Share Email Print

Proceedings Paper

Probabilistic risk assessment for comparative evaluation of security features
Author(s): Anshu Saksena; Dennis Lucarelli
Format Member Price Non-Member Price
PDF $17.00 $21.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

A systematic approach for comparing the effectiveness of counterfeit deterrence features in banknotes, credit cards, digital media, etc. was previously presented. That approach built a probabilistic model around the expert identification of the most efficient process by which a counterfeiter can gain sufficient information to replicate a particular feature. We have extended the scope and functionality of that approach to encompass the entire counterfeiting process from the learning phase to the production of counterfeits. The extended approach makes determining the probabilities more straightforward by representing a more detailed model of the counterfeiting process, including many probable counterfeiting scenarios rather than just representing the least costly successful scenario. It uses the counterfeiter's probability of succeeding and level of effort as metrics to perform feature comparisons. As before, these metrics are evaluated for a security feature and presented in a way that facilitates comparison with other security features similarly evaluated. Based on this representation, the cost and laboratory procedures necessary for succeeding may be recovered by a dynamic programming technique. This information may be useful in forensic profiling of potential counterfeiters.

Paper Details

Date Published: 3 June 2004
PDF: 8 pages
Proc. SPIE 5310, Optical Security and Counterfeit Deterrence Techniques V, (3 June 2004); doi: 10.1117/12.526992
Show Author Affiliations
Anshu Saksena, Johns Hopkins Univ. (United States)
Dennis Lucarelli, Johns Hopkins Univ. (United States)

Published in SPIE Proceedings Vol. 5310:
Optical Security and Counterfeit Deterrence Techniques V
Rudolf L. van Renesse, Editor(s)

© SPIE. Terms of Use
Back to Top