sample-application of a security hologram