Campus ID News
Card, mobile credential, payment and security
FEATURED
PARTNERS
hologram card

Holograms for secure authentication still among top document security features

CampusIDNews Staff   ||   Oct 04, 2017  ||   ,

The technology may predate the widespread deployment of televisions, but holograms for secure authentication are still standing strong among document security features. And it seems that strength will continue even as digital and mobile ID technologies gain more popularity with governments, financial institutions, corporations, schools and others.

The hologram is still the only technology available today that is able to offer three levels of security – covert, overt and forensic – in a single solution

“The hologram appears to certainly be one of the security features of choice for safeguarding the critical personal data in a passport or on an ID card against tampering, alteration, forgery or counterfeiting,” reads a recent white paper from ITW Security Division entitled “The Hologram—Still Going Strong.” It dates the emergence of the hologram to 1947, with the first ID document containing a hologram debuting in 1984, on the U.N. passport. “Although its use over the years has changed from being the only authentication device used on a banknote or in a secure document to potentially one of a number today, it is by far still the most accepted and admired (document security feature).”

Consider these statistics from ITW:

  • When it comes to passports and ID cards, 81 percent of them have holograms, according to an estimate that covers the period from 2010 to 2016. That compares to 69 percent for the period from 2000 through 2009.
  • Holograms are working harder to ensure secure authentication for passports. By the end of 2016, 89 percent of those travel ID documents had the optical document security feature. That compares to 60 percent in 2006.

So what accounts for the continued dependence on this decades-old secure authentication technology even as biometric ID systems gain popularity? Depth and flexibility, says Joanne Ogden, global sales manager for the ITW Security Division. “The hologram is still the only technology available today that is able to offer three levels of security (overt, covert and forensic) in a single solution,” she says. “Hologram manufacturers constantly watch their market to identify the techniques used by counterfeiters and ensure holography integrates additional technology solutions to counter them.”

Holograms for secure authentication part of evolving arsenal of document security features

Even so, holograms face challenges as ID technology and consumer behavior evolve. “The main challenges are for holography to integrate well with other electronic technologies such as mobile ID, and above all remain aware of competing, disruptive solutions and counterfeiting technology,” Ogden says. “By keeping focused on the market place and the problems faced, holographic technology can be adapted to remain truly relevant, protecting documents from counterfeit and aiding authentication.”

Hologram users should replace them with updated versions every five years to ensure the value as a document security feature doesn’t lag from complacency

Adapting to new threats means keeping up with the latest equipment, she adds. “Dot Matrix equipment for producing standard kinetic and colorful holograms is commercially available, so hologram manufacturers invest in the latest manufacturing techniques to produce features such as no color or movement that standard Dot Matrix equipment simply cannot produce,” she says. “Counterfeiters generally only see Level 1 features and therefore do not know about the Level 2 or 3 features, let alone have the ability to try and replicate them.”

Hologram users should replace them with updated versions every five years to ensure the value as a document security feature doesn’t lag from complacency. “Those authenticating holograms look less and less at the detail of the entire hologram as time progresses, and it is in situations like this that would be counterfeiter can try to simulate Level 1 features, often badly, but enough to fool somebody at first glance,” Ogden explains. “Hologram designs need to be kept current and fresh—integrating the latest security features—to ensure they remain the security feature of choice.”

It seems holograms for secure authentication still have a promising future ahead. “Hologram technology will remain strong,” she says. “Digital technology is good and a great add on to physical IDs with hologram technology, but digital technology is complementary rather than a replacement. Digital technology requires power and this leads to issue when power isn’t available. Electricity cuts at border control or no battery power in handheld devices mean authentication applications won’t work.”
To explore the past, present and future of hologram technology and its role as a leading document security feature, check out the free white paper from ITW. It is part of a series of resources on advanced card materials and embedded security features available via the same link. Check it out online.

Related Posts

Subscribe to our weekly newsletter

RECENT ARTICLES

Kent State autonomous store
May 23, 24 /

Kent State autonomous store uses campus cards from CBORD for entry, payment

Kent State University’s Flash Bistro is a grab-and go store that offers snacks and light meals. These days, the meals seem even lighter as students enter the store, pick up their food, and exit without interacting with a cashier or self-checkout device. With the help of Kent State’s transaction system provider, CBORD, students to present […]
Assa Abloy trade show booth video
May 15, 24 / ,

Entertaining video shows range of lock options from Assa Abloy and HID

Visiting a company’s booth on an exhibit hall floor is often informative, but it is not alway funny or entertaining. But when the tour is led by two of the security industry’s social media leaders, it can be both. In this video from ISC West, Phil Coppola, HID’s Mobile Evangelist, tours the Assa Abloy booth […]
Atrium and Towson autonomous convenience store with zippin
May 09, 24 / ,

Towson University and Atrium discuss new autonomous market

New technology at the Tiger Express convenience store at Towson University let's students walk in, grab products, and walk out without interacting with a employee or using self-checkout. In this CampusIDNews Chat, we get the lowdown from Myron Esterson, IT Manager, Auxiliary Services at Towson and David McQuillin, Vice President of Sales and Atrium Co-Founder. […]
CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.
Twitter

Attn: friends in the biometrics space. Nominations close Friday for the annual Women in Biometrics Awards. Take five minutes to recognize a colleague or even yourself. http://WomenInBiometrics.com

Feb. 1 webinar explores how mobile ordering enhanced campus life, increased sales at UVA and Central Washington @Grubhub @CBORD

Load More...
Contact
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301
www.AVISIAN.com[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2024 CampusIDNews. All rights reserved.