..
/
2017
/
02
/
14
Page:
1
Use of computer-generated holograms in security hologram applications