Share Email Print

Proceedings Paper

Digital protection in a digital age
Author(s): Jeremy J. Plimmer
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Non-Impact printing is now widely used for most computer hard copy output applications. In the area of production of valuable documents such as title deeds, negotiable documents, passports, insurance policies and cover notes amongst others the flexibility of utilising this method of personalisation is often taken for granted. The benefits of economy, flexibility and speed tend to mask the risks associated with creating documents in this manner. Because of the ease with which alteration and replication can occur on high value documents, users have to protect material using costly lamination processes or look for other ways of securing the images created. Methods of digital protection have been developed that enable images to be protected by embedded digital fingerprints that are unique and hidden within the image itself. The applications of such devices are widespread and they can also be used as tools to detect the authenticity of products through covert protection on labels and packaging printed by digital, colour non-impact printers such as Indigo & Xeikon. this paper will review some of the products offered and how they can be applied as practical solutions to the problems faced. Also highlighted will be the expected performance requirements of such systems and how they compare with alternative solutions such as 2D bar codes, image scarring and secondary encoding routines.

Paper Details

Date Published: 1 April 1998
PDF: 8 pages
Proc. SPIE 3314, Optical Security and Counterfeit Deterrence Techniques II, (1 April 1998); doi: 10.1117/12.304679
Show Author Affiliations
Jeremy J. Plimmer, Label and Tag Security International (United Kingdom)

Published in SPIE Proceedings Vol. 3314:
Optical Security and Counterfeit Deterrence Techniques II
Rudolf L. van Renesse, Editor(s)

© SPIE. Terms of Use
Back to Top