread beyond the ovary, the chance for recovery is 85 to 90 percent.

    Fact 7: The risk for ovarian cancer is greater for women who have never had children, who hadtheir first child at a later time in life or who have a personal history of breast cancer,colorectal cancer or endometrial cancer.

    Fact 8. The only sure way to diagnose ovarian cancer is through microscopic examination ofabnormal fluid or tissue, obtained by needle aspiration (withdrawal of fluid or tissue froma suspicious area though a special, wide needle) or surgery.

    Fact 9. Hycamtin is one of the first of a new kind of anti-cancer drugs that kills cancer cells byinhibiting an enzyme essential to the replication of human DNA.

    Web watch section

    Protecting vital information is ofutmost importance to companiesnowadays, whether it is printed

    documentation or digital files. Thus, here

    we mention certain websites armed with

    useful tips on information security and

    how to safeguard companies from threats

    and violation of the rights to privacy.

    1. Search security asia

    (www.searchsecurityasia.com)

    The goal of this website is to try & prevent,

    detect, resolve, or repair internet and

    network security issues in Asia. You can

    get essential tips on how to protect both

    the front and back end of your website.

    You may also check how to secure data

    through tips, articles, white papers, and

    case studies that, ironically, spill over

    information on information security.

    2. Computer Security News

    (www.computersecuritynow.com)The purpose of this website is presenting

    an almost perfect portal for ISO 17799

    Information security. From general

    information to implementation, thiswebsite provides downloadable files

    for your reference like ISO 17799

    Toolkit, Security Policies., Security

    Risk Assessment, and Risk Analysis:How & Why-describes the method and

    approach on Security Risk and manual

    for Information Security management.

    You may also find news on the upgrade

    of ISO 17799 to ISO 27002.

    5

  • 8/6/2019 The Holography Times, Vol 3, Issue 8

    6/16

    www.homai.org

    The Holography Times

    T

    he UK government relied on

    hologram for the protection of their

    ID card.

    The UK ID cards image was officially

    unveiled by the Home Secretary Alan

    Johnson in Manchester in August 2009.

    This ID card is voluntary for British

    citizens and can also be used as a travel

    document in Europe. The card image

    shows the information contained

    on the face of the card, including

    photograph, name, date of birth and

    signature, as well as the cards unique

    design. It holds similar information

    to that currently contained in the UK

    passport as well as fingerprints on a

    secure electronic chip. This chip will

    link to a biometric database holding a

    persons fingerprints and address.

    The cards remain a central part of

    the governments plans to tighten up

    Britains border controls and clamp

    down on illegal working. Given the

    growing problem of identity fraud and

    the inconvenience of having to carry

    passports, coupled with gas bills or six

    months worth of bank statements to

    prove identity, Mr. Johnson, believes

    the ID card will be welcomed as animportant addition to the many plastic

    cards that most people already carry.

    The fact that it can be used as a passport

    when traveling in Europe will be an

    added advantage, he said.

    Over the years the reason for issuing

    documents has also shifted to being a

    good proof of age tool. This approach

    has received the backing of the National

    Federation of Retailers and Newsagents,

    whose spokesperson said: Underagesales are a problem across the UK and

    we are always looking for new ways for

    the public, especially those under the age

    of 18 years old, to prove their identity.

    Source: news.bbc.co.uk

    UK national ID card unveils

    The UK government relied on hologram for the protection of their ID card.

    News Bytes

    J

    DSU, a leading provider ofinnovative optical solutions for brand

    authentication, medical/environmentalinstrumentation, semiconductorprocessing, display, etc. has introducedits HoloFuseTM polycarbonate film,a new highly integrated product thathelps protect government-issued identitydocuments such as passports, nationalidentity documents and drivers licensesagainst counterfeiting and tampering.

    HoloFuse is the first solution that

    includes a hologram that is integrated

    into a polycarbonate film without

    the use of adhesives. This film in

    turn becomes the clear outer layer

    of identity documents, helping to

    reduce the ability of counterfeiters to

    separate card layers and tamper with

    their security. In addition, providingan integrated solution simplifies themanufacturing process for card andidentity document makers.

    The partially transparent and customizedhologram within the polycarbonatefilm includes overt, covert and forensicsecurity features that make it difficultto reproduce. JDSUs patentedtechnology also better preserves the

    hologram, making it brighter and

    easier to identify.

    The new HoloFuse product is basedon JDSUs years of expertise in optical

    science and provides a whole new wayto protect the integrity of high securityidentity documents, while simplifyingthe manufacturing process for cardmakers, said Garth Zambory, DocumentAuthentication product manager for theAdvanced Optical Technologies businesssegment at JDSU.

    The polycarbonate material is also moreenvironmentally friendly than plasticstypically used for the creation of cardssuch as PET or PVC. JDSU has filed apatent for the new solution and expectsto be shipping it during the second halfof calendar year 2009.

    Source: www.jdsu.com

    JDSU increases security with holofuse technology

    6

  • 8/6/2019 The Holography Times, Vol 3, Issue 8

    7/16

    www.homai.org

    The Holography Times

    A

    ccording to a WHO report, about

    16.7% of the total pharma exports

    to Nigeria are counterfeit. Followingrecent apprehensions over sub-

    standard drugs marketed in Nigeria, the

    National Agency for Food and Drug

    Administration and Control (Nafdac)

    has proposed to set up overseas control

    points in India and China to verify

    the quality of all drugs and allied

    pharmaceutical products sold in Nigeria

    from these two countries. These check

    points are expected to have state-of-the-

    art technologies to check counterfeit

    on the spot. This is said to be the firstinitiative to counter fake drug supply in

    the generic business.

    The Nigerian government also plans

    to bring in lifetime jail term or

    death penalty for manufacturers and

    distributors of fake and substandard

    drugs in Nigeria. We would sign a

    memorandum of understanding with

    the Department of Pharmaceuticals,

    government of India, on September

    30, to put in place a joint regulatory

    framework for both the countries to

    check counterfeit drugs, informed Paul

    B Orhii, director general Nafdac. He

    said that about 20 Indian pharmaceutical

    companies in various categories

    have expressed interest in setting up

    manufacturing facilities in Nigeria. The

    likes of Apollo Pharmacy and Hetero

    Dugs, which have a wide network of

    pharmacy outlets in the country, have

    been approached to set up pharmacies

    for marketing quality products and

    dispel fears of sub-standard drugs.

    Incidentally, Nafdac has had discussions

    with Torrent Pharma and Ranbaxy

    for setting up bio-equilance and bio-

    availability study centres in Nigeria.

    Nafdac is planning to join hands with

    the National Institute of Pharmaceutical

    Education and Research, Hyderabad, to

    train its people.

    The Nigerian government would give

    rewards to informers and actively

    encourage victims to gather evidence

    that enable us to sue manufacturers and

    distributors of these deadly products. He

    also informed that a massive campaign

    was being drawn up jointly by Nafdac,

    the Indian government, China and the

    US to build an international coalition

    to fight counterfeit drugs.

    Source: www.financialexpress.com

    NAFDAC likely to set up check points for counterfeit drugs

    News Bytes

    TSSI has acquired a portfolio ofpatents for specialist volumeand true colour holograms including

    Biometrigram and HD-3D hologram

    patents from authentication securitytechnology and consultancy firm

    Ver-tec. The move follows the recent

    launch of TSSIs Magnetics Solutions

    Division, which aims to drive growth

    across TSSIs document security and

    brand protection products.

    According to TSSI, counterfeiters are

    becoming increasingly sophisticated,

    producing highly realistic ID documents.

    Additional security measures are

    therefore required to provide the highest

    level of protection possible and ensurethat ID documents such as passports,

    ID cards and access cards cannot

    be replicated. Hologram technology

    provides an effective security solution

    for all identity documents as each

    hologram is unique making it impossible

    to imitate.

    HD-3D is a true colour hologram,

    meaning the images always maintain

    their original colours from any

    viewing angle, unlike embossed

    holograms which exhibit a rainbow

    effect. Each hologram is unique with

    different serial numbers and/or bar

    codes, which can also be encrypted for

    added security.

    The Biometrigram, a volume

    hologram, can store multiple

    biometrics as well as analogue images

    and encrypted digital information.

    TSSI says these have a higher

    information density than electronic

    chips so are ideal for use on ID cards.

    Each hologram is unique so ensures the

    correct identity of the document holderand provides an effective security

    measure in the fight against identity

    fraud.

    Both of these products are a welcome

    addition to our portfolio of identity

    and document security offerings. Our

    customers want top quality security

    solutions and these new patents will

    meet this increased demand for fraud

    proof identity documents, says Danny

    Chapchal, executive chairman, TSSI

    Systems.

    Source: www.securitydocumentworld.com

    TSSI buys ver-tec patents

    7

  • 8/6/2019 The Holography Times, Vol 3, Issue 8

    8/16

    www.homai.org

    The Holography Times

    India will shortly switch over to e-

    passport system, increasingly usedglobally to check terrorism using false

    identity. The government launched

    its e-passport scheme on Jun. 25 this

    year, where President Pratibha Patil,

    Prime Minister Manmohan Singh and

    Vice President Hamid Ansari were

    the first ones to receive their biometric

    passports. E-passports have been issued

    to diplomats since July this year, but are

    expected to be extended to all citizens

    from September next year. The Indian

    government appears on track to issue

    some 800,000 e-passports next year

    and begin piloting its new backend

    system touted to enable faster delivery

    of passport services, baring no further

    delays. Already, 35 countries have

    shifted to the e-passport system, also

    called biometric passports, which is an

    offshoot of the 9/11 attacks in the U.S.

    The e-passports are designed to

    facilitate international travel by allowing

    automatic identity verification and

    faster immigration inspections, as wellas provide efficient border protection

    and security. These would look like an

    ordinary passport with an embedded

    electronic chip. The chip would containthe photograph, fingerprint and personal

    information of the holder so that the

    passport could not be duplicated. An

    e-passport is machine-readable, enabling

    quick processing at airports. The passport

    comes with a built-in security (biometric)

    feature, which comprises an integrated

    circuit (IC) embedded in the back cover

    that stores the data, including photo.

    These also make the passport tamper-

    proof. In ordinary passports, this data is

    typically displayed on the photo page.

    E-passports support a combination of

    electronic and optical security features

    including watermark, optically

    variable device and hologram.

    If an e-passport is misused, the

    immigration checkpoint will be able to

    detect a mismatch between the printed

    and digital information, and authorities

    can take necessary action against the

    offender.

    The International Civil AviationOrganization (ICAO) sets the standards

    for e-passports that have been

    implemented in

    over 70 countries.Data in the Indian e-

    passport can be read

    in other countries

    as it adheres to the

    ICAO global standards

    for biometrics and

    secure storage of personal data in travel

    documents.

    The Indian government next year will

    also launch its Passport Seva Project.

    Implemented by Tata Consultancy

    Services (TCS) under a build-operate-

    transfer scheme, the Passport Seva

    Project entails digitization of the entire

    passport services. It seeks to deliver all

    passport-related services to citizens in a

    timely, transparent, more accessible and

    reliable manner, through streamlined

    processes and trained workforce. This

    US$207.3 million (10 billion rupees)

    project is part of the governments

    National e-Governance Plan (NeGP).

    Source: www.businessweek.com,www.igovernment.in

    Indian passports to go the e-way

    News Bytes

    Soiled notes may soon be a thing ofpast with the Reserve Bank of India(RBI) planning to introduce polymer

    banknotes whose life span would be

    four times the normal currency notes

    and would be difficult to imitate. The

    seizure of large quantities of fake Rs

    1,000 and Rs. 500 notes has led the

    RBI to toy with the idea of replacing

    paper currency with polymer notes.

    As a pilot project, the Central bank is

    planning to introduce one billion pieces

    of Rs. 10 polymer notes, for which the

    bank has floated a global tender. The bank

    has asked interested parties for 500 pieces

    of sample banknotes, before the actualglobal bids for the project go through.

    Explaining the rationale for the

    introduction of polymer notes, the

    official said these notes are extremely

    difficult to counterfeit and have a

    lifespan of five years compared to

    paper currency which lasts just one

    year. They can also be washed, making

    them more hygienic. Central banks the

    world over believe that the only sure

    way to control counterfeiting is through

    continuous design change and innovation.

    The polymer notes were first introduced

    in Australia to safeguard against

    counterfeiting of currency. Besides

    Australia, other countries which have

    introduced plastic notes, include New

    Zealand, Papua New Guinea, Romania,Bermuda, Brunei and Vietnam.

    Going by the increasing incidence

    detection of fake notes, RBI may consider

    introduction of higher denomination

    plastic notes. The RBI had first hinted

    in 2007 that it may start using plastic

    notes.

    Source: Financial Chronicle, September

    2009; India Today, September 2009

    RBI plans to print Rs.10 plastic notes

    8

  • 8/6/2019 The Holography Times, Vol 3, Issue 8

    9/16

    www.homai.org

    The Holography Times

    Holostik India Limited offerssecurity solutions for protection/authentication of identity documents.Holostik is the leading SecurityHologram manufacturer in India,since 1991, and one of the largestmanufactures in the world with over5000 customers in Government,

    Public and Private sectors. Holostikhas all facilities under one roof underhigh security environment. We supplyholographic security solutions tovarious prestigious government bodies,for identity document protection.

    Holostik has two types ofMaster Origination machines-Conventional 2D/3D machineand 24000 DPI Dot Matrixmaster origination machine,

    which offers ability to producecombination masters with addedsecurity.

    Our R&D (master lab) team hasdeveloped certain high securityfeatures (both overt and covert),which are very difficult for otherholographers to develop.

    Holostik has an in-house printingfacility, which offers up to 8colour UV printing options onpaper and 10 colour printingoptions on film, providing latesthigh security features in printingavailable in the world.

    Our product range includesregular security holograms, paperproducts incorporating securityfeatures, polyester / PVC / otherplastics based film products and /

    or a combination product of oneor more of the above substrateswith holographic security

    There are a number of methods thatcan be adopted for securitizationof identity documents dependingon volume of documents to besecuritized, method of application andresources available. Thus, Holostikoffers security holograms in

    (i) Pressure sensitive form (ii)Hot Stamping Foil form (iii)

    Transparent Holography form and

    (iv) Laminate form, as per customerrequirements.

    The most common form is to applySecurity Hologram on to the existingidentity document. This hologramcan be affixed on the documentseparately or in a manner so that it

    partially covers the photograph ofthe bearer. As it is tamper evidentin nature, any attempt to removeit will result in its destruction. AtHolostik we offer, both Pressuresensitive holograms that are affixedmanually and automatically and HotStamping Foil based hologramsthat are affixed using a Hot Stampingmachine, in standard and customisedshapes. Pressure sensitive securityhologram can be of Transparent /Semi-Transparent type.Another method is to use pre-printed identity document havingholographic strip running through.In this method, Holostik prints therequired identity document andapplies a strip of security hologramas per design. This method does notrequire hologram handling at theend user, rather only printing of the

    individual card details. The use ofa security strip offers a larger areaand is also visually appealing. In the

    two forms of application discussed

    above, the final document can be

    used as is basis or can be further

    laminated within a pouch. The

    use of pouch adds another layer ofsecurity & also enhances life of thedocument.

    Holostik offers a third option whichcombines benefits of tamper evidenttransparent security holography withtransparent laminated holographicpouch, offering high security withflexibility of use. Customer needs toprint data on to the document type,paste photographs etc & then place

    document in the pouch and pass itthrough a pouch laminator. The endproduct protected by the laminatedpouch, it has see-through holographicfeatures through out the fascia, istamper evident, visually appealingand easy to authenticate, makingit is easy to protect, securitize andauthenticate identity documents.

    Holostik provides tailor made

    solutions for the I.D. Cards dependingon the customers requirement i.e.security solutions, semi high securitysolutions and high security solutions.But, we always incorporate certainsecurity features in all of the abovethree categories so that it becomesextremely difficult for counterfeitersto copy.

    Today, many of the important and

    sensitive documents worldwide are

    protected using our tailor madesecurity products. What ever bethe customers need, Holostik canprovide the right solution because ofits rigorous R&D and wide exposure,experience in holography and alliedproducts. Just allow us to becomeyour Security Partner to help you insecuring your products and we assureof your complete satisfaction.

    For any queries/assistance, feel free

    to contact us at

    [email protected].

    9

    Holographers

    To The Globe

    Company Profile

  • 8/6/2019 The Holography Times, Vol 3, Issue 8

    10/16

    www.homai.org

    The Holography Times

    Identity is an integral part of the Human subsystem. All livings being struggle for their unique identity in the universe- It may bein the form of knowledge, Power or Wealth. In ordinary language, one can use the word identity to refer to characteristicsor attributes that cannot naturally be expressed in terms of a social category. However, realizing its importance, worldwide allgovernments keep their Citizen in easy and quick access identity formats.

    But today, Identity counterfeiting is a growing global menace that has turned our identities into highly valuable assets. Thepotential risks associated with fake identification documents can be high. With a fake identity, an individual can potentially gainillegitimate access, qualify for government benefits, defraud credit companies or make illegal purchases. Even though todayscard printing technology delivers superior image quality and exceptional card durability at a surprisingly affordable cost, but withforgery and counterfeiting now a serious issue, what defense mechanism are solution providers putting in place to protect theend users?

    This article outlines how to reduce the risk of counterfeiting with latest document security trends, paying particular attention toa system combining the most effective features.

    Identity Cards:

    ID Cards were introduced during the

    First World War as part of a statutory

    registration scheme. It ended in 1919.

    They were introduced in 1939 and

    remained in force for several years

    after the war until they were abolishedby Churchill in 1952. Today, around

    a hundred countries have official,

    compulsory, national IDs that are

    used for variety of purposes.

    In India, the recent national Unique

    Identification (UID) project launched

    by the Government of India, with

    the iconic technocrat, Mr. Nandan

    Nilekani at its helm is indeed a

    significant project. With this, Indiahas embarked on an ambitious

    e-governance project which targets

    to provide a unique number to each

    citizen.

    Authentication

    In this era of heightened security

    concerns, we are keenly aware

    of the role that ID Documents, or

    credentials, play in our lives.Whethera drivers license, passport, social

    security number, Unique Identity

    number, etc. these documents are

    used routinely not only to verify a

    persons identity but can also be

    used to protect rights to privacy,

    wealth and security.

    Today, governments worldwide are

    using e-Governance methods andrealizing that national security has

    profound effects on the economy

    and our way of life. To optimize

    these issues, a diversity of security

    features is available. A brief

    overview of the most widely used

    features is given below.

    Commonly used security

    features

    Most people would agree that secure

    identification begins with a photo

    ID card, the most representative of

    which is the drivers license. While

    a good photo likeness and a legible

    signature remain the key features

    of a photo ID card, those features

    alone are inadequate today. Issuing

    authorities now incorporate

    several additional features to deter

    counterfeiting, while at the sametime making authentication easier

    and more reliable.

    The identity of a physical object

    is uniquely determined by a set of

    distinctive properties. Most ID cards

    are fabricated today by direct printing

    on composite CR-80 cards comprising

    layers of cross-oriented polyester with

    outer layers of PVC. Once printed, a

    tough 0.001 (1 mil) thick polyesterlaminate is typically applied to protect

    both sides of the card.

    After the process, companies used

    a variety of integrated security

    features, which can be classified

    mainly into three categories visible,

    invisible and forensic. Finally,

    there are machine-readable magnetic

    stripes, bar codes and programmable

    devices (smart cards) that can provideeven more security, plus the means for

    automatic data checking and database

    connectivity.

    Level 1 (Overt features)

    These are first line validation

    features, i.e. they can be seen

    without the use of equipment or

    special devices. The most frequently

    encountered Level 1 device is a HighRefractive Index (HRI) hologram

    printed on either the card or, more

    Cover Story

    Global trends for document security

    10

  • 8/6/2019 The Holography Times, Vol 3, Issue 8

    11/16

    www.homai.org

    The Holography Times

    commonly for drivers licenses,

    on the underside of the protective

    laminate. Recently developed de-

    metallization and photo polymer

    holographic techniques now offerenhanced depth, transparency, and

    fine line detail which most would

    acknowledge being practically

    counterfeit-proof.

    Level 2 (Covert features)

    Level 2 features are verifiable by

    simple, inexpensive tests such

    as visual inspection under a lens

    or black light (UV), biometricscanning, digital scanning and data

    base checking. Examples of Level

    2 features include: specialized

    bar codes, micro-printing, and

    covert background printing that is

    incorporated in the card design.

    Level 3 (Forensic features)

    The majority of these must be kept

    secret to remain useful. Analysis

    of a card having Level 3 features is

    essentially a post-mortem process,

    often requiring some dismembering

    of the card to determine its origin, and

    to minutely inspect the features for

    validity. Level 3 devices are images

    or physical objects that are hidden

    within the card structure or concealed

    by special graphic effects on the cardsurface. Typically, they can be fully

    validated only by specialized optical

    scanning devices, or other means of

    machine-reading data.

    SOLUTIONS TO IMPROVE

    SECURITY OF IDS- ADDING

    EXTRA SECURITY

    ID card security comes from a

    combination of features inherent to

    the card media (like overt, covert

    and forensic), together with variable

    features printed at the time of

    issuance. To add security, growing

    use is made of security features with

    integrated personal data.

    a) UV-Ink Personalization

    One example is on-demand UV

    ink personalization, which allows

    cardholders photograph or personal

    data to be printed in high-resolution

    gradient UV ink. Pre-printed features

    are very difficult to duplicate. User

    defined text, with deliberate random

    font changes and misspelling if

    desired, may be micro-printed as an

    added security features. Character

    height of the micro-printing is five

    thousand of an inch. Other printed

    security choices include Guilloche

    patterns, serial numbering and micro-

    graphics.

    b) Holographic Laminate

    Since their use in 1989, holograms

    were historically hard to copy;

    they were used to provide cloning

    resistance to products. Holographic

    laminate may be used to extend

    the useful life of a card while

    simultaneously protecting it

    against data manipulation. To

    combat document tampering and

    counterfeiting, the holographic

    industry is developing and

    implementing new security features

    such as nano-text and images (very

    small text and graphics including

    entire city maps) created using

    special diffractive techniques. Otherenhanced diffractive methods also

    exist.Figure 1: Security features in currently release UK National ID Card

    Cover Story

    11

  • 8/6/2019 The Holography Times, Vol 3, Issue 8

    12/16

    www.homai.org

    The Holography Times

    c) Holographic Personalization

    Technology (HPT)

    Database verification is an important

    element of ID card. To secure this,

    a more recent trend is to combine

    holographic laminates with personal

    data, photos and other information.

    One example is Identigram, as

    found on the German ID Card and

    e-passport. HPT allows unique orgeneric diffractive images to be

    coated on a card surface. The images

    incorporate unique optical effects that

    are extremely difficult to counterfeit.

    Think, for example, of the card

    holders photo, biographic data,

    a logo, symbols, a coat of arms

    or a combination thereof. This

    technology, which is also available

    for desktop personalization, allows

    a much wider range of diffractive

    optical images to be designed, this

    effectively adding an additional level

    of security to ID cards.

    d) Holographic Biometrics

    Security

    The security of card can also be

    enhanced by encrypting and storing

    (biographic data) on high-capacity

    chips, possibly in combination with

    biometrics. Given the limited space

    available on an ID cad, especially

    compared to passport, the use ofelectronic ID cards- or eIDs

    likely to increase. Moreover, eIDs

    can be used for various e-business

    and e-governance applications,

    including online banking,

    shopping, and user registration

    and with implementation of

    government schemes. In this system,

    the holographic photopolymer is

    laminated to the plastic card, either

    as a strip or patch. It is laminated

    with a reflective layer and protected

    against wear of tampering. The

    designated biometric (e.g. an iris

    scan or fingerprint) is captured in

    the normal way (cameras, fingerprint

    scanner, etc), then encoded using a

    code mask.

    e) Enhanced Security with

    Laser Engraving

    A growing number of industry

    participants are calling for laserengraving technology to be used on

    a broader scale. Laser engraving

    Cover Story

    Figure 3: German ID card using HPT

    Figure 2: Lamination Security features

    12

  • 8/6/2019 The Holography Times, Vol 3, Issue 8

    13/16

    www.homai.org

    The Holography Times

    involves burning data into

    the substrate of an ID card or

    polycarbonate biographic data

    page. The data may consist of text,

    images and graphics (including

    security features such as micro

    text).

    As such, laser engraving is a

    technology rather than a securityfeature. The actual security is derived

    from the application method used.

    If properly applied, laser engraving

    provides protection against alteration

    and reproduction. In fact, laser

    engraving provides unsurpassed

    security. The application of heat (in

    the form of a laser beam) creates a

    chemical reaction inside the core

    of the card, causing molecules to

    move to the surface. The resultantcharacters or images are virtually

    impossible to modify - any attempt

    to alter or remove laser engraved

    data invariably destroys the substrate

    surface. Another advantage of laser

    engraving is that the data does not

    fade or deteriorate due to UV light or

    surface abrasion.

    f) Advanced Laser Engraving

    Laser engraving facilitates the creation

    of Multiple Laser Images (MLI) and

    Changeable Laser

    Images (CLI),

    which cannot be

    produced using

    other technologies.The process used

    to integrate CLI/

    MLI images into

    the card body is

    highly specialised.

    CLI/MLI images

    are similar to

    holograms in that

    alternate images

    are produced,

    albeit using directlaser engraving.

    The alternate

    images are positioned close to each

    other and engraved at different angles.

    In contrast with holograms, CLI/MLI

    data forms an integral yet unique part

    of the card body (it is applied during

    personalisation). CLI/MLI allows

    personal data to be engraved on

    individual cards. Think, for example,

    of the document ID number or

    expiration date in combination with

    non-standard flipping images of the

    cardholders photograph or signature.

    As the data cannot be copied or

    tampered, advanced laser engraving

    offers an additional level of security.

    It also creates a much higher entry

    barrier for counterfeiters compared

    with other personalisation techniques.

    The result is a highly tamper-resistant

    card.

    g) Creating Uniform Security

    Standards:

    With the lack of consistent standards

    across identification documents today,

    it is often difficult to give reasonable

    assurance of a given documents

    authenticity. For e.g. MasterCard and

    Visa addressed the counterfeiting

    problem by mandating a uniformsecurity feature in the form of a hot

    stamped hologram in the same place

    on each card, while leaving the rest

    of the design up to the discretion of

    the member banks. This resulted in a

    dramatic reduction in the incidence

    of credit card counterfeiting. Thissolution works because each layer of

    the security chain: consumer, issuer

    and law enforcement official alike,

    know where and what to look for to

    authenticate a given card.

    In the end, no single security feature

    is able to provide adequate protection.

    Instead, security is optimized if several

    features are combined.

    A clear laminate can be used to

    extend the cards life. If the laminate

    also contains holographic images,

    security is improved at the same time.

    Holographic laminate is therefore

    highly recommended for national

    IDs.

    ConclusionImproving the security of identity

    documents is a matter of urgentnational security. Most identity

    documents in use today were not

    designed as secure documents,

    and there are no uniform security

    standards in place to assist the

    public and law enforcement in the

    recognition of genuine versus

    counterfeit identity documents.

    Government should understand

    that counterfeiters will attempt

    to counterfeit the least secure

    document.

    Although no-one can stop a

    counterfeiter from trying to modify

    or copy a document, the right

    combination of security features

    and technologies make it impossible

    for him to be successful. These

    security features must be practical

    for document issuers to implement,

    easy for the public to recognize and

    provide specific identifying featuresfor law enforcement and forensic

    investigators.

    Cover Story

    Figure 4: Phenostar, a holographic photopolymer storagemedium for plastic cards, invented by Bayer Material Science

    13

  • 8/6/2019 The Holography Times, Vol 3, Issue 8

    14/16

    www.homai.org

    The Holography TimesIndustry Updates

    14

  • 8/6/2019 The Holography Times, Vol 3, Issue 8

    15/16

    www.homai.org

    The Holography Times

    Patents related to identity documents

    Security Hologram for Identity

    Document

    United States Patent Application

    20090051986 (This invention relates

    to improved techniques for using

    holograms to provide security for

    documents and the like.)

    Abstract: Overlaying a security document

    such as a driving license or passport with

    a hologram, which is difficult to copy,

    can afford additional security value. For

    example in the British passport document,embossed holography has been used in

    the form of a translucent thin layer coated

    on its reverse side with a layer of material

    such as zinc sulphide, whose refractive

    index is significantly higher than the

    carrier. Thus light is reflected from the

    interface in such a way as to reconstruct

    the holographic image, whilst permitting

    the viewer to see simultaneously, printed

    matter behind the holographic film.

    The idea is that an attempt to remove thecovering layer will result in destruction

    of the document but in practice one of

    the most common forms of passport/ID

    forgery is where the protective laminate

    is lifted off, allowing the print underneath

    to be tampered with or the laminate to be

    reused on other documents. Background

    prior art can be found in EP 0 754

    987A, WO 2006/077447 A2, U.S. Pat.

    Nos. 4,971,646A, 5,834,096 A and US

    2006/0289114 A1. There is therefore a

    need for improved anti-counterfeiting

    techniques for security documents andthe like.

    Hologram laminate and

    hologram label

    United States Patent Application

    20060193021

    Abstract: A hologram laminate allows

    traces of separation of the hologram to

    be clearly left on both the adherend andthe hologram label and hence makes it

    possible to prevent re-use of the hologram

    and is excellent in graphical design

    function and suitable for certificationpurposes. A hologram label used for the

    fabrication of the hologram laminate is

    also provided. The hologram laminate

    has a colored layer, a release pattern, a

    transparent film, a hologram layer and

    a surface protective layer laminated on

    an adherend in the order mentioned.

    The hologram layer includes a volume

    hologram layer and a relief hologram

    layer having a transparent thin-film layer

    over the surface of the relief interference

    fringe pattern. The volume hologram

    layer and the relief hologram layer are

    superimposed so as to be switch able from

    one to another. The hologram laminate is

    separable between the adherend and the

    transparent film. When the hologram is

    separated, the colored layer is left on the

    adherend in a pattern corresponding to the

    release pattern. The hologram label has a

    release sheet in place of the adherend in

    the hologram laminate

    Digitally watermarking

    holograms for identity

    documents

    United States Patent Application

    20030210805

    Abstract: The present invention relates

    to digital watermarks integrated into

    holograms, watermarked hologram

    structures, and related applications as an

    authentication technique. One method

    creates a watermark image, and thenembeds the watermark image into a

    holographic structure. The holographic

    structure is carried by a smart card.

    The smart card includes additional

    information. In one embodiment, the

    digital watermark includes information

    bits, and these information bits are used

    to authenticate the hologram, or the

    smart card. In another embodiment,

    the watermarks information bits are

    compared with the additional information

    carried by the smart card. The result of

    the comparison is used to authenticate the

    smart card or the hologram.

    Events & CalendarHOLO-PACKHOLO-PRINT 2009

    11-13 November 2009, Budapest, Hungary

    www.holopackholoprint.info

    LABEL EXPO ASIA 2009

    1-4 December 2009, Shanghaiwww.labelexpo-asia.com

    PRINTECH 2009

    18-21 December 2009, Mumbaiwww.mmsprintech.com

    OPTICAL DOCUMENT SECURITY

    January 20-22, 2010, San Francisco, CA, USAwww.opticaldocumentsecurity.com/

    5TH GLOBAL FORUM ON PHARMACEUTICAL

    ANTICOUNTERFEITINGFebruary 24-26, 2010, Miami, FL, USAwww.reconnaissance-intl.com

    PAN-EUROPEAN HIGH SECURITY PRINTING

    CONFERENCE

    April 13-15, 2010, Berlin, Germanywww.cross-conferences.com

    Editorial Board

    Neha Gupta | C S Jeena

    The Holography Times is published by

    HOLOGRAM MANUFACTURERS

    ASSOCIATION OF INDIA (HoMAI)

    21-Ground Floor, Devika Tower 6, Nehru Place,New Delhi - 110019, INDIA

    Telefax: +91-11-4161 7369,Email: [email protected]

    Web: www.homai.org

    Designed and Printed byChandan Kumar

    [email protected] behalf of HoMAI

    Disclaimer: The data used here are from various

    published and electronically available primary and

    secondary sources. Despite due diligence the source

    data may contain occasional errors. In such instances,

    HoMAI would not be responsible for such errors.

    15

  • 8/6/2019 The Holography Times, Vol 3, Issue 8

    16/16

    The Holography TimesIndustry Updates