Share Email Print
cover

Proceedings Paper

Security design of valuable documents and products
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

A method of security design is presented, founded on a systematic seven step approach: (1) drafting a security policy, (2) a list of requirements, (3) a security scheme, and (4) a fraud-risk analysis. Based on these documents: (5) the security measures can be selected, (6) and implemented, (7) to result in a security product. Simulation and/or experiments are required to assess the relevant properties of the design or product. The actual evaluation consists of comparing these properties with the requirements. Subsequently weak and strong points, and possible paths of attack will be established. In case the evaluation reveals a considerable mismatch between requirements and characteristics, the design cycle has to be passed through again and either the requirements must be adapted, or the design, or both. This procedure is repeated until the remaining mismatch between requirements and design properties becomes acceptable. It is paramount that an evaluation is not postponed until the final stage of product realization, but is carried out in the early phases of the project. In fact it is beneficial if all seven step of the design are the subject of an evaluation. Some design considerations for optically variable devices are discussed.

Paper Details

Date Published: 15 March 1996
PDF: 11 pages
Proc. SPIE 2659, Optical Security and Counterfeit Deterrence Techniques, (15 March 1996); doi: 10.1117/12.235456
Show Author Affiliations
Rudolf L. van Renesse, TNO Institute of Applied Physics (Netherlands)


Published in SPIE Proceedings Vol. 2659:
Optical Security and Counterfeit Deterrence Techniques
Rudolf L. van Renesse, Editor(s)

© SPIE. Terms of Use
Back to Top