Campus ID News
Card, mobile credential, payment and security
FEATURED
PARTNERS
hologram card

Holograms for secure authentication still among top document security features

CampusIDNews Staff   ||   Oct 04, 2017  ||   ,

The technology may predate the widespread deployment of televisions, but holograms for secure authentication are still standing strong among document security features. And it seems that strength will continue even as digital and mobile ID technologies gain more popularity with governments, financial institutions, corporations, schools and others.

The hologram is still the only technology available today that is able to offer three levels of security – covert, overt and forensic – in a single solution

“The hologram appears to certainly be one of the security features of choice for safeguarding the critical personal data in a passport or on an ID card against tampering, alteration, forgery or counterfeiting,” reads a recent white paper from ITW Security Division entitled “The Hologram—Still Going Strong.” It dates the emergence of the hologram to 1947, with the first ID document containing a hologram debuting in 1984, on the U.N. passport. “Although its use over the years has changed from being the only authentication device used on a banknote or in a secure document to potentially one of a number today, it is by far still the most accepted and admired (document security feature).”

Consider these statistics from ITW:

  • When it comes to passports and ID cards, 81 percent of them have holograms, according to an estimate that covers the period from 2010 to 2016. That compares to 69 percent for the period from 2000 through 2009.
  • Holograms are working harder to ensure secure authentication for passports. By the end of 2016, 89 percent of those travel ID documents had the optical document security feature. That compares to 60 percent in 2006.

So what accounts for the continued dependence on this decades-old secure authentication technology even as biometric ID systems gain popularity? Depth and flexibility, says Joanne Ogden, global sales manager for the ITW Security Division. “The hologram is still the only technology available today that is able to offer three levels of security (overt, covert and forensic) in a single solution,” she says. “Hologram manufacturers constantly watch their market to identify the techniques used by counterfeiters and ensure holography integrates additional technology solutions to counter them.”

Holograms for secure authentication part of evolving arsenal of document security features

Even so, holograms face challenges as ID technology and consumer behavior evolve. “The main challenges are for holography to integrate well with other electronic technologies such as mobile ID, and above all remain aware of competing, disruptive solutions and counterfeiting technology,” Ogden says. “By keeping focused on the market place and the problems faced, holographic technology can be adapted to remain truly relevant, protecting documents from counterfeit and aiding authentication.”

Hologram users should replace them with updated versions every five years to ensure the value as a document security feature doesn’t lag from complacency

Adapting to new threats means keeping up with the latest equipment, she adds. “Dot Matrix equipment for producing standard kinetic and colorful holograms is commercially available, so hologram manufacturers invest in the latest manufacturing techniques to produce features such as no color or movement that standard Dot Matrix equipment simply cannot produce,” she says. “Counterfeiters generally only see Level 1 features and therefore do not know about the Level 2 or 3 features, let alone have the ability to try and replicate them.”

Hologram users should replace them with updated versions every five years to ensure the value as a document security feature doesn’t lag from complacency. “Those authenticating holograms look less and less at the detail of the entire hologram as time progresses, and it is in situations like this that would be counterfeiter can try to simulate Level 1 features, often badly, but enough to fool somebody at first glance,” Ogden explains. “Hologram designs need to be kept current and fresh—integrating the latest security features—to ensure they remain the security feature of choice.”

It seems holograms for secure authentication still have a promising future ahead. “Hologram technology will remain strong,” she says. “Digital technology is good and a great add on to physical IDs with hologram technology, but digital technology is complementary rather than a replacement. Digital technology requires power and this leads to issue when power isn’t available. Electricity cuts at border control or no battery power in handheld devices mean authentication applications won’t work.”
To explore the past, present and future of hologram technology and its role as a leading document security feature, check out the free white paper from ITW. It is part of a series of resources on advanced card materials and embedded security features available via the same link. Check it out online.

Subscribe to our weekly newsletter

RECENT ARTICLES

Brista Hurst UT Tyler

Learn to analyze card system data at NACCU’s popular Data Summit

In a recent CampusIDNews Chats interview, Brista Hurst-Kent, Business Technology Services Manager at the University of Texas at Tyler, shared her experience attending the NACCU Data Summit. This two-day workshop focused on empowering participants to use common reporting tools – specifically Microsoft Excel with Power Pivot and Power Query – to create interactive dashboards that […]
Credentials 101 Series banner

Understanding chip options for contactless campus cards

Three main components underly modern credential technology – chips, formats, and encryption. Each are applicable to both cards and mobile credentials and understanding them is key to making informed decisions for your campus card program. In this series of articles, we will dive into each component, but first a brief preview. Chips are the core of […]
Apex OrderHQ Array modular lockers
Jul 02, 25 /

Modular locker solution streamlines campus order pickup

Apex Order Pickup Solutions launched a new modular system of automated order pickup lockers that can be stacked or setup in custom configurations. The OrderHQ Array Series lockers work in any floor plan without expensive remodeling. In an interview with Food On Demand, Kent Savage, founder and executive chairman of Apex Order Pickup Solutions, compares […]
CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.
Twitter

Attn: friends in the biometrics space. Nominations close Friday for the annual Women in Biometrics Awards. Take five minutes to recognize a colleague or even yourself. http://WomenInBiometrics.com

Feb. 1 webinar explores how mobile ordering enhanced campus life, increased sales at UVA and Central Washington @Grubhub @CBORD

Load More...
Contact
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301
www.AVISIAN.com[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2025 CampusIDNews. All rights reserved.