Campus ID News
Card, mobile credential, payment and security
FEATURED
PARTNERS
hologram card

Holograms for secure authentication still among top document security features

CampusIDNews Staff   ||   Oct 04, 2017  ||   ,

The technology may predate the widespread deployment of televisions, but holograms for secure authentication are still standing strong among document security features. And it seems that strength will continue even as digital and mobile ID technologies gain more popularity with governments, financial institutions, corporations, schools and others.

The hologram is still the only technology available today that is able to offer three levels of security – covert, overt and forensic – in a single solution

“The hologram appears to certainly be one of the security features of choice for safeguarding the critical personal data in a passport or on an ID card against tampering, alteration, forgery or counterfeiting,” reads a recent white paper from ITW Security Division entitled “The Hologram—Still Going Strong.” It dates the emergence of the hologram to 1947, with the first ID document containing a hologram debuting in 1984, on the U.N. passport. “Although its use over the years has changed from being the only authentication device used on a banknote or in a secure document to potentially one of a number today, it is by far still the most accepted and admired (document security feature).”

Consider these statistics from ITW:

  • When it comes to passports and ID cards, 81 percent of them have holograms, according to an estimate that covers the period from 2010 to 2016. That compares to 69 percent for the period from 2000 through 2009.
  • Holograms are working harder to ensure secure authentication for passports. By the end of 2016, 89 percent of those travel ID documents had the optical document security feature. That compares to 60 percent in 2006.

So what accounts for the continued dependence on this decades-old secure authentication technology even as biometric ID systems gain popularity? Depth and flexibility, says Joanne Ogden, global sales manager for the ITW Security Division. “The hologram is still the only technology available today that is able to offer three levels of security (overt, covert and forensic) in a single solution,” she says. “Hologram manufacturers constantly watch their market to identify the techniques used by counterfeiters and ensure holography integrates additional technology solutions to counter them.”

Holograms for secure authentication part of evolving arsenal of document security features

Even so, holograms face challenges as ID technology and consumer behavior evolve. “The main challenges are for holography to integrate well with other electronic technologies such as mobile ID, and above all remain aware of competing, disruptive solutions and counterfeiting technology,” Ogden says. “By keeping focused on the market place and the problems faced, holographic technology can be adapted to remain truly relevant, protecting documents from counterfeit and aiding authentication.”

Hologram users should replace them with updated versions every five years to ensure the value as a document security feature doesn’t lag from complacency

Adapting to new threats means keeping up with the latest equipment, she adds. “Dot Matrix equipment for producing standard kinetic and colorful holograms is commercially available, so hologram manufacturers invest in the latest manufacturing techniques to produce features such as no color or movement that standard Dot Matrix equipment simply cannot produce,” she says. “Counterfeiters generally only see Level 1 features and therefore do not know about the Level 2 or 3 features, let alone have the ability to try and replicate them.”

Hologram users should replace them with updated versions every five years to ensure the value as a document security feature doesn’t lag from complacency. “Those authenticating holograms look less and less at the detail of the entire hologram as time progresses, and it is in situations like this that would be counterfeiter can try to simulate Level 1 features, often badly, but enough to fool somebody at first glance,” Ogden explains. “Hologram designs need to be kept current and fresh—integrating the latest security features—to ensure they remain the security feature of choice.”

It seems holograms for secure authentication still have a promising future ahead. “Hologram technology will remain strong,” she says. “Digital technology is good and a great add on to physical IDs with hologram technology, but digital technology is complementary rather than a replacement. Digital technology requires power and this leads to issue when power isn’t available. Electricity cuts at border control or no battery power in handheld devices mean authentication applications won’t work.”
To explore the past, present and future of hologram technology and its role as a leading document security feature, check out the free white paper from ITW. It is part of a series of resources on advanced card materials and embedded security features available via the same link. Check it out online.

Subscribe to our weekly newsletter

RECENT POSTS

Jan 26, 23 / ,

Baylor adds Starship robot delivery

Baylor University has added robot delivery from Starship Technologies to its dining services offerings with the help of Grubhub. The initiative will see Baylor deploy a fleet of 20 delivery robots on the Waco, TX campus.
Jan 26, 23 /

NACCU Annual Conference registration now open

The National Association of Campus Card Users (NACCU) has opened registration for its Annual Conference. This year’s conference will be held April 16-19 in Austin, Texas and will feature a packed schedule of informative events and sessions with both campus card professionals and corporate vendors.

Grubhub, Topanga.io partner for reusable takeout container initiative

Grubhub has partnered with reusable packaging management platform, Topanga.io, announced to provide an integrated takeout container management service on college campuses. The partnership will bring Topanga.io's ReusePass program to universities across the United States, starting first with Ohio State University and Colorado State University.
CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.
Twitter

Join us, @NACCUorg, and @TouchNet to explore how campus card programs can successfully navigate the sales and procurement process. Join the webinar on June 6, 2 pm EDT. https://go.touchnet.com/l/652093/2022-05-18/lsndq

Webinar: Learn how the University of Arizona uses campus cards, mobile ordering, kiosks, lockers, and robots to revolutionize campus dining. April 7, 2-2:30 EDT. Register Now at https://register.gotowebinar.com/register/7821245544009488910?source=campus-id

As supply chain issues in 2021 persist, identity solutions provider @ColorID discusses ways campuses can to overcome potentially troublesome delays until the situation eases.

https://www.cr80news.com/news-item/protecting-your-campus-card-program-from-supply-chain-issues/

A dining services push at the @UBuffalo is reinforcing the utility of self-service checkout. @CBORD is improving the food service experience using the GET app, as well as Nextep kiosks and Oracle’s Micros Simphony POS.

https://www.cr80news.com/news-item/kiosks-self-service-tech-streamline-campus-food-service-u-buffalo/

Did you miss our recent webinar? No worries - watch it on-demand. Leaders from @NAU and the @UAlberta joined Ryan Audus, Touchnet, and Andrew Hudson, @CR80News, to discuss innovative mobile services and the future of mobile tech in higher ed. Watch now: https://bit.ly/31RFyLn

Load More...
Contact
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301
www.AVISIAN.com[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2023 CampusIDNews. All rights reserved.