www.homai.org6
The Holography Times
Vol. 7, Issue 20
Steps to identify
authentication solutions
to curb counterfeiting
By C S Jeena
Counterfeiting is menace for brand owners and Government authorities. In
over a decade the problem has expanded rapidly and is now not limited to
luxury goods and developed economies. There are any numbers of reports
available on internet discussing the loss to industry and people due to
counterfeiting.
Over the years, in order to prevent counterfeiting from plaguing their
business, brand owners started using authentication solutions. With
the availability of various authentication solutions, companies and
Government authorities are facing problem in selection of a specific
authentication solution as the adoption of any given solution is a complex
question involving issues, amongst others, of cost, compatibility, feasibility
and reliability, and there are divergent views on which technologies
should be adopted and the timing for their adoption. While these
solutions can sometimes add to the problem, the right selection, usage
& implementation of authentication solutions helps companies and
authorities to keep them one step ahead of counterfeiting.
In this article, we try to explain, “Steps to identify authentication solutions
to curb counterfeiting”.
Introduction:
The selection of an authentication1
solutions that protects a document
or product is a complex process
and necessitates review of a
number of factors regarding the
role and implementation of the
technology. Not all authentication
solutions and security features are
appropriate for all applications.
It is important to understand the
strengths and limitations inherent
to different technologies, as well as
between similar features supplied
by different manufacturers.
For example: Use of a security
watermark2
in a liquor tax stamp3
which is afϐixed to bottles. The
goal is to introduce a security
watermark as a new overt feature.
The liquor tax stamp has a far
smaller user population (mostly
inspectors) than currency, and
this smaller population is better
trained and equipped to examine
taxstampsthanthegeneralhuman
being. This could allow for the
use of a covert (or even forensic)
feature,butithasbeendetermined
by authorities that in this case the
risk of counterfeiting is not great
enough to invest in equipment or
tools and that an overt feature is
preferred for the sake of simplicity.
The authentication of a watermark
is performed by holding the
document up to alight. But in this
case the document is a tax stamp
secured to a glass bottle and it will
only be possible to authenticate
the feature if the bottle and its
contents are transparent (or at
least translucent). Many liquor
bottles and liquors are opaque and
would not allow sufϐicient light
transmission for authentication. It
isdeterminedthateventhoughthe
user population would otherwise
be capable of authenticating this
feature, the wide range of the
environment–from transparent
to opaque–makes the use of a
Footnotes:
1. Authentication - Authentication is the
process of conϔirming that a product,
document or even person is authentic. This
is usually achieved by looking for speciϔic
attributes such as product and document
features and security additions such as
holograms, optically variable devices, optical
variable inks etc.
2. Watermark: A design, symbol or pattern
imparted in paper by a raised wire design
on a roll (a dandy roll) as the wet paper is
being formed on a mesh as it passes through
the wet-end drainage process on a paper-
making machine.
3. Tax stamp – A revenue stamp, tax stamp
or ϔiscal stamp is a (usually) adhesive label
used to collect taxes or fees on documents,
tobacco, alcoholic drinks, drugs and and
many other things. Used by governments
as duty and excise stamps. These are high
security documents which contained security
features such as hologram.
Cover Story
www.homai.org 7
The Holography Times
Vol. 7, Issue 20
Cover Story
security watermark in a liquor tax
stamp unusable. This situation is
an example of how a widely used
and popular feature is rendered
ineffective by environmental
circumstances. In order to avoid
such circumstances, Organisation
can follow basic guidelines such
as;
1. Purpose of using
authentication solutions
The organisation needs to
understand the purpose of using
authentication solutions. As a ϐirst
step most organisations should
assess the risk to their brand such
as
i) Does the product have chances
of being counterfeited or is it
already being counterfeited;
ii) If it is being counterfeited, then
isitinformoftampering,pilfering,
duplication or, by misleading the
consumer by adopting a look-a-
like form of identiϐication;
iii) Is the risk of counterfeiting in
the form of digital or non-digital?
iv) What the impact such
solutions may have on the brand?
Once the purpose is clear, the
organisation can evaluate the
authentication solutions or
security feature based on various
parameters.
2. Selection of
authentication solutions
In today’s fast changing
technological world, scores of
different authentication solutions
are available in the market. These
days,twofamiliesofauthentication
solutions are in use, physical4
and
logical security5
features to secure
packaging materials and products,
(see ϐigure 1). In selecting them
various trade-offs are necessary
between security and usability. To
evaluate whether a given solution
will address a given security
problem, the security problem
must ϐirst be clearly deϐined.
2.1 Basic property
The solutions should be
extremely difϐicult to copy and
tamper evident6
;
2.2 Audience
The solutions should provide
easy identiϐication to user,
and facilitate product
authentication. Security features
of authentication solutions must
be tailored to the intended user
population, the group of people
responsible for authenticating
the feature. The user population
could include the entire public-
4. Physical Security: Physical security features
are substances or products which are
introduced into, or attached to packaging
materials and / or products. The presence
of these security substances is veriϔied to
authenticate the protected item. As the
manufacturing process of security products
is conϔidential and highly secure and its
availability is strictly limited, it is very
difϔicult to counterfeit products secured in
this way.
5. Logical Security: Features are based
on encryption technologies, allowing
the integration of hidden data into
images / artworks (steganography /
digital watermarks) and supporting the
authentication of the product. It is also
possible to register the surface structure of
packaging material which is unique. With
this data, an individual “ϔingerprint” of each
individual packaging item can be made.
6. Tamper evident - Tamper-evident describes
a device or process that makes unauthorized
access to the protected object easily detected.
Seals, markings or other techniques may be
tamper indicating.
Figure 1: Overview of security technologies
Authentication
Solutions Serialisation
Security Technologies
Printed
PhysicalLogical
Cryptographic
Identiϐication
Structure
Analysis
Track and
Trace
Inks / Taggants OVDs and
Hologram
www.homai.org8
The Holography Times
Vol. 7, Issue 20
Cover Story
for example, if the product being
secured is currency, or if it is a
bottle of a widely sold over-the-
counter medication. The user
population might be a smaller
group in the case of a more
specialized product. If the user
population is large or has limited
interest in authenticating the
feature, it may be impractical
to supply complicated security
features, whereas if the user
population is small and
specialized, security features of
any complexity can be selected.
For example, in a survey by Dutch
National Bank to measure the
public understanding of security
features, it was revealed that out
of seven selected features, the
Hologram came out second with
55 per cent public recognition.
2.3 Authentication layers
The solutions should provide
multiple levels of authentication.
Generally most of the
authentication solutions provide
one or two level of authentication
layers. However, solutions such
as high security hologram can
provide three authentication
layers for different users. The
each level of security hologram is
designed for a speciϐic purpose.
Level one feature can be overt
(veriϐication by human eye) and
can be used for identiϐication and
veriϐication by consumer. Level
two, covert (veriϐication by a
predetermined device or a tool)
can be used by manufacturer
or their channel partner for an
advanced level of authentication
and veriϐication. The third level
is highly sophisticated and can be
used by forensic experts and can
be useful to law enforcement and
for evidence in case of litigation.
2.4 Environment factors
The solution should work well
in different environmental
situations (heat, cold, humidity,
water, ϐire, chemical exposure,
etc). For example, polyester
based security holographic excise
adhesive label (HEAL) are used
by excise authorities in India as
they does not wear during transit,
handling or in contact with water
because of its property and work
well in various environmental
and climatic conditions. The
security features incorporated
in HEAL does not varnish when
it comes in contact with water,
dust, heat, moisture, etc because
of non-usage of ink.
2.5 Easy integration
Authentication solutions should
have feasibility to be integrated
with the automated production/
packaginglineifrequired,especially
wherever the volumes are large.
While selecting authentication
solutions it is always
recommended to adopt a layered
approach combining use of overt,
semi-covert, and / or covert
technologies to provide a solution
that is more difϐicult to copy.
3. Selection of vendor7
providing authentication
solutions
Once you have identiϐied the
solution, you can proceed to the
selection of an ethical vendor. The
selection of vendor is as important
as selection of authentication
solution. The ethical vendor will
work as your authentication
partner, will understand and
identify your problem areas
and concerns and will suggest
the optimised solution. The
brand owners can evaluate
authentication solutions provider
(vendor)onfollowingparameters;
3.1 Good corporate practices
Evaluate the vendor on its
corporate practices. Ideally, the
vendor should have adopted
good corporate practices, behave
in ethical manner and should
be following the prescribed
Code of Conduct of its industry
association.
3.2 Innovative
Being a step ahead is the mantra in
anti-counterfeiting industry. Most
7. Vendor – Here it means the manufacturer
& provider of authentication technology,
systems or solutions
www.homai.org 9
The Holography Times
Vol. 7, Issue 20
Cover Story
of the ethical vendors upgrade
their facilities and solutions to
keep themselves & their customer
one step ahead of counterfeiters.
They can suggest & provide
various solutions according to
brand protection objectives and
the changing times.
3.3 Secure environment
The vendor should have an
in-house facility to produce
these solutions under a secure
environment. The vendor must
take all possible measures and
precautions for maintaining
adequate security and secrecy.
3.4 Reference and experience
Vendor should have good
experience of providing
authentication solutions. A
vendor reference should always
be taken from his existing
customers, or you can get
the help from trade industry
association.
In case your vendor is security
hologram manufacturers, you can
add two more steps such as;
3.5 Member of HoMAI / IHMA
He should be a member of
trade bodies such as Hologram
Manufacturers Association of
India (HoMAI) or International
Hologram Manufacturer
Association (IHMA).
3.6 Registered hologram under
HIR8
The Hologram manufacturers
association of India has the
arrangement with Counterfeit
Intelligence Bureau (CIB)9
,
London so that each HOMAI
member can register their
security hologram with CIB.
The selection & usage of
solutions can be a complex
and time consuming process,
however, the selection and
proper implementation of the
right technologies will invariably
lead to long term beneϐits to the
brand owner.
As a further step, the Brand
Owner / Authorities can also
adopt a new ISO Standard ISO:
12931 titled “Performance
criteria for authentication tools
used in anti-counterfeiting or
material goods”. This is a very
useful document for a brand
owner wishing to adopt globally
accepted standards and approach
to ϐighting against the counterfeit.
This can be seen at http://
www.iso.org/iso/catalogue_
detail?csnumber=52210.
All effective solutions, broadly
speaking, help in identifying
and authenticating the original
from counterfeit. They deepen
the divide between genuine
products and their counterfeits
by making a genuine product
distinguishable in some manner
that is difϐicult to replicate
using commercially available
manufacturing processes.
However, it is very important that
a planned surveillance program
be in place to constantly monitor
that there is no infringement is
seen, an immediate action must
be taken so that the guilty is
punished.
Reference:
1. Brand protection challenges and solutions
by Pradip H Shroff, ϔirst published in the
holography times, February 2011, volume 4 &
issue 11.
2. ISO Standards 12931 “Performance criteria for
authenticationtoolsusedinanti-counterfeiting
or material goods” http://www.iso.org/iso/
catalogue_detail?csnumber=52210
3. How to select a security feature, published by
The Document Security Alliance and The North
American Security Products Organisation. www.
documentsecurityalliance.com; www.naspo.org
4. Authentication Technologies for Brand
Protection report published by National
Electrical Manufacturer Association (NEMA),
USA. www.nema.org
5. Hologram Manufacturers Association of India
(HoMAI), www.homai.org
6. International Hologram Manufacturers
Association (IHMA), www.ihma.org
7. Hologram Image Register, http://www.
iccwbo.org/Products-and-Ser vices/
Fighting-Commercial-Crime/Counterfeiting-
Intelligence-Bureau/Hologram-Image-
Register/
8. HIR –A unique and only image register in
security industry, where hologram producers
register their hologram.
9. Counterfeit Intelligence Bureau (CIB)- CIB
is one of the world’s leading organisations
dedicated to combating the counterfeiting
of products and documents, protecting the
integrity of intellectual property and brands,
and preventing copyright abuse. CIB has
a dedicated team of internet investigators
to combat this trade. CIB also hosts the
International Hologram Image Register.
C S Jeena is Secretary Hologram
Manufacturers Association of India,
Editor The Holography Times, member of
Association of Certified Fraud Examiner
(ACFE) & Global Association of Risk
Professionals (GARP). Comments are
welcome at cjhomai@gmail.com.

More Related Content

PDF
Authentication Technologies An Overview
PDF
Is Hologram Packaging the 6th P of marketing?
PDF
Coded holograms-keeping-the-supply-chain-secure
PDF
Use of holograms as security and authentication devices in india
PDF
Brand counterfeiting and solutions for its prevention
PDF
Counterfeiting & the ways to tackle this menace in west bengal
PDF
The Authentication Times issue 27 August 2015
Authentication Technologies An Overview
Is Hologram Packaging the 6th P of marketing?
Coded holograms-keeping-the-supply-chain-secure
Use of holograms as security and authentication devices in india
Brand counterfeiting and solutions for its prevention
Counterfeiting & the ways to tackle this menace in west bengal
The Authentication Times issue 27 August 2015

What's hot (20)

PDF
Authentication technology / Solutions Empowering Farmers, Industry and Govern...
PDF
The Holography Times, September 2008, Volume 2, Issue No 4
PDF
The Holography Times, October 2012, Volume 6, Issue no 19
PDF
The Holography Times, January 2013, Volume 7, Issue no 20
PDF
The Holography Times, July 2009, Volume 3, Issue No 7
PDF
Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...
PDF
The authentication times issue 35
PDF
The Holography Times, November 2013, Volume 7, Issue no 22
PDF
How to select authentication solutions according to your needs
PDF
Recent trends & developments in holographic tax stamp in india
PDF
The Authentication Times issue 32
PDF
The Holography Times, June 2012, Volume 6, Issue no 18
PDF
The authentication times march 2015 volume 9 issue 26
PDF
Ht issue 16 201112
PDF
The Holography Times, June 2013, Volume 7, Issue no 21
PDF
The Holography Times, March 2012, Volume 6, Issue no 17
PDF
The Authentication Times, October 2014, Volume 8, Issue 25
PDF
The Authentication Times, Issue 30
PPT
How to combat electrical and electronic components counterfeiting?
PDF
Fashion
Authentication technology / Solutions Empowering Farmers, Industry and Govern...
The Holography Times, September 2008, Volume 2, Issue No 4
The Holography Times, October 2012, Volume 6, Issue no 19
The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, July 2009, Volume 3, Issue No 7
Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...
The authentication times issue 35
The Holography Times, November 2013, Volume 7, Issue no 22
How to select authentication solutions according to your needs
Recent trends & developments in holographic tax stamp in india
The Authentication Times issue 32
The Holography Times, June 2012, Volume 6, Issue no 18
The authentication times march 2015 volume 9 issue 26
Ht issue 16 201112
The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, March 2012, Volume 6, Issue no 17
The Authentication Times, October 2014, Volume 8, Issue 25
The Authentication Times, Issue 30
How to combat electrical and electronic components counterfeiting?
Fashion
Ad

Viewers also liked (18)

PDF
Authentication Solutions to stop the Scourge of Spurious Medicines
PDF
Counterfeit threat-for-electronics-industry-on-rise-plug-it
PDF
Serialization for the pharmaceutical industry an overview
PDF
Identify fake pesticides with authentication solutions in India
PDF
Identity document challenges and solutions
PDF
High tech hologram can uproot tobacco counterfeiting
PDF
Evolution of Polymer Banknotes Pros and Cons
PDF
The Authentication Times Issue 28
PDF
Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...
PPTX
Increasing revenue and curbing illegal liquor in India
PDF
Hologram provides measure to authenticate, identify and arrest counterfeits t...
PDF
HOMAI - Characterizing the Indian holography market
PDF
Holographic tax stamps boost indian excise revenue
PDF
How to combat Auto counterfeiting in India
PDF
Holograms to authenticate and identify the counterfeit pharma export drugs
PDF
The Holography Times, May 2014, Volume 8, Issue no 24
PDF
The Holography Times, June 2008, Volume 2, Issue No 3
Authentication Solutions to stop the Scourge of Spurious Medicines
Counterfeit threat-for-electronics-industry-on-rise-plug-it
Serialization for the pharmaceutical industry an overview
Identify fake pesticides with authentication solutions in India
Identity document challenges and solutions
High tech hologram can uproot tobacco counterfeiting
Evolution of Polymer Banknotes Pros and Cons
The Authentication Times Issue 28
Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...
Increasing revenue and curbing illegal liquor in India
Hologram provides measure to authenticate, identify and arrest counterfeits t...
HOMAI - Characterizing the Indian holography market
Holographic tax stamps boost indian excise revenue
How to combat Auto counterfeiting in India
Holograms to authenticate and identify the counterfeit pharma export drugs
The Holography Times, May 2014, Volume 8, Issue no 24
The Holography Times, June 2008, Volume 2, Issue No 3
Ad

Similar to Steps to identify authentication solutions to curb counterfeiting (20)

PPT
Anti Counterfeiting - Playing Roulette Or Chess?
PDF
Overview of anti counterfeiting technologies and Opportunities for India
PDF
The Holography Times, Vol 8, Issue 24
PDF
Collaborated Solutions Staying ahead of the Counterfeiters
PDF
9 Trends in Identity Verification (2023) by Regula
PPTX
Anticounterfeit packaging
PDF
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
PPTX
Anti counterfeit packaging
PDF
FIDO's Role in the Global Regulatory Landscape for Strong Authentication
PPTX
5 nov gsma_eema
PDF
An Introduction to Authentication for Applications
PDF
Foiling Counterfeiters and Hackers | PrintAction
PPTX
Global Regulatory Landscape for Strong Authentication
PDF
Beyond Holograms
PDF
Ht issue 13 201102
PDF
The 10 most reliable authentication solution providers 2021
PDF
10 Most Trusted Authentication Solution Providers of 2023.pdf
PDF
IRJET- A Study on Image Authentication Methods
PPTX
Micro and nanotechnology to enhance the physical security of credentials and ...
PDF
IRJET- Keep It – A System to Store Certificates and Develop a Profile
Anti Counterfeiting - Playing Roulette Or Chess?
Overview of anti counterfeiting technologies and Opportunities for India
The Holography Times, Vol 8, Issue 24
Collaborated Solutions Staying ahead of the Counterfeiters
9 Trends in Identity Verification (2023) by Regula
Anticounterfeit packaging
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
Anti counterfeit packaging
FIDO's Role in the Global Regulatory Landscape for Strong Authentication
5 nov gsma_eema
An Introduction to Authentication for Applications
Foiling Counterfeiters and Hackers | PrintAction
Global Regulatory Landscape for Strong Authentication
Beyond Holograms
Ht issue 13 201102
The 10 most reliable authentication solution providers 2021
10 Most Trusted Authentication Solution Providers of 2023.pdf
IRJET- A Study on Image Authentication Methods
Micro and nanotechnology to enhance the physical security of credentials and ...
IRJET- Keep It – A System to Store Certificates and Develop a Profile

More from Authentication Solution Providers' Association (ASPA) (17)

PDF
Trends and Developments in Tax Stamps in India
PDF
Food Fraud Authentication and Traceability
PDF
Tax stamps role in implementing ideal state excise policy
PDF
Exploring the 5 W's of Counterfeiting
PDF
How to make any serialization program successful
PDF
Trends and drivers in tax stamps design
PDF
The Evolution of DOVID's on Banknotes
PDF
Predicting future banknote designs by a use centered approach dr hans de heij
PDF
Combating illicit tobacco trade; collaborative solutions for India
PDF
How blockchain is strengthening tuna traceability to combat illegal fishing
PDF
Need of anti counterfeit secured packaging
PDF
Security features in passport, trends in the last two decades
PDF
Recent trends and developments in currency
PDF
Milk adulteration and solutions to combat this menace
PDF
Situation of drug counterfeiting in Rajasthan and the ways to tackle this menace
Trends and Developments in Tax Stamps in India
Food Fraud Authentication and Traceability
Tax stamps role in implementing ideal state excise policy
Exploring the 5 W's of Counterfeiting
How to make any serialization program successful
Trends and drivers in tax stamps design
The Evolution of DOVID's on Banknotes
Predicting future banknote designs by a use centered approach dr hans de heij
Combating illicit tobacco trade; collaborative solutions for India
How blockchain is strengthening tuna traceability to combat illegal fishing
Need of anti counterfeit secured packaging
Security features in passport, trends in the last two decades
Recent trends and developments in currency
Milk adulteration and solutions to combat this menace
Situation of drug counterfeiting in Rajasthan and the ways to tackle this menace

Recently uploaded (20)

PPTX
2-THE-NATIONAL-EARLY-LEARNING-FRAMEWORK.STE.pptx
PPTX
Arabic Grammar with related Qurani ayat .pptx
PPTX
My future self called today–I answered.pptx
PPT
Lesson From Geese! Understanding Teamwork
PPTX
Hazards-of-Uncleanliness-Protecting-Your-Health.pptx
PPT
Sanskar for Kids a cultural intervension
PPTX
A portfolio Template for Interior Designer
PPTX
Modulation is the process of varying one or more properties of a carrier sign...
PDF
Lesson 4 Education for Better Work. Evaluate your training options.
PDF
How Long Does It Take to Quit Vaping.pdf
PDF
PLAYLISTS DEI MEGAMIX E DEEJAY PARADE DAL 1991 AL 2004 SU RADIO DEEJAY
PDF
Dominate Her Mind – Make Women Chase, Lust, & Submit
PPT
Critical Thinking Lecture 1 2008 University.ppt
PDF
The Blogs_ Humanity Beyond All Differences _ Andy Blumenthal _ The Times of I...
PPTX
Atomic and Molecular physics pp p TTT B
PPTX
Life Skills Education - Introduction - 1
PDF
Why is mindset more important than motivation.pdf
PDF
Want to Fly Like an Eagle - Leave the Chickens Behind.pdf
PPTX
Unlocking Success Through the Relentless Power of Grit
PDF
OneRead_20250728_1807.pdfbdjsajaajjajajsjsj
2-THE-NATIONAL-EARLY-LEARNING-FRAMEWORK.STE.pptx
Arabic Grammar with related Qurani ayat .pptx
My future self called today–I answered.pptx
Lesson From Geese! Understanding Teamwork
Hazards-of-Uncleanliness-Protecting-Your-Health.pptx
Sanskar for Kids a cultural intervension
A portfolio Template for Interior Designer
Modulation is the process of varying one or more properties of a carrier sign...
Lesson 4 Education for Better Work. Evaluate your training options.
How Long Does It Take to Quit Vaping.pdf
PLAYLISTS DEI MEGAMIX E DEEJAY PARADE DAL 1991 AL 2004 SU RADIO DEEJAY
Dominate Her Mind – Make Women Chase, Lust, & Submit
Critical Thinking Lecture 1 2008 University.ppt
The Blogs_ Humanity Beyond All Differences _ Andy Blumenthal _ The Times of I...
Atomic and Molecular physics pp p TTT B
Life Skills Education - Introduction - 1
Why is mindset more important than motivation.pdf
Want to Fly Like an Eagle - Leave the Chickens Behind.pdf
Unlocking Success Through the Relentless Power of Grit
OneRead_20250728_1807.pdfbdjsajaajjajajsjsj

Steps to identify authentication solutions to curb counterfeiting

  • 1. www.homai.org6 The Holography Times Vol. 7, Issue 20 Steps to identify authentication solutions to curb counterfeiting By C S Jeena Counterfeiting is menace for brand owners and Government authorities. In over a decade the problem has expanded rapidly and is now not limited to luxury goods and developed economies. There are any numbers of reports available on internet discussing the loss to industry and people due to counterfeiting. Over the years, in order to prevent counterfeiting from plaguing their business, brand owners started using authentication solutions. With the availability of various authentication solutions, companies and Government authorities are facing problem in selection of a specific authentication solution as the adoption of any given solution is a complex question involving issues, amongst others, of cost, compatibility, feasibility and reliability, and there are divergent views on which technologies should be adopted and the timing for their adoption. While these solutions can sometimes add to the problem, the right selection, usage & implementation of authentication solutions helps companies and authorities to keep them one step ahead of counterfeiting. In this article, we try to explain, “Steps to identify authentication solutions to curb counterfeiting”. Introduction: The selection of an authentication1 solutions that protects a document or product is a complex process and necessitates review of a number of factors regarding the role and implementation of the technology. Not all authentication solutions and security features are appropriate for all applications. It is important to understand the strengths and limitations inherent to different technologies, as well as between similar features supplied by different manufacturers. For example: Use of a security watermark2 in a liquor tax stamp3 which is afϐixed to bottles. The goal is to introduce a security watermark as a new overt feature. The liquor tax stamp has a far smaller user population (mostly inspectors) than currency, and this smaller population is better trained and equipped to examine taxstampsthanthegeneralhuman being. This could allow for the use of a covert (or even forensic) feature,butithasbeendetermined by authorities that in this case the risk of counterfeiting is not great enough to invest in equipment or tools and that an overt feature is preferred for the sake of simplicity. The authentication of a watermark is performed by holding the document up to alight. But in this case the document is a tax stamp secured to a glass bottle and it will only be possible to authenticate the feature if the bottle and its contents are transparent (or at least translucent). Many liquor bottles and liquors are opaque and would not allow sufϐicient light transmission for authentication. It isdeterminedthateventhoughthe user population would otherwise be capable of authenticating this feature, the wide range of the environment–from transparent to opaque–makes the use of a Footnotes: 1. Authentication - Authentication is the process of conϔirming that a product, document or even person is authentic. This is usually achieved by looking for speciϔic attributes such as product and document features and security additions such as holograms, optically variable devices, optical variable inks etc. 2. Watermark: A design, symbol or pattern imparted in paper by a raised wire design on a roll (a dandy roll) as the wet paper is being formed on a mesh as it passes through the wet-end drainage process on a paper- making machine. 3. Tax stamp – A revenue stamp, tax stamp or ϔiscal stamp is a (usually) adhesive label used to collect taxes or fees on documents, tobacco, alcoholic drinks, drugs and and many other things. Used by governments as duty and excise stamps. These are high security documents which contained security features such as hologram. Cover Story
  • 2. www.homai.org 7 The Holography Times Vol. 7, Issue 20 Cover Story security watermark in a liquor tax stamp unusable. This situation is an example of how a widely used and popular feature is rendered ineffective by environmental circumstances. In order to avoid such circumstances, Organisation can follow basic guidelines such as; 1. Purpose of using authentication solutions The organisation needs to understand the purpose of using authentication solutions. As a ϐirst step most organisations should assess the risk to their brand such as i) Does the product have chances of being counterfeited or is it already being counterfeited; ii) If it is being counterfeited, then isitinformoftampering,pilfering, duplication or, by misleading the consumer by adopting a look-a- like form of identiϐication; iii) Is the risk of counterfeiting in the form of digital or non-digital? iv) What the impact such solutions may have on the brand? Once the purpose is clear, the organisation can evaluate the authentication solutions or security feature based on various parameters. 2. Selection of authentication solutions In today’s fast changing technological world, scores of different authentication solutions are available in the market. These days,twofamiliesofauthentication solutions are in use, physical4 and logical security5 features to secure packaging materials and products, (see ϐigure 1). In selecting them various trade-offs are necessary between security and usability. To evaluate whether a given solution will address a given security problem, the security problem must ϐirst be clearly deϐined. 2.1 Basic property The solutions should be extremely difϐicult to copy and tamper evident6 ; 2.2 Audience The solutions should provide easy identiϐication to user, and facilitate product authentication. Security features of authentication solutions must be tailored to the intended user population, the group of people responsible for authenticating the feature. The user population could include the entire public- 4. Physical Security: Physical security features are substances or products which are introduced into, or attached to packaging materials and / or products. The presence of these security substances is veriϔied to authenticate the protected item. As the manufacturing process of security products is conϔidential and highly secure and its availability is strictly limited, it is very difϔicult to counterfeit products secured in this way. 5. Logical Security: Features are based on encryption technologies, allowing the integration of hidden data into images / artworks (steganography / digital watermarks) and supporting the authentication of the product. It is also possible to register the surface structure of packaging material which is unique. With this data, an individual “ϔingerprint” of each individual packaging item can be made. 6. Tamper evident - Tamper-evident describes a device or process that makes unauthorized access to the protected object easily detected. Seals, markings or other techniques may be tamper indicating. Figure 1: Overview of security technologies Authentication Solutions Serialisation Security Technologies Printed PhysicalLogical Cryptographic Identiϐication Structure Analysis Track and Trace Inks / Taggants OVDs and Hologram
  • 3. www.homai.org8 The Holography Times Vol. 7, Issue 20 Cover Story for example, if the product being secured is currency, or if it is a bottle of a widely sold over-the- counter medication. The user population might be a smaller group in the case of a more specialized product. If the user population is large or has limited interest in authenticating the feature, it may be impractical to supply complicated security features, whereas if the user population is small and specialized, security features of any complexity can be selected. For example, in a survey by Dutch National Bank to measure the public understanding of security features, it was revealed that out of seven selected features, the Hologram came out second with 55 per cent public recognition. 2.3 Authentication layers The solutions should provide multiple levels of authentication. Generally most of the authentication solutions provide one or two level of authentication layers. However, solutions such as high security hologram can provide three authentication layers for different users. The each level of security hologram is designed for a speciϐic purpose. Level one feature can be overt (veriϐication by human eye) and can be used for identiϐication and veriϐication by consumer. Level two, covert (veriϐication by a predetermined device or a tool) can be used by manufacturer or their channel partner for an advanced level of authentication and veriϐication. The third level is highly sophisticated and can be used by forensic experts and can be useful to law enforcement and for evidence in case of litigation. 2.4 Environment factors The solution should work well in different environmental situations (heat, cold, humidity, water, ϐire, chemical exposure, etc). For example, polyester based security holographic excise adhesive label (HEAL) are used by excise authorities in India as they does not wear during transit, handling or in contact with water because of its property and work well in various environmental and climatic conditions. The security features incorporated in HEAL does not varnish when it comes in contact with water, dust, heat, moisture, etc because of non-usage of ink. 2.5 Easy integration Authentication solutions should have feasibility to be integrated with the automated production/ packaginglineifrequired,especially wherever the volumes are large. While selecting authentication solutions it is always recommended to adopt a layered approach combining use of overt, semi-covert, and / or covert technologies to provide a solution that is more difϐicult to copy. 3. Selection of vendor7 providing authentication solutions Once you have identiϐied the solution, you can proceed to the selection of an ethical vendor. The selection of vendor is as important as selection of authentication solution. The ethical vendor will work as your authentication partner, will understand and identify your problem areas and concerns and will suggest the optimised solution. The brand owners can evaluate authentication solutions provider (vendor)onfollowingparameters; 3.1 Good corporate practices Evaluate the vendor on its corporate practices. Ideally, the vendor should have adopted good corporate practices, behave in ethical manner and should be following the prescribed Code of Conduct of its industry association. 3.2 Innovative Being a step ahead is the mantra in anti-counterfeiting industry. Most 7. Vendor – Here it means the manufacturer & provider of authentication technology, systems or solutions
  • 4. www.homai.org 9 The Holography Times Vol. 7, Issue 20 Cover Story of the ethical vendors upgrade their facilities and solutions to keep themselves & their customer one step ahead of counterfeiters. They can suggest & provide various solutions according to brand protection objectives and the changing times. 3.3 Secure environment The vendor should have an in-house facility to produce these solutions under a secure environment. The vendor must take all possible measures and precautions for maintaining adequate security and secrecy. 3.4 Reference and experience Vendor should have good experience of providing authentication solutions. A vendor reference should always be taken from his existing customers, or you can get the help from trade industry association. In case your vendor is security hologram manufacturers, you can add two more steps such as; 3.5 Member of HoMAI / IHMA He should be a member of trade bodies such as Hologram Manufacturers Association of India (HoMAI) or International Hologram Manufacturer Association (IHMA). 3.6 Registered hologram under HIR8 The Hologram manufacturers association of India has the arrangement with Counterfeit Intelligence Bureau (CIB)9 , London so that each HOMAI member can register their security hologram with CIB. The selection & usage of solutions can be a complex and time consuming process, however, the selection and proper implementation of the right technologies will invariably lead to long term beneϐits to the brand owner. As a further step, the Brand Owner / Authorities can also adopt a new ISO Standard ISO: 12931 titled “Performance criteria for authentication tools used in anti-counterfeiting or material goods”. This is a very useful document for a brand owner wishing to adopt globally accepted standards and approach to ϐighting against the counterfeit. This can be seen at http:// www.iso.org/iso/catalogue_ detail?csnumber=52210. All effective solutions, broadly speaking, help in identifying and authenticating the original from counterfeit. They deepen the divide between genuine products and their counterfeits by making a genuine product distinguishable in some manner that is difϐicult to replicate using commercially available manufacturing processes. However, it is very important that a planned surveillance program be in place to constantly monitor that there is no infringement is seen, an immediate action must be taken so that the guilty is punished. Reference: 1. Brand protection challenges and solutions by Pradip H Shroff, ϔirst published in the holography times, February 2011, volume 4 & issue 11. 2. ISO Standards 12931 “Performance criteria for authenticationtoolsusedinanti-counterfeiting or material goods” http://www.iso.org/iso/ catalogue_detail?csnumber=52210 3. How to select a security feature, published by The Document Security Alliance and The North American Security Products Organisation. www. documentsecurityalliance.com; www.naspo.org 4. Authentication Technologies for Brand Protection report published by National Electrical Manufacturer Association (NEMA), USA. www.nema.org 5. Hologram Manufacturers Association of India (HoMAI), www.homai.org 6. International Hologram Manufacturers Association (IHMA), www.ihma.org 7. Hologram Image Register, http://www. iccwbo.org/Products-and-Ser vices/ Fighting-Commercial-Crime/Counterfeiting- Intelligence-Bureau/Hologram-Image- Register/ 8. HIR –A unique and only image register in security industry, where hologram producers register their hologram. 9. Counterfeit Intelligence Bureau (CIB)- CIB is one of the world’s leading organisations dedicated to combating the counterfeiting of products and documents, protecting the integrity of intellectual property and brands, and preventing copyright abuse. CIB has a dedicated team of internet investigators to combat this trade. CIB also hosts the International Hologram Image Register. C S Jeena is Secretary Hologram Manufacturers Association of India, Editor The Holography Times, member of Association of Certified Fraud Examiner (ACFE) & Global Association of Risk Professionals (GARP). Comments are welcome at cjhomai@gmail.com.