Home 2012

Yearly Archives: 2012

Keesing Journal 37

0
Editorial: Security: Who pays? Who cares? Design: The golden harmony of Fibonacci Striking a fine balance in banknote design Geberal interest: Protecting intellectual property Multimodal biometric...

Keesing Journal 38

0
Innovation: Palm vein authenticaton and its applications High accuracy biometric authentication General interest: Defining ID cards with ISO/IEC 24789 A new durability standard for the...

Keesing Journal 39

0
General interest: Image production for identity documents Why achieving optimal image quality is not as easy as it seems Cases analysed: Biocryptography Increasing the protection...

Selection of biometric electoral enrolment systems

0
The issue of electoral integrity is one that plagues election commissions worldwide, from developed democracies such as the United States of America to rising...

New initiative to support document examination

0
To ensure that both frontline immigration and border control officers and document examiners can carry out their important responsibilities, the need for continuing support...

Secure colour personalisation

0
Due to the global use of electronic identity documents, conventional paper documents are increasingly being replaced by modern polymer cards. For these cards, polycarbonate...

Optical effect of novel structural colour OVD

0
Optically variable devices (OVDs) display special visual effects such as colour-shifting and image-shifting representation. OVDs which are composed of microscopic structures are quite different...

Transliteration of Arabic in MRTDs

0
ICAO specifies that when a name is β€œin a national language that does not use the Latin alphabet, a transliteration shall also be provided.” Although...

An introduction to the Biometrics Constitution

0
Although we have been employing the concept of biometrics in relation to identity verification for a very long time, many people still perceive biometrics...

Palm vein authentication systems and its applications

0
In recent years, biometric authentication technologies have been widely deployed as a means to verify an individual's identity to prevent information leaks or identity...