Monthly Archives: February 2018
Preserving privacy identity management mechanisms
In this article we will discuss the ins and outs of privacy for a digital identity solution, but first we will introduce the key...
Pay-by-face
Ravi Das
There is no doubt that the smartphone is a vital aspect of modern life. We have discovered the convenience of online shopping using...
The human factor
Migrants often have trouble finding employment – doubly so, if they lack a legal identity or identity documents. The 1992 crash of a cargo...
A designer’s view
The banknote designer sits between satisfying strict technical requirements, and offering the world a touchstone onto a country’s distinctive culture. A good designer seamlessly...
3D enrolment improves face recognition
Although 2D face recognition technology has improved recently, the quality of 2D images captured is often still poor, due in part to the sensitivity to capture...
Face verification robustness & camera-subject distance
After the international standardisation working group responsible for machine-readable travel documents (ISO/IEC JTC1/SC17/WG3) raised the question whether magnification distortion of facial images affected the...
The art of security design
Security design is truly an art of deception. It requires a special skill to create something beautiful and symbolic, but it also demands a...
Security by Design: False Split Fountains
Joel Zlotnick, Jordan Brough and Troy Eberhardt
The first three papers in this series described how counterfeiters reverse engineer security document artwork and proposed security...