1. Use of computer-generated holograms in security hologram applications