Use of Computer-Generated Holograms in Security Hologram Applications

A. Bulanovs 1  and R. Bakanas 2 , 3
  • 1 Innovative Microscopy Centre, Daugavpils University, 1 Parades Str., Daugavpils, Latvia
  • 2 Geola Digital UAB, Vilnius, Lithuania
  • 3 Department of Materials Engineering, Kaunas University of Technology, Kaunas, Lithuania


The article discusses the use of computer-generated holograms (CGHs) for the application as one of the security features in the relief-phase protective holograms. An improved method of calculating CGHs is presented, based on ray-tracing approach in the case of interference of parallel rays.

Software is developed for the calculation of multilevel phase CGHs and their integration in the application of security holograms. Topology of calculated computer-generated phase holograms was recorded on the photoresist by the optical greyscale lithography. Parameters of the recorded microstructures were investigated with the help of the atomic-force microscopy (AFM) and scanning electron microscopy (SEM) methods. The results of the research have shown highly protective properties of the security elements based on CGH microstructures. In our opinion, a wide use of CGHs is very promising in the structure of complex security holograms for increasing the level of protection against counterfeit.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • 1. Murano, K., Shimobaba, T., Sugiyama, A., Takada, N., Kakue, T., Oikawa, M., and Ito, T. (2014). Fast computation of computer-generated holograms using Xeon Phi coprocessor. Computer Physics Communications, 185 (10), 2742–2757, DOI: 10.1016/j.cpc.2014.06.010.

  • 2. Bulanovs, A., Tamanis, E., and Mihailova, I. (2011). Holographic recording device based on LCoS spatial light modulator. Latvian Journal of Phys. and Tech. Sciences, 48 (5), 60–68, DOI: 10.2478/v10047-011-0034-5.

  • 3. Bulanovs, A., Gerbreders, V., Kirilovs, G., and Teteris, J. (2011). Investigations of As-S-Se thin films for use as inorganic photoresist for digital image-matrix holography. Central European Journal of Physics, DOI: 10.2478/s11534-010-0133-6.

  • 4. Firsov, An., Firsov, A., Loechel, B., Erko, A., Svintsov, A., and Zaitsev, S. (2014). Fabrication of digital rainbow holograms and 3-D imaging using SEM based e-beam lithography. Optics Express, 22 (23), 28756–28770, DOI: 10.1364/OE.22.028756.

  • 5. Bulanovs, A., and Gerbreders, S. (2013). Advanced concept for creation of security holograms. Latvian Journal of Phys. and Tech. Sciences, 50 (6), 61–70, DOI: 10.2478/lpts-2013-0041.

  • 6. InnoSol. (n.d.). Retrieved 17 April 2016, from

  • 7. Holoeye. (n. d.). Retrieved 17 April 2016, from

  • 8. MicroChemicals. (n.d.). Retrieved 17 April 2016, from

  • 9. Bulanovs, A., Tamanis, E., and Kolbjonoks, V. (2013). The ‘hidden image’ effect in security holograms and its personalization by laser demetallization. Proc. SPIE 8776, Holography: Advances and Modern Trends III, 87760R, DOI:10.1117/12.2017135.


Journal + Issues