Skip to main content

Analysis of Document Security Features

  • Chapter
  • First Online:
Advances in Digital Forensics XIX (DigitalForensics 2023)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 687))

Included in the following conference series:

  • 143 Accesses

Abstract

Document fraud has been rising for several years, severely impacting individuals, organizations and governments. Security features in documents change significantly when documents are altered or reproduced, clearly identifying them as fraudulent. However, advancements in technology and the availability of special hardware and software enable criminals to create fraudulent documents despite the presence of security features.

It is important to classify document security features to gain insights into their unique characteristics, effectiveness and use cases. The classification supports the analysis of the robustness of document security and steers the development of new and improved security features to combat document fraud. This chapter classifies document security features based on three criteria, security feature types, inspection levels and security levels.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A. Ali, Mumbai: Bulgarian ran skimming scam from his room in Andheri, Times of India (Mumbai), December 14, 2021.

    Google Scholar 

  2. A. Anjali, A. Abhishek, S. Uttam and P. Verma, Comparison of various security features of genuine, scanned and photocopied Indian currency notes of denomination 2000, Journal of Forensic Science and Criminology, vol 5(3), pp. 1–12, 2017.

    Google Scholar 

  3. C. Borota, Printing techniques used to secure border-crossing documents, International Journal of Criminal Investigation, vol. 2(1), pp. 31–42, 2012.

    Google Scholar 

  4. S. Chhabra, G. Gupta, G. Gupta and M. Gupta, Indian currency database for forensic research, in Advances in Digital Forensics XVII, G. Peterson and S. Shenoi (Eds.), Springer, Cham, Switzerland, pp. 237–253, 2021.

    Google Scholar 

  5. H. Deinhammer, F. Loos, D. Schwarzbach and P. Fajmann, Direct laser engraving of intaglio printing plates, in Optical Security and Counterfeit Deterrence Techniques V, R. van Renesse (Ed.), International Society for Optics and Photonics (SPIE), Bellingham, Washington, pp. 184–193, 2004.

    Google Scholar 

  6. M. Graham, Fake holograms a 3D crime wave, Wired, February 7, 2007.

    Google Scholar 

  7. M. Hampden-Smith, S. Haubrich, R. Kornbrekke, J. Shah, R. Bhatia, N. Hardman and R. Einhorn, Overt security features through digital printing, in Optical Security and Counterfeit Deterrence Techniques VI, R. van Renesse (Ed.), International Society for Optics and Photonics (SPIE), Bellingham, Washington, pp. 230–239, 2006.

    Google Scholar 

  8. A. Juels, RFID security and privacy: A research survey, IEEE Journal on Selected Areas in Communications, vol. 24(2), pp. 381–394, 2006.

    Google Scholar 

  9. N. Karlikar, Maharashtra: Rs 2,000 fake notes worth Rs 8 crore seized in Thane, two arrested, Times of India (Thane), November 12, 2022.

    Google Scholar 

  10. C. Lampert, L. Mei and T. Breuel, Printing technique classification for document counterfeit detection, Proceedings of the International Conference on Computational Intelligence and Security, pp. 639–644, 2006.

    Google Scholar 

  11. E. Medina, Home Depot worker swapped \$387,500 in fake bills for real ones, officials say, New York Times, February 6, 2022.

    Google Scholar 

  12. J. Mercer, Evaluation of optical security features in ID documents, currency and stamps, in Optical Security and Counterfeit Deterrence Techniques IV, R. van Renesse (Ed.), International Society for Optics and Photonics (SPIE), Bellingham, Washington, pp. 323–332, 2002.

    Google Scholar 

  13. C. Nakamura, The Security Printing Practices of Banknotes, Senior Project, Department of Graphic Communication, California Polytechnic State University, San Luis Obispo, California, 2010.

    Google Scholar 

  14. Reserve Bank of India, Security Features of Indian Banknotes, Mumbai, India (rbi.org.in/Scripts/ic_banknotessecurity.aspx), 2023.

    Google Scholar 

  15. K. Santhanam, S. Sekaran, S. Vaikundam and A. Mani Kumarasamy, Counterfeit currency detection technique using image processing, polarization principle and holographic techniques, Proceedings of the Fifth International Conference on Computational Intelligence, Modeling and Simulation, pp. 231–235, 2013.

    Google Scholar 

  16. A. Sarkar, R. Verma and G. Gupta, Detecting counterfeit currency and identifying its source, in Advances in Digital Forensics IX, G. Peterson and S. Shenoi (Eds.), Springer, Berlin Heidelberg, Germany, pp. 367–384, 2013.

    Google Scholar 

  17. Security Printing and Minting Corporation of India, Security Products, New Delhi, India (www.spmcil.com/products), 2023.

  18. N. Sharma, Counterfeit medical products increased by 47% from 2020 to 2021, report shows, Business Today, March 29, 2022.

    Google Scholar 

  19. A. Upadhyaya, V. Shokeen and G. Srivastava, Counterfeit currency detection techniques, Proceedings of the Eighth International Conference on Cloud Computing, Data Science and Engineering, pp. 394–398, 2018.

    Google Scholar 

  20. R. van Renesse, Paper-based document security – A review, Proceedings of the European Conference on Security and Detection, pp. 75–80, 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaurav Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 IFIP International Federation for Information Processing

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Garg, P., Chhabra, S., Gupta, G., Srivastava, V., Gupta, G. (2023). Analysis of Document Security Features. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics XIX. DigitalForensics 2023. IFIP Advances in Information and Communication Technology, vol 687. Springer, Cham. https://doi.org/10.1007/978-3-031-42991-0_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-42991-0_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-42990-3

  • Online ISBN: 978-3-031-42991-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics