Currency security and forensics: a survey

被引:32
|
作者
Chambers, J. [1 ]
Yan, W. [1 ]
Garhwal, A. [1 ]
Kankanhalli, M. [1 ]
机构
[1] AUT Univ, Auckland, New Zealand
关键词
Currency forensics; Currency security; Banknote recognition; Substrate analysis; Ink analysis; Counterfeit currency; FORGERY DETECTION; CLASSIFICATION; QUALITY; IDENTIFICATION; SPECTROSCOPY; SEPARATION; BLACK;
D O I
10.1007/s11042-013-1809-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
By its definition, the word 'currency' refers to an agreed medium for exchange, a nation's currency is the formal medium enforced by the elected governing entity. Throughout history, issuers have faced one common threat: counterfeiting. Despite technological advancements, overcoming counterfeit production remains a distant future. Scientific determination of authenticity requires a deep understanding of the raw materials and manufacturing processes involved. This survey serves as a synthesis of the current literature to understand the technology and the mechanics involved in currency manufacture and security, whilst identifying gaps in the current literature. Ultimately, a robust currency is desired.
引用
收藏
页码:4013 / 4043
页数:31
相关论文
共 50 条
  • [21] Technology approaches to currency security
    Murphy, JC
    Dubbel, D
    Benson, R
    OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES II, 1998, 3314 : 21 - 28
  • [22] Security and privacy in the Computer Forensics context
    Sirinivasan, S.
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 226 - 228
  • [23] Digital Forensics Curriculum in Security Education
    Srinivasan, S.
    JOURNAL OF INFORMATION TECHNOLOGY EDUCATION-INNOVATIONS IN PRACTICE, 2013, 12 : 147 - 157
  • [24] Forensics for industrial cyber security investigations
    不详
    CONTROL ENGINEERING, 2009, 56 (03) : 22 - 22
  • [25] VANET security and forensics: Challenges and opportunities
    Abassi, Ryma
    WILEY INTERDISCIPLINARY REVIEWS: FORENSIC SCIENCE, 2019, 1 (02):
  • [26] Vehicle Security and Forensics in Mauritius and Abroad
    Paupiah, Pravin Selukoto
    2015 International Conference on Computing, Communication and Security (ICCCS), 2015,
  • [27] IPv6 Security and Forensics
    Nicolls, Vincent
    Le-Khac, Nhien-An
    Chen, Lei
    Scanlon, Mark
    2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2016, : 743 - 748
  • [28] Security Breach and Forensics in Intelligent Systems
    Devi, M. S. Girija
    Nene, Manisha J.
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS, ICTIS 2018, VOL 2, 2019, 107 : 349 - 360
  • [29] Forensics and security issues in the Internet of Things
    Ahmed, Shams Forruque
    Shawon, Shanjana Shuravi
    Bhuyian, Afsana
    Afrin, Shaila
    Mehjabin, Aanushka
    Kuldeep, Sweety Angela
    Bin Alam, Md. Sakib
    Gandomi, Amir H.
    WIRELESS NETWORKS, 2025, : 3431 - 3466
  • [30] Evidence gathering for network security and forensics
    Divakaran, Dinil Mon
    Fok, Kar Wai
    Nevat, Ido
    Thing, Vrizlynn L. L.
    DIGITAL INVESTIGATION, 2017, 20 : S56 - S65