72 research outputs found

    e-Counterfeit: a mobile-server platform for document counterfeit detection

    Full text link
    This paper presents a novel application to detect counterfeit identity documents forged by a scan-printing operation. Texture analysis approaches are proposed to extract validation features from security background that is usually printed in documents as IDs or banknotes. The main contribution of this work is the end-to-end mobile-server architecture, which provides a service for non-expert users and therefore can be used in several scenarios. The system also provides a crowdsourcing mode so labeled images can be gathered, generating databases for incremental training of the algorithms.Comment: 6 pages, 5 figure

    Currency security and forensics: a survey

    Get PDF
    By its definition, the word currency refers to an agreed medium for exchange, a nation’s currency is the formal medium enforced by the elected governing entity. Throughout history, issuers have faced one common threat: counterfeiting. Despite technological advancements, overcoming counterfeit production remains a distant future. Scientific determination of authenticity requires a deep understanding of the raw materials and manufacturing processes involved. This survey serves as a synthesis of the current literature to understand the technology and the mechanics involved in currency manufacture and security, whilst identifying gaps in the current literature. Ultimately, a robust currency is desire

    New authentication applications in the protection of caller ID and banknote

    Get PDF
    In the era of computers and the Internet, where almost everything is interconnected, authentication plays a crucial role in safeguarding online and offline data. As authentication systems face continuous testing from advanced attacking techniques and tools, the need for evolving authentication technology becomes imperative. In this thesis, we study attacks on authentication systems and propose countermeasures. Considering various nominated techniques, the thesis is divided into two parts. The first part introduces caller ID verification (CIV) protocol to address caller ID spoofing in telecommunication systems. This kind of attack usually follows fraud, which not only inflicts financial losses on victims but also reduces public trust in the telephone system. We propose CIV to authenticate the caller ID based on a challenge-response process. We show that spoofing can be leveraged, in conjunction with dual tone multi-frequency (DTMF), to efficiently implement the challenge-response process, i.e., using spoofing to fight against spoofing. We conduct extensive experiments showing that our solution can work reliably across the legacy and new telephony systems, including landline, cellular and Internet protocol (IP) network, without the cooperation of telecom providers. In the second part, we present polymer substrate fingerprinting (PSF) as a method to combat counterfeiting of banknotes in the financial area. Our technique is built on the observation that the opacity coating leaves uneven thickness in the polymer substrate, resulting in random translucent patterns when a polymer banknote is back-lit by a light source. With extensive experiments, we show that our method can reliably authenticate banknotes and is robust against rough daily handling of banknotes. Furthermore, we show that the extracted fingerprints are extremely scalable to identify every polymer note circulated globally. Our method ensures that even when counterfeiters have procured the same printing equipment and ink as used by a legitimate government, counterfeiting banknotes remains infeasible

    Cashing in on ATM Malware. A Comprehensive Look at Various Attack Types

    Get PDF
    ATM malware is one of the digital threats that have been around for a while now, with the discovery of the first known variant dating back to 2009. It should not be a surprise that it has become a mainstay in many cybercriminals’ arsenal because it can, plainly put, steal cold, hard cash. Trend Micro Forward-Looking Threat Research (FTR) Team and Europol’s European Cybercrime Centre (EC3

    Modernization of the Control System for Production and Turnover of Tobacco Products

    Get PDF
    The paper systematizes the international experience of the functioning of tracking and tracing tax stamps and tobacco products, namely on the impact of their introduction on the market and tax revenues. The arguments on the feasibility of application, functionality, cost of implementation, mechanism of financing of expenses, stakeholders etc. are determined. The technological decisions on tracking and tracking based on tax stamps and product brand tracking criteria are classified. Conceptual approaches to the creation and implementation of an electronic tobacco production control and circulation system in Ukraine are proposed.new editio

    Security protocols for EPC class-1 Gen-2 RFID multi-tag systems

    Full text link
    The objective of the research is to develop security protocols for EPC C1G2 RFID Passive Tags in the areas of ownership transfer and grouping proof

    Europol review 2016-2017.

    Get PDF

    Handheld near-infrared spectroscopy: state-of-the-art instrumentation and applications in material identification, food authentication, and environmental investigations

    Get PDF
    This present review article considers the rapid development of miniaturized handheld near-infrared spectrometers over the last decade and provides an overview of current instrumental developments and exemplary applications in the fields of material and food control as well as environmentally relevant investigations. Care is taken, however, not to fall into the exaggerated and sometimes unrealistic narrative of some direct-to-consumer companies, which has raised unrealistic expectations with full-bodied promises but has harmed the very valuable technology of NIR spectroscopy, rather than promoting its further development. Special attention will also be paid to possible applications that will allow a clientele that is not necessarily scientifically trained to solve quality control and authentication problems with this technology in everyday life.info:eu-repo/semantics/publishedVersio
    • …
    corecore