Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Holograms: The Very Image of the War on ID Counterfeiting

By Ed Dietrich
February 1, 2008
Holographics is an approach that provides higher security, according to Ed Dietrich.


The counterfeiting of passports, green cards, driver’s licenses and other forms of ID is a multi-million dollar global criminal activity with major implications for national security – and one that is regarded as a key challenge by those agencies tasked with tackling it.

However, despite the scale of the problem, the emergence of sophisticated hologram technology over the last 60 years – including holograms, whose effects could not (and still cannot) be replicated or simulated by normal reprographic methods – is playing a seminal part in the battle to thwart counterfeiters.

The first products to feature holograms as an anti-counterfeit measure were MasterCard credit cards back in 1983, shortly followed by Visa. Since then, holograms have been applied to an ever increasing array of items for authentication purposes, with the first metallized holograms appearing on United Nations’ passports in 1984 – as simple authentication devices on the cover.

TIMES CHANGE

However, times change and we must not be complacent. The industry is working hard to remind people that even the most sophisticated holograms can be reproduced to some extent. The question is just how well can they be copied? The answer is not very well – and this is where the real value of holograms designed for ID security applications should be appreciated.

The intrinsic features of holograms mean that the techniques and visual effects make it difficult to completely copy an authentic security hologram. This has ensured their success – the document they protect may have been counterfeited but a poorly copied hologram suggests that all is not what it seems.

And therein lies the rub. The role of a hologram is not solely to prevent counterfeits, but instead act as an effective detection device, making it easier for the trained eye to distinguish the real thing from the fake.

Future developments

The specific requirements of passport production and personalization have proved technically challenging for the holographic industry, but one that the industry is meeting.

The next generation of holographic technology for passports and other forms of ID, meanwhile, is already underway – and lies in the personalization of the hologram itself – as opposed to using a generic, albeit country-specific design for all of that country’s passports.

The key to this development is personalized photopolymer holograms that match the biodata in the passport. Unlike the embossed variety with which most people are familiar, the production of these is based on a process more akin to photography in that the images are exposed into the film rather then pressed. Individualized photopolymer holograms known as Identigrams – which take the form of overlays that carry both a holographic and a digitized image of the bearer – are already being used on the German passport and ID card.

In other developments, the same underlying technology is being used to create holograms of the biometric data – for example, fingerprint or retina scans – alongside the portrait. Meanwhile, a new photopolymer material has been developed in Germany, which is being used to make encrypted holographic records of such biometrics. This needs appropriate equipment to decode the data but could prove to have beneficially uses for passports.

Undoubtedly, the past six decades have seen holograms come of age; demonstrating a unique ability to deter counterfeiting and play a seminal role in securing the integrity of identity documents. The focus in recent years has been on securing the provenance of the original data and creating systems that seamlessly integrate this data – including biometrics – into passports, as well as developing systems that first capture this data and then enable it to be interrogated.

Physical features such as holograms have taken somewhat of a backseat, but the need to protect the data once in the passport, and hence the passport itself, is as strong as ever.

So, with the seemingly remorseless march of technology and the resolve of governments around the world to remain steadfast in the face of global terror and international crime, there’s no reason why holograms should not continue to evolve and play a pivotal part in the on-going battle to stay one step of ahead of the counterfeiters and criminals.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ed Dietrich has had a 20-year plus career in the authentication industry. The International Hologram Manufacturers Association (IHMA) www.ihma.org is made up of nearly 90 of the world’s leading hologram companies.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Gaps in Cybersecurity Programs

    War at Home: How U.S. Corporations are on the Front Lines of the Silent War on Privacy

    See More
  • hacker

    The Very Real Threat of the New Hactivism

    See More
  • Negotiations On A Proposed Anti-Counterfeiting Trade Agreement

    See More

Related Products

See More Products
  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing