Share Email Print
cover

Proceedings Paper

Evaluating security of a clone preventive techinque using physical randomness and cryptography
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

Clone resistance of most of all anti-counterfeiting techniques depends upon secret identifiers or difficulty of reproduction. However, these kinds of techniques are no use if a counterfeiter has enough financial a power to work the secret out or toe overcome the difficulty. We have focused on, among others, random patterns which can be inevitably difficult to reproduce. Consequently, we have developed a document protection system which utilizes random patterns of magnetic micro-fibers in substrates of documents. We have also applied cryptography to the system. The system verifies and authenticates a stochastic feature using pre-stored template data and a digital signature. The stochastic feature and the digital signature respectively prevent 'dead copying' and counterfeiting/alteration of the recorded data such as a value of the card. Therefore security of the system depends upon difficulty both in reproduction of the stochastic feature and in analysis of the digital signature. We have evalut3ed the security of the system for several kinds of criminal attacks. Some criminals may try to counterfeit a stochastic feature by modeling on a genuine document. In our paper we discuss security evaluation of our document protection system against such kinds of criminal methods and also discus a countermeasure and its difficulty.

Paper Details

Date Published: 7 April 2000
PDF: 14 pages
Proc. SPIE 3973, Optical Security and Counterfeit Deterrence Techniques III, (7 April 2000); doi: 10.1117/12.382182
Show Author Affiliations
Hiroyuki Matsumoto, NHK Spring Co., Ltd. (Japan) and Yokohama National Univ. (Japan)
Tsutomu Matsumoto, Yokohama National Univ. (Japan)


Published in SPIE Proceedings Vol. 3973:
Optical Security and Counterfeit Deterrence Techniques III
Rudolf L. van Renesse; Willem A. Vliegenthart, Editor(s)

© SPIE. Terms of Use
Back to Top