Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.
SECURITY TECHNOLOGIES OVERVIEW 3 TOPIC 1: SECURITY TECHNOLOGIES OVERVIEW Two papers on this topic were presented, one by Richard Jotcham, Axess Technologies Ltd., and the other by Michael Kolodny, U.S. Army Research Laboratory. SECURITY TECHNOLOGIES OVERVIEW AND APPLICATIONS Richard Jotcham outlined the various kinds of security tags that are currently used in the commercial world and commented on each. Tags may be added directly to products or be associated with their packaging. The areas discussed were these: ⢠Biometric tags ⢠Covert tags ⢠Forensic level tags ⢠Product characteristic tags ⢠Coding tags ⢠Electronic tags Biometric Tags Biometric identification systems include DNA and fingerprint analysis, iris, hand, and facial recognition, retinal scanning, signature authentication, and speech recognition. All are widely used, although facial recognition technology currently has a high rate of false positives. Covert Tags Examples of covert tags are color-coded plastic particles 20â30 µm on a side distributed throughout a product and gem stones with 10 µm colored spheres inserted between the crystal grains. Another example given was tagging a car by spraying tiny particles containing the vehicle identification number (VIN) all over the underside, to help identify parts that might be later removed and sold by thieves. Many covert tags are read spectroscopically using visible, ultraviolet, or infrared light. For example, documents can be tagged with ultraviolet fluorescent compounds and identified by analyzing the time-resolved fluorescence decay.