
Proceedings Paper
Evaluation of the use of 3D printing and imaging to create working replica keysFormat | Member Price | Non-Member Price |
---|---|---|
$17.00 | $21.00 |
Paper Abstract
This paper considers the efficacy of 3D scanning and printing technologies to produce duplicate keys. Duplication of
keys, based on remote-sensed data represents a significant security threat, as it removes pathways to determining who
illicitly gained access to a secured premises. Key to understanding the threat posed is the characterization of the easiness
of gaining the required data for key production and an understanding of how well keys produced under this method
work. The results of an experiment to characterize this are discussed and generalized to different key types. The effect
of alternate sources of data on imaging requirements is considered.
Paper Details
Date Published: 26 May 2016
PDF: 14 pages
Proc. SPIE 9823, Detection and Sensing of Mines, Explosive Objects, and Obscured Targets XXI, 98230G (26 May 2016); doi: 10.1117/12.2225187
Published in SPIE Proceedings Vol. 9823:
Detection and Sensing of Mines, Explosive Objects, and Obscured Targets XXI
Steven S. Bishop; Jason C. Isaacs, Editor(s)
PDF: 14 pages
Proc. SPIE 9823, Detection and Sensing of Mines, Explosive Objects, and Obscured Targets XXI, 98230G (26 May 2016); doi: 10.1117/12.2225187
Show Author Affiliations
Jeremy Straub, Univ. of North Dakota (United States)
Scott Kerlin, Univ. of North Dakota (United States)
Published in SPIE Proceedings Vol. 9823:
Detection and Sensing of Mines, Explosive Objects, and Obscured Targets XXI
Steven S. Bishop; Jason C. Isaacs, Editor(s)
© SPIE. Terms of Use
