Currency security and forensics: a survey

被引:32
|
作者
Chambers, J. [1 ]
Yan, W. [1 ]
Garhwal, A. [1 ]
Kankanhalli, M. [1 ]
机构
[1] AUT Univ, Auckland, New Zealand
关键词
Currency forensics; Currency security; Banknote recognition; Substrate analysis; Ink analysis; Counterfeit currency; FORGERY DETECTION; CLASSIFICATION; QUALITY; IDENTIFICATION; SPECTROSCOPY; SEPARATION; BLACK;
D O I
10.1007/s11042-013-1809-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
By its definition, the word 'currency' refers to an agreed medium for exchange, a nation's currency is the formal medium enforced by the elected governing entity. Throughout history, issuers have faced one common threat: counterfeiting. Despite technological advancements, overcoming counterfeit production remains a distant future. Scientific determination of authenticity requires a deep understanding of the raw materials and manufacturing processes involved. This survey serves as a synthesis of the current literature to understand the technology and the mechanics involved in currency manufacture and security, whilst identifying gaps in the current literature. Ultimately, a robust currency is desired.
引用
收藏
页码:4013 / 4043
页数:31
相关论文
共 50 条
  • [41] A Survey On Anti-Forensics Techniques
    Gul, Murat
    Kugu, Emin
    2017 INTERNATIONAL ARTIFICIAL INTELLIGENCE AND DATA PROCESSING SYMPOSIUM (IDAP), 2017,
  • [42] A Survey on Digital Forensics in Internet of Things
    Hou, Jianwei
    Li, Yuewei
    Yu, Jingyang
    Shi, Wenchang
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (01): : 1 - 15
  • [43] PLANNING THE SELECTION AND ASSIGNMENT OF SECURITY FORENSICS COUNTERMEASURES
    Bajramovic, Edith
    Bochtler, Juergen
    Ben Zid, Ines
    Lainer, Andreas
    PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING, 2017, VOL 4, 2017,
  • [44] Cyber Incident Forensics as a Forward Lean Security
    Lee, Jooyoung
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 872 - 873
  • [45] Fog Computing: Issues and Challenges in Security and Forensics
    Wang, Yifan
    Uehara, Tetsutaro
    Sasaki, Ryoichi
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 53 - 59
  • [46] Digital Forensics Security Analysis on iOS Devices
    Wu, Min-Hao
    Chang, Ting-Cheng
    Yi Li-Min
    JOURNAL OF WEB ENGINEERING, 2021, 20 (03): : 775 - 793
  • [47] Media Watermarking, Security, and Forensics 2014 Introduction
    Alattar, Adnan
    Memon, Nasir
    Heitzenrater, Chad
    MEDIA WATERMARKING, SECURITY, AND FORENSICS 2014, 2014, 9028
  • [48] Internet of Things security and forensics: Challenges and opportunities
    Conti, Mauro
    Dehghantanha, Ali
    Franke, Katrin
    Watson, Steve
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 544 - 546
  • [49] Document imaging security and forensics ecosystem considerations
    Simske, Steven
    Sturgill, Margaret
    Adams, Guy
    Everest, Paul
    HP Laboratories Technical Report, 2010, (156):
  • [50] A survey on cloud forensics challenges and solutions
    Simou, Stavros
    Kalloniatis, Christos
    Gritzalis, Stefanos
    Mouratidis, Haralambos
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6285 - 6314