International Security Products

News and Releases

Document Security Article from Document eMagazine
Check 21 Technology Article from The Green Sheet, Inc.

Fighting Fraud in the Registrar's Office

 


Article from The Greentree Gazette

Fighting Fraud in the Registrar’s Office

Executive Briefing
by Florence Kizza

June 2006

“I’ve seen my share of forged transcripts and degrees,” admits David Mosely Booze, Assistant Dean and Registrar at Savannah State University. “With the advent of high-tech computing, it’s become easier for people to produce forgeries.”

One preventive measure against document fraud is paper with built-in security features. “Transcript fraud runs rampant and it’s gotten a lot worse,” says Joyce Leiner, Director of Operations for International Security Products (ISP), a manufacturer of specialty papers and a Savannah State University supplier.

“Students may try to change a grade, for example. Security features can show the form has been tampered with. Other security features will show a document has been scanned or copied and is not an original,” Leiner adds.

Transcript paper can protect against chemical alternation. It can include a fingerprint seal to verify authenticity. Personalized holograms and other security features deter duplication, forgery, counterfeiting and washing. Visible and invisible security features can be layered.

“It’s a highly competitive world out there. People who didn’t go to school or finish school need credentials to say they did. We have to make doubly certain that those who haven’t earned the credentials don’t take advantage of us,” says Booze.

ISP’s products are the creation of inventor George Phillips. The company serves 250 universities and has been in the transcript market for ten years.

 


Article from DPTMAG.COM

Document Security
4000 BC to “Check 21st” Century
By George K. Phillips


The first record of securing information comes from the Greeks and is called Steganography — hiding messages in plain sight or covered writing. The Greeks practiced Steganography by shaving a messenger’s head, tattooing a secret message and then, after the hair grew back, sending the messenger to an informed recipient. His head would then be shaved to reveal the message. The most popular method was the wax tablet. Wax was removed from a wax writing tablet, and the underlying wood was engraved with a message. The wax was replaced over the wood and then inscribed with an innocent message which passed inspection by an uninformed inspector.


In a sense, the old saying of “What is old is new again” is true when it comes to Steganography — today we use message hiding for advanced security. US and foreign officials suspect that Osama bin Laden is using Steganography to pass embedded maps and photographs of terrorist targets through chat rooms and pornographic Web sites.

Experts estimate the worst counterfeiting in US history was accomplished between the years 1836 and 1866. It was during what was referred to as the “Free Banking Era.” US currency was printed without standards or uniformity in papers, sizes, designs or colors. This lack of uniformity created an environment where currency fraud was estimated to be a whopping 35% to 40%. Had you lived during this time, you would have had a hodgepodge of money printed by any number of entities or state-run banks, which all were different in appearance and value. A dollar issued by the city of Atlanta looked different and wasn’t necessarily the same value as a dollar printed in New York!

What can we learn from this, and how does it apply to the protection of sensitive information on our documents? Simply, first line inspection for authenticity by a casual observer, without knowledge of the variables of authenticity, is improbable, if not impossible. And, security technologies do not fail, but instead, the inspection analysis fails.

Generally speaking, we try to invent effective security features which are extremely difficult to replicate, can be recognized by a casual observer, are user-friendly and verify authenticity or identify falseness. First-line inspection requires security features to be unambiguous, self-explanatory, easily communicated, memorized and recognized.

Today, combating document fraud and especially protecting printed content is a multidisciplinary and international concern. The constant improvement of modern scanners with digital means of signal processing and color copiers has made it economically feasible to reproduce almost perfect-looking reproductions of currency and fraudulent travel documents. This same technology is now used every day to easily copy printed information for nefarious reasons.

Prior to 1970, document security features were almost non-existent; consisting mainly of intaglio printing, paper watermarks and foil applications. With the evolution of the computer and copy machines in the ‘60s and ‘70s, came the need to protect documents from being photocopied. In 1979, the first “copy-evident” printing technology was invented which alerted a casual observer that a copy was made of an original.

Copy Evident Security Technologies
Since the first copy-evident patents in 1979, many improved printing techniques have been developed to help protect against improper reproduction of original documents. These techniques were based on the phenomenon that photographic copiers have an element value (sometimes referred to as element or resolution frequency) threshold above which the photocopier is unable to distinguish individual elements of halftone printing.

In accordance with these techniques, a hidden warning message, such as “VOID” or “COPY,” is printed in a screen dot value within a halftone background on a substrate. The line screen dot value of the hidden warning message is selected; such that the elements of the hidden warning message are reproduced when photocopied. The line screen dot value of the background, however, is selected, such that the elements of the background are much smaller and would not easily reproduce when photocopied. As a result, and in theory, the hidden warning message will appear on duplicates of the original document made by photocopying.

Another “copy-evident” printing technique was developed in the 1980s and is referred to as screen angle modulation (SAM). With this technique, screen dots are replaced by minimal lines, which are printed in an orientation pattern to misregister with the scanning frequency protocol and produce a moire’ pattern, which creates the hidden warning message on a copy. Increasing the disparity between the hidden warning message and background elements by overprinting a camouflaging thermochromic ink pattern has greatly improved its anti-copy capability. This technique is patented and trademarked ThermoSafe.

While the above techniques have provided some degree of copy-evident protection of original documents with respect to most copiers, in recent years, digital scanners and color copiers continue to improve both their resolutions and digital filtering capabilities substantially. These new color copiers and scanners can reproduce at a very high resolution of 600 by 1200 or higher and have made the above techniques less effective in protecting original documents. By manipulating the control and filtering settings on these devices, copies can be made of original documents in which the hidden warning message does not readily appear on reproductions.

To help overcome these problems, in 2001, a new copy-evident technology, trademarked NaNOcopy, was introduced which improves on the limitations of the previous technologies. NaNOcopy utilizes micro-size nano structures to form the copy-evident warning message, which will appear on a copy of the document.

Micro Nano-structures form the foreground of the latent warning message; and another pattern, e.g., a conventional halftone or screened dot pattern, forms the background around the nano pattern latent warning message. The nano-pattern and the other pattern are configured, such that the foreground and background exhibit similar visual densities on an original of the document and exhibit substantially different visual densities on the copied document. This is accomplished by forming nano-structures with a plurality of adjacent elements that are configured to create digital frequency disturbances and trap printing matter such as ink or toner when electronically copied, thereby darkening the nano-pattern warning message on the copied document.

Creating digital copying frequency disturbances and trapping of the printing matter is facilitated by the structure design, modulation and miniature size of the adjacent elements, which are preferably less than one point print size. The modulation and plurality of adjacent elements that make up the nano-pattern can be combined into a series of nano-structures or shapes, e.g., stars, PolyGrams, circles, ovals, crosses, Xs or alpha-numerical characters to produce the desired darkening effect. Using nano alpha-numerical characters also provides the security printer the ability to formulate intricate secret algorithms and/or encryptions to add traceable value and further enhance the document’s security. This ability to use nano-structures adds powerful, second-line verification potential.

Check 21 Image Survivable Security
September 11, 2001 ushered in and accelerated the new age of Digital Image Exchange and the need for document survivable security. Effective October 28, 2004, all banks must conform to the Check Clearing For the 21st Century Act (Check 21) even if they do nothing to change their current check processing operations. The act creates a new legal instrument, a digitally printed substitute check, that is the legal equivalent of the original paper check. Under Check 21, all banks must accept substitute checks and cannot require that other banks present original checks to them.

Check 21 creates a tremendous problem of securing not only the original, but also the digital content and the substitute or Image Replacement Document (IRD). Most security technologies currently utilized will not survive the Check-To-Image conversion.

Utilizing image-based technologies such as barcoding, database verification, digital watermarking and nano-character image transformation for human and/or machine verification will be the new breed of security for the 21st century.

George K. Phillips is the CEO of International Security Products (ISP). Contact George at georgep@isp-vft.com or visit International Security Products.


Article from GREENSHEET.COM

11:22:01(CST) New Security Technology Verifies Digital Image of Paper Checks

PASO ROBLES, Calif., December 8, 2004--International Security Products has introduced a new image-survivable security technology that makes it possible to verify the authenticity of printed checks after they have been scanned and digitized by a bank or other financial institution.

This new technology is called ImageSECURE and involves the printing of microstructures at one level. Then, through a patent-pending technology, it embeds a secondary verifier into the background of the initial microstructures, all of which are printed behind the common areas of interest<payee amount and signature fields. The ImageSECURE area has six security layers and is virtually impossible to replicate digitally without detection.

This digital alphanumeric verifier can be an almost limitless range of custom patterns which, when scanned and compressed into a low-resolution bitmap image, form pixel-latent verification identifiers. These embedded or hidden images survive the scanning and compression process to become part of the digital check. The images can be verified visually or by machine with the development of appropriate software.

"The image-survivable security technology of ImageSECURE allows an inspector to determine whether a low-resolution bitmap was created by the original document or a counterfeit, long after the original has been destroyed," George Phillips, chief executive officer, said. "It works in concert with our other security measures to enable a bank to identify a counterfeit check at any point in the process cycle. From the point of presentment all the way down to the digital copy, this security technology can dramatically reduce a bank¹s, and/or corporate customer¹s, liability against fraudulent checks."

ImageSECURE is available through ProDocumentSolutions, which deploys the technology on checks printed with DocuCheck Watermark® security papers from Appleton.

ProDocumentSolutions is a sister company of International Security Products and offers a wide range of patented technologies that provide both covert and overt protection for product fraud or diversion protection. In addition, ProDocumentSolutions is a certified security printer, with the certification being awarded by the North American Security Products Organization, of which it is a member.

ImageSECURE technology enables confirmation of both digital and mechanical alterations. The confirmation hinges on the distinctive variations, formations, clusters or absence of pixels in the embedded verifier image.

"These latent, embedded images act as a distinct fingerprint of the digital document," Phillips explained. "It will show with reasonable certainty whether or not the digital check is a scan from a real or counterfeit check. And this technology is engineered to provide identification even at the low-resolution scanning level banks will use to keep file storage as small as possible."

ImageSECURE™ technology exceeds all requirements for the new federal law "Check Clearing for the 21st Century Act," or Check 21 for short. Check 21 went into effect Oct. 28, 2004. International Security Products launched ImageSECURE™ in October at the Xplor 2004 show in Dallas, Texas.

About International Security Products


International Security Products is an international company specializing in the development, production and marketing of technologies related to anti-fraud security solutions. Its mission is to engineer effective security methodologies to protect original content from replication, forgery and counterfeiting. For more information visit www.isp-vft.com

About Appleton
Appleton uses ideas that make a difference to create product solutions through its development and use of coating formulations and applications, encapsulation technology, and specialized and secure print services. The Company produces carbonless, thermal, security, inkjet and performance packaging products. Appleton is headquartered in Appleton, Wisconsin, and has manufacturing operations in Wisconsin, Ohio, Pennsylvania, and the United Kingdom, employs approximately 3,300 people, and is 100 percent employee-owned. For more information visit www.appletonideas.com.

ImageSECURE is a new image-survivable security technology from International Security Products that verifies the digital image of paper checks and provides full compliance with "Check 21" requirements. The new technology embeds a visual verifier that is printed in the background behind the common areas of interest on a check. These hidden images are virtually impossible to replicate digitally without detection. As shown in the bottom portion of the photo, the verifier survives the low-resolution scanning and compression process approved under "Check 21" guidelines. The bitmapped image that remains verifies that the scanned image was made from an authentic check.


(800) 853-0004 or info@isp-vft.com
International Security Products