Paper
19 April 2002 Security solutions: strategy and architecture
Myron Wai Leung Seto
Author Affiliations +
Proceedings Volume 4677, Optical Security and Counterfeit Deterrence Techniques IV; (2002) https://doi.org/10.1117/12.462723
Event: Electronic Imaging, 2002, San Jose, California, United States
Abstract
Producers of banknotes, other documents of value and brand name goods are being presented constantly with new challenges due to the ever increasing sophistication of easily-accessible desktop publishing and color copying machines, which can be used for counterfeiting. Large crime syndicates have also shown that they have the means and the willingness to invest large sums of money to mimic security features. To ensure sufficient and appropriate protection, a coherent security strategy has to be put into place. The feature has to be appropriately geared to fight against the different types of attacks and attackers, and to have the right degree of sophistication or ease of authentication depending upon by whom or where a check is made. Furthermore, the degree of protection can be considerably increased by taking a multi-layered approach and using an open platform architecture. Features can be stratified to encompass overt, semi-covert, covert and forensic features.
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Myron Wai Leung Seto "Security solutions: strategy and architecture", Proc. SPIE 4677, Optical Security and Counterfeit Deterrence Techniques IV, (19 April 2002); https://doi.org/10.1117/12.462723
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Chemical elements

Forensic science

Manufacturing

Printing

Astatine

Legal

RELATED CONTENT


Back to Top