Paper
15 March 1996 Security design of valuable documents and products
Author Affiliations +
Proceedings Volume 2659, Optical Security and Counterfeit Deterrence Techniques; (1996) https://doi.org/10.1117/12.235456
Event: Electronic Imaging: Science and Technology, 1996, San Jose, CA, United States
Abstract
A method of security design is presented, founded on a systematic seven step approach: (1) drafting a security policy, (2) a list of requirements, (3) a security scheme, and (4) a fraud-risk analysis. Based on these documents: (5) the security measures can be selected, (6) and implemented, (7) to result in a security product. Simulation and/or experiments are required to assess the relevant properties of the design or product. The actual evaluation consists of comparing these properties with the requirements. Subsequently weak and strong points, and possible paths of attack will be established. In case the evaluation reveals a considerable mismatch between requirements and characteristics, the design cycle has to be passed through again and either the requirements must be adapted, or the design, or both. This procedure is repeated until the remaining mismatch between requirements and design properties becomes acceptable. It is paramount that an evaluation is not postponed until the final stage of product realization, but is carried out in the early phases of the project. In fact it is beneficial if all seven step of the design are the subject of an evaluation. Some design considerations for optically variable devices are discussed.
© (1996) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Rudolf L. van Renesse "Security design of valuable documents and products", Proc. SPIE 2659, Optical Security and Counterfeit Deterrence Techniques, (15 March 1996); https://doi.org/10.1117/12.235456
Lens.org Logo
CITATIONS
Cited by 5 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Inspection

Information security

Diffraction

Product engineering

Resistance

Computer security

Liquid crystals

Back to Top