Advertisement

Structuring and Securing Data with Holography—A Holistic Interdisciplinary Approach

  • Cornelia DenzEmail author
Chapter

Abstract

Holography is known on the one hand as an optical technique to realize full three-dimensional images of objects, being as well versatile and beautiful. On the other hand, holography can also be employed for data storage, thereby allowing to implement novel and highly secure data encryption techniques. Combining three-dimensional storage and data encryption in a single hologram is especially suited for applications where delicate items need to be protected from forgery as luxury goods, counterfeit notes, or tax or customs declarations. It is this latter area of holographic document safety that attracts the interest and is a vital research field of physicists, information scientists and information systems scientists. In this contribution, I will describe pioneering work in this field of holographic security marking for international fraud protection.

Keywords

Holographic data storage Digital data security Forgery and counterfeit protection 

References

  1. Ashley, J., et al. (2000). Holographic data storage technology. IBM Journal of Research and Development, 44(3), 341–368.CrossRefGoogle Scholar
  2. Benton, S. A. (1969). Hologram reconstruction with extended incoherent sources. Journal of Optical Society, 59, 1545–1546.Google Scholar
  3. Benton, S. A. (1975). Rainbow hologram on film in card mount. Retrieved September 23, 2018, from http://holocenter.org/what-is-holography.
  4. Brewster, D. (1856). The stereoscope. Retrieved September 23, 2018, from https://blogs.ethz.ch/digital-collections/2009/11/04/david-brewster-the-stereoscope-london-1856/.
  5. Chandler, N. (2015). How real 3-D works. Retrieved September 23, 2018, from https://entertainment.howstuffworks.com/reald-3-d.htm.
  6. Coufal, H. J., Psaltis, D., & Sincerbox, G. T. (Eds.). (2000). Holographic data storage. Berlin, Heidelberg: Springer.Google Scholar
  7. CPP Studios GmbH. (2018). Cheoptics. Retrieved September 23, 2018, from http://www.vizoo.com/web/de/cheoptics360/.
  8. Curtis, K., Dhar, L., Hill, A., Wilson, W., & Ayres, M. (2010). Holographic data storage: From theory to practical systems. Chichester: Wiley.CrossRefGoogle Scholar
  9. Denz, C. (1999a). Datenspeicher im Zuckerwürfelformat: Hologramme als Alternative zur konventionellen Datenspeicherung. Expressis Verbis, 4, 47–49.Google Scholar
  10. Denz, C. (1999b). Volumenhologramme-Datenspeicher der Zukunft. Physikalische Blätter, 55(4), 41–45.CrossRefGoogle Scholar
  11. Denz, C., Dellwig, T., Lembcke, J., & Tschudi, T. T. (1996). Parallel optical image addition and subtraction in a dynamic photorefractive memory by phase-code multiplexing. Optics Letter, 21(4), 278–280.CrossRefGoogle Scholar
  12. Denz, C., Müller, K.-O., Visinka, F., Berger, G., & Tschudi, T. T. (2000). Beyond volume holographic storage: Applications of phase-coded multiplexing to image processing and encryption. In Proceedings of SPIE 4110, Photorefractive Fiber and Crystal Devices: Materials, Optical Properties, and Applications VI (pp. 254–261). San Diego, CA, USA.Google Scholar
  13. Denz, C., Pauliat, G., Roosen, G., & Tschudi, T. T. (1991). Volume hologram multiplexing using a deterministic phase encoding method. Optics Communications, 85(2–3), 171–176.CrossRefGoogle Scholar
  14. Europol. (2017). 2017 Situation report on counterfeiting and piracy in the European union.Google Scholar
  15. Heanue, J. F., Bashaw, M. C., & Hesselink, L. (1994). Volume holographic storage and retrieval of digital data. Science, 265(5173), 749–752.CrossRefGoogle Scholar
  16. Johnston, S. F. (2004). Stephen Benton on holography, polaroid and MIT. Optics & Photonics News, 15(8), 32–35.CrossRefGoogle Scholar
  17. Lauterborn, W., & Kurz, T. (1993). Coherent optics, fundamentals and applications. Heidelberg: Springer.Google Scholar
  18. Leith, E., & Upathnieks, J. (1964). Hologram. Retrieved September 23, 2018, from http://www.holophile.com/html/history.htm.
  19. Perry, T. S. (2014). Digital actors go beyond the uncanny valley. Retrieved September 23, 2018, from https://spectrum.ieee.org/computing/software/digital-actors-go-beyond-the-uncanny-valley.
  20. Psaltis, D., & Burr, G. W. (1998). Holographic data storage. Computer, 31(2), 52–60.CrossRefGoogle Scholar
  21. Su, W.-C., & Sun, C.-C. (2012). Review of random phase encoding in volume holographic storage. Materials, 5(9), 1635–1653.CrossRefGoogle Scholar
  22. Tesa scribos GmbH. (2018). Tesa VeoMark as a safety product label. Retrieved September 23, 2018, from www.tesa-scribos.com/deu/sicherheitstechnologien/tesa_veomark.
  23. Wheatstone, C. (1838). Contributions to the physiology of vision.—Part the first. On some remarkable, and hitherto unobserved, phenomena of binocular vision. Philosophical Transactions of the Royal Society of London, 128(1), 371–394.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.University of MünsterMünsterGermany

Personalised recommendations