Structuring and Securing Data with Holography—A Holistic Interdisciplinary Approach
Holography is known on the one hand as an optical technique to realize full three-dimensional images of objects, being as well versatile and beautiful. On the other hand, holography can also be employed for data storage, thereby allowing to implement novel and highly secure data encryption techniques. Combining three-dimensional storage and data encryption in a single hologram is especially suited for applications where delicate items need to be protected from forgery as luxury goods, counterfeit notes, or tax or customs declarations. It is this latter area of holographic document safety that attracts the interest and is a vital research field of physicists, information scientists and information systems scientists. In this contribution, I will describe pioneering work in this field of holographic security marking for international fraud protection.
KeywordsHolographic data storage Digital data security Forgery and counterfeit protection
- Benton, S. A. (1969). Hologram reconstruction with extended incoherent sources. Journal of Optical Society, 59, 1545–1546.Google Scholar
- Benton, S. A. (1975). Rainbow hologram on film in card mount. Retrieved September 23, 2018, from http://holocenter.org/what-is-holography.
- Brewster, D. (1856). The stereoscope. Retrieved September 23, 2018, from https://blogs.ethz.ch/digital-collections/2009/11/04/david-brewster-the-stereoscope-london-1856/.
- Chandler, N. (2015). How real 3-D works. Retrieved September 23, 2018, from https://entertainment.howstuffworks.com/reald-3-d.htm.
- Coufal, H. J., Psaltis, D., & Sincerbox, G. T. (Eds.). (2000). Holographic data storage. Berlin, Heidelberg: Springer.Google Scholar
- CPP Studios GmbH. (2018). Cheoptics. Retrieved September 23, 2018, from http://www.vizoo.com/web/de/cheoptics360/.
- Denz, C. (1999a). Datenspeicher im Zuckerwürfelformat: Hologramme als Alternative zur konventionellen Datenspeicherung. Expressis Verbis, 4, 47–49.Google Scholar
- Denz, C., Müller, K.-O., Visinka, F., Berger, G., & Tschudi, T. T. (2000). Beyond volume holographic storage: Applications of phase-coded multiplexing to image processing and encryption. In Proceedings of SPIE 4110, Photorefractive Fiber and Crystal Devices: Materials, Optical Properties, and Applications VI (pp. 254–261). San Diego, CA, USA.Google Scholar
- Europol. (2017). 2017 Situation report on counterfeiting and piracy in the European union.Google Scholar
- Lauterborn, W., & Kurz, T. (1993). Coherent optics, fundamentals and applications. Heidelberg: Springer.Google Scholar
- Leith, E., & Upathnieks, J. (1964). Hologram. Retrieved September 23, 2018, from http://www.holophile.com/html/history.htm.
- Perry, T. S. (2014). Digital actors go beyond the uncanny valley. Retrieved September 23, 2018, from https://spectrum.ieee.org/computing/software/digital-actors-go-beyond-the-uncanny-valley.
- Tesa scribos GmbH. (2018). Tesa VeoMark as a safety product label. Retrieved September 23, 2018, from www.tesa-scribos.com/deu/sicherheitstechnologien/tesa_veomark.
- Wheatstone, C. (1838). Contributions to the physiology of vision.—Part the first. On some remarkable, and hitherto unobserved, phenomena of binocular vision. Philosophical Transactions of the Royal Society of London, 128(1), 371–394.Google Scholar