Abstract
Document fraud has been rising for several years, severely impacting individuals, organizations and governments. Security features in documents change significantly when documents are altered or reproduced, clearly identifying them as fraudulent. However, advancements in technology and the availability of special hardware and software enable criminals to create fraudulent documents despite the presence of security features.
It is important to classify document security features to gain insights into their unique characteristics, effectiveness and use cases. The classification supports the analysis of the robustness of document security and steers the development of new and improved security features to combat document fraud. This chapter classifies document security features based on three criteria, security feature types, inspection levels and security levels.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
A. Ali, Mumbai: Bulgarian ran skimming scam from his room in Andheri, Times of India (Mumbai), December 14, 2021.
A. Anjali, A. Abhishek, S. Uttam and P. Verma, Comparison of various security features of genuine, scanned and photocopied Indian currency notes of denomination 2000, Journal of Forensic Science and Criminology, vol 5(3), pp. 1–12, 2017.
C. Borota, Printing techniques used to secure border-crossing documents, International Journal of Criminal Investigation, vol. 2(1), pp. 31–42, 2012.
S. Chhabra, G. Gupta, G. Gupta and M. Gupta, Indian currency database for forensic research, in Advances in Digital Forensics XVII, G. Peterson and S. Shenoi (Eds.), Springer, Cham, Switzerland, pp. 237–253, 2021.
H. Deinhammer, F. Loos, D. Schwarzbach and P. Fajmann, Direct laser engraving of intaglio printing plates, in Optical Security and Counterfeit Deterrence Techniques V, R. van Renesse (Ed.), International Society for Optics and Photonics (SPIE), Bellingham, Washington, pp. 184–193, 2004.
M. Graham, Fake holograms a 3D crime wave, Wired, February 7, 2007.
M. Hampden-Smith, S. Haubrich, R. Kornbrekke, J. Shah, R. Bhatia, N. Hardman and R. Einhorn, Overt security features through digital printing, in Optical Security and Counterfeit Deterrence Techniques VI, R. van Renesse (Ed.), International Society for Optics and Photonics (SPIE), Bellingham, Washington, pp. 230–239, 2006.
A. Juels, RFID security and privacy: A research survey, IEEE Journal on Selected Areas in Communications, vol. 24(2), pp. 381–394, 2006.
N. Karlikar, Maharashtra: Rs 2,000 fake notes worth Rs 8 crore seized in Thane, two arrested, Times of India (Thane), November 12, 2022.
C. Lampert, L. Mei and T. Breuel, Printing technique classification for document counterfeit detection, Proceedings of the International Conference on Computational Intelligence and Security, pp. 639–644, 2006.
E. Medina, Home Depot worker swapped \$387,500 in fake bills for real ones, officials say, New York Times, February 6, 2022.
J. Mercer, Evaluation of optical security features in ID documents, currency and stamps, in Optical Security and Counterfeit Deterrence Techniques IV, R. van Renesse (Ed.), International Society for Optics and Photonics (SPIE), Bellingham, Washington, pp. 323–332, 2002.
C. Nakamura, The Security Printing Practices of Banknotes, Senior Project, Department of Graphic Communication, California Polytechnic State University, San Luis Obispo, California, 2010.
Reserve Bank of India, Security Features of Indian Banknotes, Mumbai, India (rbi.org.in/Scripts/ic_banknotessecurity.aspx), 2023.
K. Santhanam, S. Sekaran, S. Vaikundam and A. Mani Kumarasamy, Counterfeit currency detection technique using image processing, polarization principle and holographic techniques, Proceedings of the Fifth International Conference on Computational Intelligence, Modeling and Simulation, pp. 231–235, 2013.
A. Sarkar, R. Verma and G. Gupta, Detecting counterfeit currency and identifying its source, in Advances in Digital Forensics IX, G. Peterson and S. Shenoi (Eds.), Springer, Berlin Heidelberg, Germany, pp. 367–384, 2013.
Security Printing and Minting Corporation of India, Security Products, New Delhi, India (www.spmcil.com/products), 2023.
N. Sharma, Counterfeit medical products increased by 47% from 2020 to 2021, report shows, Business Today, March 29, 2022.
A. Upadhyaya, V. Shokeen and G. Srivastava, Counterfeit currency detection techniques, Proceedings of the Eighth International Conference on Cloud Computing, Data Science and Engineering, pp. 394–398, 2018.
R. van Renesse, Paper-based document security – A review, Proceedings of the European Conference on Security and Detection, pp. 75–80, 1997.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Garg, P., Chhabra, S., Gupta, G., Srivastava, V., Gupta, G. (2023). Analysis of Document Security Features. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics XIX. DigitalForensics 2023. IFIP Advances in Information and Communication Technology, vol 687. Springer, Cham. https://doi.org/10.1007/978-3-031-42991-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-031-42991-0_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-42990-3
Online ISBN: 978-3-031-42991-0
eBook Packages: Computer ScienceComputer Science (R0)