Paper
3 June 2004 Probabilistic risk assessment for comparative evaluation of security features
Anshu Saksena, Dennis Lucarelli
Author Affiliations +
Proceedings Volume 5310, Optical Security and Counterfeit Deterrence Techniques V; (2004) https://doi.org/10.1117/12.526992
Event: Electronic Imaging 2004, 2004, San Jose, California, United States
Abstract
A systematic approach for comparing the effectiveness of counterfeit deterrence features in banknotes, credit cards, digital media, etc. was previously presented. That approach built a probabilistic model around the expert identification of the most efficient process by which a counterfeiter can gain sufficient information to replicate a particular feature. We have extended the scope and functionality of that approach to encompass the entire counterfeiting process from the learning phase to the production of counterfeits. The extended approach makes determining the probabilities more straightforward by representing a more detailed model of the counterfeiting process, including many probable counterfeiting scenarios rather than just representing the least costly successful scenario. It uses the counterfeiter's probability of succeeding and level of effort as metrics to perform feature comparisons. As before, these metrics are evaluated for a security feature and presented in a way that facilitates comparison with other security features similarly evaluated. Based on this representation, the cost and laboratory procedures necessary for succeeding may be recovered by a dynamic programming technique. This information may be useful in forensic profiling of potential counterfeiters.
© (2004) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Anshu Saksena and Dennis Lucarelli "Probabilistic risk assessment for comparative evaluation of security features", Proc. SPIE 5310, Optical Security and Counterfeit Deterrence Techniques V, (3 June 2004); https://doi.org/10.1117/12.526992
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Scanning electron microscopy

Coating

Compact discs

Plastic coatings

Error analysis

Forensic science

RELATED CONTENT

A taxonomy and discussion of software attack technologies
Proceedings of SPIE (March 28 2005)
Practical treatment of quantum bugs
Proceedings of SPIE (November 19 2012)
Forensic audio watermark detection
Proceedings of SPIE (February 13 2012)
Stepper Lens Characterization Using A Field Emission SEM
Proceedings of SPIE (January 01 1988)

Back to Top