2016
DOI: 10.1515/lpts-2016-0036
|View full text |Cite
|
Sign up to set email alerts
|

Use of Computer-Generated Holograms in Security Hologram Applications

Abstract: The article discusses the use of computer-generated holograms (CGHs) for the application as one of the security features in the relief-phase protective holograms. An improved method of calculating CGHs is presented, based on ray-tracing approach in the case of interference of parallel rays.Software is developed for the calculation of multilevel phase CGHs and their integration in the application of security holograms. Topology of calculated computer-generated phase holograms was recorded on the photoresist by … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Therefore, in the common understanding of holography is best known as a method of generating three-dimensional images. Both hologram technique and 3D optical illusion (commonly known as a hologram) are applied inter alia in education 51 – 54 ; medicine 55 58 , biotechnological sciences and industry 59 – 61 , marketing 62 – 65 , microscopy 66 , 67 , protection equipment 68 , 69 , and holographic cinema, television 70 .…”
Section: Literature Reviewmentioning
confidence: 99%
“…Therefore, in the common understanding of holography is best known as a method of generating three-dimensional images. Both hologram technique and 3D optical illusion (commonly known as a hologram) are applied inter alia in education 51 – 54 ; medicine 55 58 , biotechnological sciences and industry 59 – 61 , marketing 62 – 65 , microscopy 66 , 67 , protection equipment 68 , 69 , and holographic cinema, television 70 .…”
Section: Literature Reviewmentioning
confidence: 99%