Home 2012
Yearly Archives: 2012
Keesing Journal 37
Editorial:
Security: Who pays? Who cares?
Design:
The golden harmony of Fibonacci
Striking a fine balance in banknote design
Geberal interest:
Protecting intellectual property
Multimodal biometric...
Keesing Journal 38
Innovation:
Palm vein authenticaton and its applications
High accuracy biometric authentication
General interest:
Defining ID cards with ISO/IEC 24789
A new durability standard for the...
Keesing Journal 39
General interest:
Image production for identity documents
Why achieving optimal image quality is not as easy as it seems
Cases analysed:
Biocryptography
Increasing the protection...
Selection of biometric electoral enrolment systems
The issue of electoral integrity is one that plagues election commissions worldwide, from developed democracies such as the United States of America to rising...
New initiative to support document examination
To ensure that both frontline immigration and border control officers and document examiners can carry out their important responsibilities, the need for continuing support...
Secure colour personalisation
Due to the global use of electronic identity documents, conventional paper documents are increasingly being replaced by modern polymer cards. For these cards, polycarbonate...
Optical effect of novel structural colour OVD
Optically variable devices (OVDs) display special visual effects such as colour-shifting and image-shifting representation. OVDs which are composed of microscopic structures are quite different...
Transliteration of Arabic in MRTDs
ICAO specifies that when a name is “in a national language that does not use the Latin alphabet,
a transliteration shall also be provided.” Although...
An introduction to the Biometrics Constitution
Although we have been employing the concept of biometrics in relation to identity verification for a very long time, many people still perceive biometrics...
Palm vein authentication systems and its applications
In recent years, biometric authentication technologies have been widely deployed as a means to verify an individual's identity to prevent information leaks or identity...