The present invention relates to an optical device and method of manufacture and, in particular, to a holographic matrix, system of holographic personalization of ID cards and synthesis of holograms of desired visual properties and method of production thereof.
It is known from the prior art that holograms can be originated by means of several technologies, e.g. optically as conventional holography, some macro- or micro-pixel assisted techniques like the so-called dot-matrix technique, or direct laser, or electron beam lithography. The present invention provides for a substantially different approach of synthesis of the visually observable patterns.
The basic principles of holography are of course known from several books, such as for example, P. Hariharan, Optical Holography. 2nd ed. Cambridge University Press (1996).
Particularly effective synthetic origination of such elements can be achieved such as by exploiting electron-beam lithography and as discussed in Ryzi Z. et al., U.S. Pat. No. 7,435,979. Such synthetic origination can advantageously allow for a very complex shaping of the grooves arising from variation in aspects such as period and the thickness of the lines creating the grooves etc., and as is known from Ryzi Z. et al., WO 2006/013215 A1. In consideration of the present invention, it should be appreciated that the content of the above-mentioned published documents is incorporated herein by reference.
However, such known devices and methods of their production exhibit certain characteristics as regards the nature of the images that can be produced, particularly when used in a security context and which might not be best suited to various application scenarios.
The present invention seeks to provide for an optical device, and related method of formation, offering possible synthetic origination of elements, with characteristics particularly for security/verification purposes, and having advantages over known such devices and methods.
According to one aspect of the invention there is provided a composite image pattern for verification and/or security applications and comprising a plurality of sets of image elements, members of each set relating to a respective plurality of images and being spaced and located within the composite image in a manner seeking to avoid those of another set, the composite image being formed by the adjacent location of the spaced elements and wherein the spacing and location is in a defined manner serving to create a security key.
While in one example the said respective plurality of images can be unrelated, it is also possible that the said respective plurality of images be related. In this manner, the said respective plurality of images can comprise different views of a common subject.
The aforesaid different views can comprise different views of an individuals face.
Yet further, the composite image can be formed from a mosaic of he said elements and the said elements can be all of the same size and/or shape.
The said elements can substantially fill the composite image pattern if required.
In one example, the image can comprise a pixelated image.
Preferably the said spacing and location of the elements can be achieved as stochastically and/or pseudo randomly and/or periodically.
According to another aspect of the present invention, there is provided a composite optical element for verification and/or security applications and comprising a plurality of sets of optical elements, the members of each set sharing the same optical properties and spaced and located within the composite element in a manner seeking to avoid those of another set, the composite optical element being formed by the adjacent location of the spaced elements and wherein the spacing and location is in a manner defined with regard to a security key.
As with the above-mentioned image, the composite optical element can be from a mosaic of said sets of optical elements.
Indeed, the spacing location and shape and configuration of the optical elements serves to mirror those of the image elements noted above.
As should be appreciated, each optical element can comprise a diffractive element which in turn can comprise a diffractive grating and further wherein the members of each set comprise gratings of identical characteristics.
Of course the invention can also provide for a composite optical element arranged to cooperate with a composite image pattern as defined above.
Still further, the invention can provide for a security and/or verification structure comprising a composite image pattern as defined above in combination with a composite optical element as defined above.
According to a further aspect of the present invention, there is provided a method of forming a composite image comprising extracting a plurality of sets of image elements from spaced locations of a respective plurality of different images, and combining the said sets of elements to form the said combined image representative of the said plurality of respective different images, the said spaced location of the elements of each set being achieved in a defined manner to create a security key.
Also, the invention can provide for a method of forming a composite image, wherein the location spacing of the said image elements is achieved stochastically and/or pseudo randomly.
According to still a further aspect of the present invention, there is provided a method of forming a composite optical element comprising forming a plurality of sets of optical elements at spaced locations and wherein the members of each set of elements each share the same optical properties, said spaced location of the elements of each set being achieved in a defined manner so as to create a security key.
The method can include the further step of selectively interfering with selected elements so as to vary the optical properties thereof.
In further detail, the said selected elements can be arranged to be ablated and/or masked so as to affect the role they play during a subsequent verification procedure.
Within the context of the above concept, it should be appreciated that there is provision for a so-called non-personalized hologram wherein the composite optical element, i.e. the field, comprises a set of diffractive cells.
With regard to a so-called non-personalized diffractive structure, the area of such a structure can be equally, however not necessarily regularly, divided on a required number of sub-areas. Each sub-area can be arranged to diffract the light by way of a different, but anticipated, angle or forms a specific diffraction pattern. Further, each sub-area can comprise a set of similarly shaped elements of the identical area. Each element can be occupied by a diffractive grating of predefined parameters (angle, period, shape of the grooves etc.).
As an example, twenty-five angle-positions, i.e. twenty-five sub-areas, of square shape and of size 10×10 micrometers, can be distributed in a field stochastically or pseudo-randomly. The manner/pattern of the spatial distribution of the basic diffractive elements forms a particularly important security item.
As part of a further personalization of a second kind itself, as it specifically determines a specific client exploiting this technique (e.g. an ID issuer), it can further define a required post-processing manner of the decoding and of the image information used for the personalization of the first kind, i.e. the personalization according to a document holder.
Such a non-personalized hologram can be introduced into, for example, the PC ID card by way of a device such as disclosed in PCT/EP2009/066176 and wherein a diffractive structure is directly embossed into the PC foil.
Turning now to the provision of the input graphical data. a particular example can be based on images of the ID holder.
The holder's image (in general the “motif”) is to be recorded from one to N observation angles depending on the manner of desired projection (e.g. a single portrait, flopped multi-angular view from different direction, e.g. “police style triple-photo”, pseudo 3D stereographic portrait). For stereographic imaging it is necessary to follow stereographic principles, an attention has to be paid to the position of the axis of rotation (of a camera or the recorded subject) and a suitable angle among separate views. The position(s) of the camera and/or the position of the rotation axes and the angles between each view are case-sensitive and serve as encrypted information.
Next a set of images can be masked with a given motif. This masking motif relates to a motif of a spatial distribution of the basic diffractive elements. This means, that the only pertinent part of the image is kept for further processing. This part of the image fully corresponds to the area and a dislocation of the basic diffractive elements for this given observation angle.
Particular masked views can be further merged together, and this set then transformed into a binary black and white structure having a graphical resolution, which is greater (by a definition) than the resolution of the input masked images. The ratio between processed/shielded cells inside the area can be linked to the basic diffractive element and can define a brightness level of this element in a final structure, that is, in the holographic portrait, or input data. The manner of data transfer and graphical resolution of the structure and mathematical steps used for these operations are given below.
A subsequent personalization step can form an important aspect of the invention and can involve taking a hologram with no personalization and as created from a set of N areas/cells. Each area can emit the light into a desired/required observation angle. Then, and importantly by a partial destruction or by making the parts of the cells invisible from such areas (binary or grey level) the desired pattern can be revealed. A brightness element can be introduced into the non-personalized hologram via the proper sub-masking and decryption via a proper and very accurate shielding, laser-destruction or overwriting. This synthetically introduces brightness to the pattern and also ultimately defines a desired holographic figure observable by the naked eyes such as a holographic portrait, multi-object or multi-angle portrait like a stereographic holographic portrait of the polycarbonate and similar ID holder.
The required partial destruction of the diffractive element can be realized by laser engraving or with a binary mask. Invisible parts (or shadowing) of the diffractive element can be achieved via a laser exposure of a light sensitive layer overlaying the diffractive structure in a sandwich structure of the polycarbonate ID card etc. The mutual position, and angular registration, of the non-personalized structure and the binary or greylayer image, serve to define the brightness with the 1 micrometer resolution or even better with a minimum trace less than 2 micrometers.
In general there are then N different unitary pictures. Each picture can have unique properties (different motif, different lighting conditions, different positions, size, brightness of the motif etc.).
Each picture can be specifically masked. Thus, there can be N input figures, each occupying 1/N of the entire field area (the total frame), exploiting the positions of the pertinent grating (of a pertinent cell).
The masks are advantageously spatially complimentary and the master can be the sum of all N figures.
Laser gravure, and/or overlaying (covering with a foil) with a shield of defined properties, (preferably transparency) can lead to correspondence to a particular motif or their combinations.
It is considered that the potential applications of this approach are quite broad and can cover a full synthesis of holograms. Various colour changes, 3D, 2D/3D effect, especially the so-called stereo-grams and related effects can also readily be imitated. Further, imaging via lenses, micro-lenses, lens-arrays of either bulk of diffractive nature can be used for displaying the above-mentioned features. This can bring an extra spatial, or at least pseudo-spatial, perception of the feature, similarly to lenticular features, but of a diffractive nature. Various multiple image flops and omnidirectional patterning can be obtained using this approach.
The optical device can comprises a number of elementary cells. Each cell contains a specific diffractive structure like a diffraction grating. The cells of certain properties are spatially distributed. The distribution follows a given code, which ultimately creates a forensic code. The optical device can he further post-processed so as to yield an imitation of a number of holographic and/or diffractive patterns or, more importantly, to lead to a fully synthetic creation of diffractive patterns and similar visual phenomena. This can be achieved through, for example, laser engraving post-processing of the set of diffractive pixel called a field, or via shielding with a film having a prescribed transparency or another optical or diffractive properties.
Another way of introducing coding and masking into a system and method of the invention involves using multiple exposures, when, for example, different dosages can be used while producing the grating structure and during the masking writing, respectively. Accordingly a different developing solution could then be used to distinguish independent exposures.
It should be appreciated that ultimately, the masking can be achieved in a binary manner (e.g. either transparent and non-transparent). However, on a more general level it can be achieved via a variety of grey level coding, thus spanning from transparent to fully opaque. This can also be achieved through a modification of the diffractive efficiency, what is can be done through a variable microrelief height (deepness), leading to changes in the efficiency, and thus brightness and other intensity related properties. Similarly, this can be achieved through use of a variable grating pitch as is known the theory of diffractive gratings.
The basic matrix could also offer a white or white-like pattern, while consisting of a variety of micro-areas diffracting light for a certain wavelength. Hence, the masking (decoding) can also be achieved via covering the pertinent places with a color, or color-like, filter, e.g. following the RGB (red-green-blue) pixels, and thus light color decomposition. This will offer a way of holographic post-processing, such as so-called holographic printing, where the color element is chosen through RGB, or similar, color masking, printed on, or otherwise overlaying, the white-like shining matrix diffractive or reflective structure. This can obviously be exploited for simpler case of black and white, or grey level, overprinting.
Yet further, the diffractive sub-area(s) could also be arranged to direct the light into a given angular and/or azimuthal direction or even more particular directions. This can be achieved when the sub-areas take the shape of axicons, diffractive lenses or their parts, e.g. half of the mentioned elements. Similarly the masking elements can overlay the part of the axicon like or similar sub-areas. This offers another dimension of the invention, that the decoded pattern is then spatially, angularly and azimuthally shaped. The light is then distributed into given directions, so as to achieve a number of multi- and/or omni-directional patterns, while offering an imitation of features known as stereograms, multi-flops and so on. Moreover, this spatial direction of light from each cell can offer a variety of complex synthetically built graphical motifs and patterns. This can further be accompanied with a functional and/or continuous change of the period of gratings, axicons etc., in order to emphasise the white color effect and to appeal for a radiation of a particular part of the spectra. Furthermore, the white and matt like effects can be obtained through introducing randomly or pseudorandomly distributed scaterring areas, preferably of subwavelength size.
In particular, but not exclusively, the invention relates to an optical device that can offer a multiple pattern switches and a related method of manufacture. the method can relate to synthetically written so-called “security holograms” which are also referred to as Diffractive Optically Variable Identification Devices (DOVID) and can be exploited as the personalize identification document.
The invention is described further hearing after, by way of example only, with reference to the accompanying drawings in which:
a) and b) are schematic representations of elements of a composite element according to an embodiment of the present invention;
a)-e) are illustrations of formation of a composite age according to an embodiment of the present invention;
a)-d) are illustrations of selectively masked and then combined images according to an embodiment of the present invention;
a)-c) provides a further schematic illustration of selective masking such that of
a)-c) provide a representation of further optical effects that can be achieved by way of the present invention; and
Turning first to
Referring now to
a)-c) provide a further illustration of the standard personalization of the hologram. FIGS. a), b), and c) show coded/masked left, centre, and right portraits, respectively. As with
In summary therefore regarding
The feature of proper decoding leads to the unique personalization of the document, where this special synthetic hologram is applied.
A schematic version of the above is illustrated with reference to
The all important shielding aspect, and the related decrypting step, are illustrated further in
It can prove possible to synthetically build features like stereograms, 2D/3D effects etc. to introduce certain effects, e.g. change the order of picture, backward versus fowards motion. The knowledge of the coding (
The distribution of the cells is case sensitive and can be readily customized.
Details of yet a further aspect of the invention are found in
For diffractive Moiré, and considering a basic diffractive grating with a given period, this grating comprises a sub-area with a grating of the same period, however the grating is slightly shifted by s, where s is a fraction of the grating period. This is shown on a
Reference is also made to PCT/EP2009/066176 by Vizdal et al. and which discloses origination of such a grating. Such an area comprising the grating, and the grating with a shifted part is observable by the naked eye. Also, the homogeneous area, in other words the area bearing the shifted grating, cannot be observed by the naked eye. A diffractive reader 68 is provided and comprises a grating of the identical period as the grating of the base diffractive structure/area. When the reader 68 is closely positioned on the base structure with grooves being mutually parallel, the motif with shifted grating will be visible, because of the s shift. This is the so-called diffractive moiré, as actually know from the classical moiré phenomena. However this approach introduces the diffractive sized features into this phenomenon.
Another application, and as illustrated in
The shield from
Further, the grating mask can be made via a procedure such as that disclosed in PCT/EP2010/037834 and/or WO2010/037834 by Jermolajev of al. The shielding can be processed via a direct laser engraving or shielding with a foil bearing an information in a form of the transparency at the position of each pertinent pixel as described before.
The laser engraving of the number of the pixels may appear quite difficult, because of a required very precise positioning and aiming at each pixel location during overwriting the desired information. This can be done directly or is achieved by an additional machine readable or sensible reading like introduced, e.g. in WO 03/001440 A1 by Petterson et al. introducing small markers, predefined jitter like displacement of the pixels (either size or position) or a pre-allocated markers for a certain subarea. The laser beam would then be spatially led by recognizing this internal signature and would be positioned/focused into the pertinent pixel or subarea. This is further described in the following.
Specially crafted holographic marks (e.g. lenxicons, special linear gratings, nanographics) or nonholographic ones such as points of basic graphical elements, are placed at particular positions of the hologram in order to create a pattern. The pattern is constructed so that each part of the predefined (small) size is unique in the whole pattern and thus allows one to unambiguously determine a position of a part of the hologram scanned.
The pattern consists of symbols placed on a rectangular grid. A symbol may be formed by a choice from a set of holographic marks or by a displacement (by a fixed amount, small with respect to the grid distance) of the mark from the ordinary position, or by the combination of both. Symbols read off the predefined-size part of the pattern forms a codeword. A set of all code-words forms a code. The size of code-words—number of symbols is chosen so that code-words are unique and each codeword unambiguously determine the grid position, where the codeword is read-off from.
The code may be constructed in a way that every two code-words of the code differ in more than one symbol. An eventual error which may have occurred during a read-off of one or more symbol of a code-word can be detected and if required corrected by a selection of the most similar (i.e. the closest) valid code-word instead.
The present invention can therefore provide for a novel and advantageous manner of origination of diffractive elements arranged in an encrypted way to yield a desired (preferably) naked-eye-observable effect after a specific decrypting of the features.
Furthermore, the features of the invention discussed herein can be advantageously combined with other covert, as well as overt, diffractive and related security features and techniques.
As should therefore be appreciated from the above description and definitions, a particular aspect of the principle of the invention is a method involving production of a diffractive master, also referred to as the “field”. This master contains a certain number of cells, each possessing a specific diffractive structure as shown on
The further explanation, for simplicity, and considers just one mask, thus one graphical motif as a basic decoding. Assuming that the cells “1” have a grating that for a certain direction produces a red appearance, through for example laser ablation, or shielding, the field with the motif being the same as the distribution of 1s (where is 1, there is transparent shield, otherwise black) it is possible to yield the effect of the field being observed from the far field as appearing red. Further, if the field mesh is quite dense, the same could be achieved for more complicated motifs such as the portraits illustrated above. For example, there is a “5” twice inside the face, and any “5” outside of the face would appear black. If it is required to have “5” only in the face, although sparse in density, the observer would see the face with the properties of “5”, i.e. a given colour in a given direction etc. The mutual knowledge of the specific grating in the field and exploitation of the knowledge of this distribution of the pertinent cell will lead to a successful decoding. Hence the observer would see the motif as shown on
With regard to
Returning to
In one mode, tilting is done by a movement of an observer. Again certain sub-groups of cells radiate in a given direction and nowhere else. We can allow, block or partially block this direction at the places of the motif.
Of course, the “key” represented by the spacing and location is kept separately as “know-how” and only revealed on a restricted basis. This key can then be applied to selectively destroy/distort the field accordingly, or a film identical to the mask shield of
Although it could prove possible to prepare a mask for one image, it is preferred to have one mask revealing all three pictures/figures. When looking from left, one would see the left one, from centre the centre one etc.
In general therefore, the method can employ a generic synthesis of holograms. However there is also provided a pseudorandom mask with a key defining how to handle each cell (to let or to erase for binary case etc). Any misplacement of the relation between the key and the mask will lead to obvious crosstalk between the images, or absolute failure in decrypting and so will be readily indicative of attempted miss-use, fraudulent activity etc. and so can exhibit a strong potential for security/anti-counterfeit/verification measures and applications.
Number | Date | Country | Kind |
---|---|---|---|
1008955.5 | May 2010 | GB | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP2011/058690 | 5/26/2011 | WO | 00 | 3/11/2013 |