Paper
15 March 1996 Security design of valuable documents and products
Author Affiliations +
Proceedings Volume 2659, Optical Security and Counterfeit Deterrence Techniques; (1996) https://doi.org/10.1117/12.235456
Event: Electronic Imaging: Science and Technology, 1996, San Jose, CA, United States
Abstract
A method of security design is presented, founded on a systematic seven step approach: (1) drafting a security policy, (2) a list of requirements, (3) a security scheme, and (4) a fraud-risk analysis. Based on these documents: (5) the security measures can be selected, (6) and implemented, (7) to result in a security product. Simulation and/or experiments are required to assess the relevant properties of the design or product. The actual evaluation consists of comparing these properties with the requirements. Subsequently weak and strong points, and possible paths of attack will be established. In case the evaluation reveals a considerable mismatch between requirements and characteristics, the design cycle has to be passed through again and either the requirements must be adapted, or the design, or both. This procedure is repeated until the remaining mismatch between requirements and design properties becomes acceptable. It is paramount that an evaluation is not postponed until the final stage of product realization, but is carried out in the early phases of the project. In fact it is beneficial if all seven step of the design are the subject of an evaluation. Some design considerations for optically variable devices are discussed.
© (1996) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Rudolf L. van Renesse "Security design of valuable documents and products", Proc. SPIE 2659, Optical Security and Counterfeit Deterrence Techniques, (15 March 1996); https://doi.org/10.1117/12.235456
Lens.org Logo
CITATIONS
Cited by 5 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Inspection

Information security

Diffraction

Product engineering

Resistance

Computer security

Liquid crystals

RELATED CONTENT

ASN reputation system model
Proceedings of SPIE (May 14 2015)
VAFLE: visual analytics of firewall log events
Proceedings of SPIE (February 03 2014)
Document fraud deterrent strategies: four case studies
Proceedings of SPIE (April 01 1998)
Synergistic combination of document security techniques
Proceedings of SPIE (April 07 2000)
Counterfeit detection for new and old currency designs
Proceedings of SPIE (April 19 2002)

Back to Top