An end to paper fraud: technology eases forgery nightmare of public, lawyers and government

December 2004 Products

Millions have been invested in developing computer security mechanisms aimed at protecting people against IT fraud. However, the biggest challenge that remains is safeguarding and protecting the originality and authenticity of printed documents, as ordinary paper is still wide open to fraud.

The major problem is the verification and guarantee of the authenticity of documents such as Matric certificates, degrees and diplomas, legal documentation, motor vehicle registrations, ID documents, etc. A solution is now within the reach of every individual, business and organisation.

Access to the new paper protection technology will soon be available over the counter through a Microsoft plug-in. AuthentiDoc, a subsidiary of South Africa's Dex Security Solutions, which trades internationally, has developed a simple but innovative solution to paper security, called Digital Data Watermark Technology.

"This watermark contains a digital signature of the originating organisation together with the contents of the page and is printed in the form of an encrypted bar code. To authenticate the document this bar code is scanned to reproduce the contents and verifies the author," says Jans Wessels, managing director of Dex Data Technologies and Director of subsidiary company, AuthentiDoc International. It is vital to secure paper documents in order to allow organisations to authenticate the contents as original and to verify that it has not been tampered with.

It is a highly feasible, cost effective, and proven solution. Tickets for the 2003 Cricket World Cup held in South Africa were protected with a Dex digital data watermark. Out of close to a million tickets sold not a single one was successfully forged with around 60 000 fraudulent attempts.

Until recently, special scanners were needed to read the digital data watermark of a secured document, but recent extensions to the technology enables the general public to verify the secured content of documents by using readily available tools such as a fax machine or cellphone camera. The printed digital data watermark is faxed to an automated authentication system that will decrypt and fax back the originating document for comparison. Automated comparison can also be done by electronically comparing a faxed document with the originating document produced from the digital data watermark or by using a cellphone camera to send the captured image via a GPS network to an automated authentication system.

For more information AuthentiDoc International, Dex Data Technologies, 011 644 6500, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Next generation boom gate
ZKTeco Products
The BG1000 series barrier gates adopt ZKTeco’s interactive LED chassis design, programmable control panel, and a high-efficiency brushless DC motor.

Read more...
All-mobile people management solution with facial recognition
Editor's Choice Integrated Solutions Security Services & Risk Management Products
The new mobile Incident Desk People Management platform with facial recognition combines identification data on suppliers, staff, sub-contractors and even people on watch lists, for less than the cost of traditional service management tools.

Read more...
What to consider when choosing a power backup plan
Products Smart Home Automation
Electricity is set to double in price in the next five years, and load-shedding will be an ongoing occurrence for at least the next decade.

Read more...
Controlled access on BRT system bridge
Turnstar Systems Products
Turnstar’s traffic barriers provide the City of Johannesburg with eight fully-retractable hydraulic bollards for the flagship Alexandra to Sandton bridge.

Read more...
Gallagher releases Command Centre v8.70
Gallagher News Integrated Solutions Products
Command Centre v8.70 introduces a range of features and enhancements to create operational efficiencies and improved site security, including a next-generation integration with HALO Smart Sensors.

Read more...
Linux-based biometric access control
ZKTeco Products Access Control & Identity Management
The SpeedFace M4 is a Linux-based multi-biometric access control and time attendance terminal with visible light facial recognition and palm verification.

Read more...
GJD launches the GEM external curtain detector
Perimeter Security, Alarms & Intruder Detection Products
The GEM is a wired outdoor PIR curtain detector with up to 12 m selectable detection range and a narrow invisible curtain beam, making it highly effective in protecting properties against crime.

Read more...
Four cameras in one
Duxbury Networking CCTV, Surveillance & Remote Monitoring Products
The new M5000 multidirectional 15 MP camera from Axis features three 5 MP sensors and one PTZ camera with 10x optical zoom and HDTV 1080p, delivers sweeping overviews and zoomed-in details.

Read more...
Surveillance for net zero container showroom
CCTV, Surveillance & Remote Monitoring Products
VIVOTEK tailored a surveillance solution specifically for a net zero showroom by addressing the most critical part of access control as well as corner-to-corner indoor and outdoor surveillance.

Read more...
Enabling safety in communities
Security Services & Risk Management Products
Many Hytera devices are equipped with personal safety features, including emergency calling, Man Down and Lone Worker alerts, and GPS to enable users to be monitored and tracked.

Read more...