1 / 49

Document Security

Document Security. Terms, Definition, and Aspects Paradigms for Document Security Example: Guilloche Pattern as Security Feature (SF) Problems for Reproduction of SF Security Techniques for Documents Publicity Levels. Document Security: Wikipedia.

nishan
Download Presentation

Document Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Document Security • Terms, Definition, and Aspects • Paradigms for Document Security • Example: Guilloche Pattern as Security Feature (SF) • Problems for Reproduction of SF • Security Techniques for Documents • Publicity Levels

  2. Document Security: Wikipedia • A document contains information. It often refers to an actual product of writing or recording and is usually intended to communicate or store collections of data. Documents are often the focus and concern of business administration and government administration. The word is also used as a verb as "documenting" describes the process of making a document. • The term document may be applied to any discrete representation of meaning, but usually it refers to something physical like one or more printed pages, or to a "virtual" document in electronic (digital) format.

  3. Documents: Aspects • Types of documents: paper-based, electronic • More general: media • Documents have content, layout, mark-up • Electronic2paper: printing, but paper2electronic: pattern recognition • Security documents are a subclass of documents (like travel documents, application forms, personal documents) • Authentication vs. Authorization • Document security applies to more media than “just” documents...

  4. Also documents... • packings of products (software box, drugs) • coins • stamps • logfiles of server

  5. Terms • Creating a new false document from scratch: a forgery • Modifying an existing one: to tamper • Imitating a brand product: to fake, a fraud • By-passing a security means: deception, to deceive • Attempt to by-pass a security means is usually called an attack, or more friendly a counterfeit

  6. Document Security: Means • Security printing techniques • Cryptography • Security procedures • Biometrics (esp. handwriting examination) • Public awareness, law enforcement

  7. Main paradigms of (traditional) document security • Effort contest: Make the effort for producing a forgery higher than the benefit of making such a forgery. • Personalization: Attach unique features for a class of documents, or even single documents. • Publicity: Make security features partially known to the public.

  8. Guilloche Patterns • initially an engraving technique, known use since 17th century • named after French engineer Guillot • most common security pattern, usually associated with “official documents” (e.g. nearly each banknote in the world has such patterns)

  9. Formerly: Guilloche Machines

  10. Today: Guilloche Software • example: Excentro for MacOS...

  11. Guilloche: Basic Principle

  12. Guilloche: Why is it secure? • protection against copying: problems are color gamut, half-toning, multi-chip cameras, geometric distortions (explained next) • protection against re-origination: many parameters, “secret” formula • specific protections: in practice, there are often two overlapping Guilloche patterns used (darker and lighter), so a copy device cannot sense contrast in both parts with sufficient accurracy • “social” protection: by producer agreement, each color copier will refuse to copy banknotes

  13. Problem 1: Color Gamut Typical technical devices (printer, scanner, monitor, copier, camera) can only cover part of the spectrum of colors, which can be perceived by the human eye. This part is called gamut of the device. For example, a printer can print a color, which cannot be sensed by the CCD-line camera of a scanner.

  14. Problem 2: Half-Toning Printer can only place single points on paper. So-called dithering algorithms (there are many) convert gayscale information into a point raster.

  15. Problem 3: Multi-Chip Cameras A normal (CCD or CMOS) camera chip can only sense intensities of light (by collecting over some period). Thus, for each color channel (red, green, blue) there has to be a separate chip. In a scanner’s camera, the elements for different colors are placed next to each other (like RGBRGBRGB...), so there is always a small offset between the color information. Algorithms like Bayer Filter can combine this information into color information for each pixel. However, the fine lines and details of a Guilloche pattern cannot be compensated by such methods.

  16. Problem 4: Geometric distortions

  17. All problems together... Part of original DM100 banknote, and two attempts to make a copy.

  18. Main paradigms of (traditional) document security - Repeated • Effort contest: Make the effort for producing a forgery higher than the benefit of making such a forgery. • Personalization: Attach unique features for a class of documents, or even single documents. • Publicity: Make security features partially known to the public.

  19. Security Printing Techniques • Main categories of security features: • substrate-based security • special printing inks and techniques • security pattern based • diffusion-based security features • interference-based security features

  20. Substrate-based SF • watermarks • chemical reactants • mechanical (feel) • fluorescence • tints • security fibers • planchets • perforation

  21. Substrate-based SF • watermarks • chemical reactants • mechanical (feel) • fluorescence • tints • security fibers • planchets • perforation

  22. Substrate-based SF • watermarks • chemical reactants • mechanical (feel) • fluorescence • tints • security fibers • planchets • perforation

  23. Special Printing Inks and Techniques • photosensitive inks • thermochromatic inks • metameric inks • iridescent inks • magnetic inks • intaglio print

  24. Special Printing Inks and Techniques • photosensitive inks • thermochromatic inks • metameric inks • iridescent inks • magnetic inks • intaglio print

  25. Special Printing Inks and Techniques • photosensitive inks • thermochromatic inks • metameric inks • iridescent inks • magnetic inks • intaglio print

  26. Special Printing Inks and Techniques • photosensitive inks • thermochromatic inks • metameric inks • iridescent inks • magnetic inks • intaglio print

  27. Security Patterns • Guilloche • Microprint • See-through register • Latent images • Scan traps • Covert watermarks Microprint, and scan-copy

  28. Security Patterns • Guilloche • Microprint • See-through register • Latent images • Scan traps • Covert watermarks

  29. Security Patterns • Guilloche • Microprint • See-through register • Latent images • Scan traps • Covert watermarks

  30. Diffraction-based SF • also named OVD (optically variable device) • gold foil • hologram • kinegram

  31. Diffraction-based SF • also named OVD (optically variable device) • gold foil • hologram • kinegram

  32. Diffraction-based SF • also named OVD (optically variable device) • gold foil • hologram • kinegram

  33. Interference-based SF • optically-variable ink (OVI) • hologram overlay • Lippmann photo

  34. Interference-based SF • optically-variable ink (OVI) • hologram overlay • Lippmann photo

  35. Interference-based SF • optically-variable ink (OVI) • hologram overlay • Lippmann photo Lippmann photo: Technique for taking a photo and inverted photo at the same time.

  36. More information: • Rudolf L. van Renesse • “Optical Document Security” (3rd Edition) • Artech House Boston, London

  37. Main paradigms of (traditional) document security - Repeated • Effort contest: Make the effort for producing a forgery higher than the benefit of making such a forgery. • Personalization: Attach unique features for a class of documents, or even single documents. • Publicity: Make security features partially known to the public.

  38. Publicity Levels • Class: Security features are distributed about public channels (media, internet, hand-out) • Class: Security features are only known to trained personal, but nevertheless they are no general secret • Class: Security features are only known to a small group, and its distribution may be even illegal.

  39. 1000 Yen Banknote Source http://www.boj.or.jp/en/type/release/zuiji/kako03/bnnew3.htm

  40. 1000 Yen Banknote

  41. Security Features (1) • (1) Latent pearl image • A security feature unique to the new 1,000 yen note. When the banknote is tilted, you can see (1) the Japanese characters meaning "1,000 yen" printed with pearl ink, and (2) the number "1000" as a latent image.

  42. Security Features (2) • (2) Watermark-bar-pattern • When the banknote is held up to the light, a vertical watermark bar (three bars for the 10,000 yen note, two for the 5,000 yen note) becomes visible. This feature is more difficult to reproduce with personal computers or color copiers than the traditional watermark.

  43. Security Features (3) • (3) Latent image • When the banknote is viewed from a certain angle, the word "NIPPON" ("Japan" in Japanese) appears on the top right of the back side.

  44. Security Features (4) • (4) Pearl ink • When viewed from different angles, a semi-transparent pattern printed with pink pearl ink appears in the blank areas of the left and right margins of the front of the note.

  45. Security Features (5) • (5) Microprinting • Like notes issued since December 1, 1993 (with serial numbers in brown or dark green), the new 1,000 yen note has the words "NIPPON GINKO" ("Bank of Japan" in Japanese) printed in micro letters. Some of the micro letters are made even smaller on the new note than those on the current note. Also, micro letters of different sizes are included in the background design.

  46. (6) Luminescent ink • As in notes issued since December 1, 1993 (with serial numbers in brown or dark green), the Governor's seal on the front side glows orange under ultraviolet light. Likewise, some parts of the background pattern fluoresce yellowish-green.

  47. Security Features (7) • (7) Intaglio printing • Raised printing is used for some features of the new note. The ink on the new note is raised higher than the ink on the current note.

  48. Security Features (8) • (8) Tactile marks (intaglio printing) • To assist the visually impaired in detecting the note by touch, a recognition symbol with a rougher texture, printed intaglio, is adopted instead of the watermark symbols used for the current note.

  49. Undocumented Features

More Related