Currency security and forensics: a survey

被引:32
|
作者
Chambers, J. [1 ]
Yan, W. [1 ]
Garhwal, A. [1 ]
Kankanhalli, M. [1 ]
机构
[1] AUT Univ, Auckland, New Zealand
关键词
Currency forensics; Currency security; Banknote recognition; Substrate analysis; Ink analysis; Counterfeit currency; FORGERY DETECTION; CLASSIFICATION; QUALITY; IDENTIFICATION; SPECTROSCOPY; SEPARATION; BLACK;
D O I
10.1007/s11042-013-1809-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
By its definition, the word 'currency' refers to an agreed medium for exchange, a nation's currency is the formal medium enforced by the elected governing entity. Throughout history, issuers have faced one common threat: counterfeiting. Despite technological advancements, overcoming counterfeit production remains a distant future. Scientific determination of authenticity requires a deep understanding of the raw materials and manufacturing processes involved. This survey serves as a synthesis of the current literature to understand the technology and the mechanics involved in currency manufacture and security, whilst identifying gaps in the current literature. Ultimately, a robust currency is desired.
引用
收藏
页码:4013 / 4043
页数:31
相关论文
共 50 条
  • [31] A Survey of Passive Image Forensics
    Wei, Weimin
    Sun, Liping
    Tang, Dongjie
    Zhao, Yan
    Li, Hongjiao
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 45 - 55
  • [32] A SURVEY OF SOCIAL NETWORK FORENSICS
    Karabiyik, Umit
    Canbaz, Muhammed Abdullah
    Aksoy, Ahmet
    Tuna, Tayfun
    Akbas, Esra
    Gonen, Bilal
    Aygun, Ramazan S.
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2016, 11 (04) : 55 - 128
  • [33] The Role of Nuclear Forensics in Nuclear Security
    Fedchenko, Vitaly
    STRATEGIC ANALYSIS, 2014, 38 (02) : 230 - 247
  • [34] A Survey on Anonymity of Digital Currency
    Fu S.
    Xu H.-X.
    Li P.-L.
    Ma T.-J.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 1045 - 1062
  • [35] Application of Fuzzy Logic in Computer Security and Forensics
    Al Amro, S.
    Chiclana, F.
    Elizondo, D. A.
    COMPUTATIONAL INTELLIGENCE FOR PRIVACY AND SECURITY, 2012, 394 : 35 - +
  • [36] Data-driven multimedia forensics and security
    Rocha, Anderson
    Li, Shujun
    Kuo, C. -C. Jay
    Piva, Alessandro
    Huang, Jiwu
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 55 : 447 - 448
  • [37] A continuous combination of security & forensics for mobile devices
    Mondal, Soumik
    Bours, Patrick
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 : 63 - 77
  • [38] Evolutionary Computation in Computer Security and Forensics: An Overview
    Al Amro, Sulaiman
    Elizondo, David A.
    Solanas, Agusti
    Martinez-Balleste, Antoni
    COMPUTATIONAL INTELLIGENCE FOR PRIVACY AND SECURITY, 2012, 394 : 25 - +
  • [39] Planning the Selection and Assignment of Security Forensics Countermeasures
    Bajramovic, Edita
    Bochtler, Juergen
    Ben Zid, Ines
    Lainer, Andreas
    JOURNAL OF NUCLEAR ENGINEERING AND RADIATION SCIENCE, 2018, 4 (04):
  • [40] Cyberspace Forensics Readiness and Security Awareness Model
    Al-Mahrouqi, Aadil
    Abdalla, Sameh
    Kechadi, Tahar
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (06) : 123 - 127