Sessions » Authentication – establishing trust on the front line

Authentication – establishing trust on the front line



Churchill Room
Wednesday 27 June


13.40
Introduction

 
13.45
Systematically testing document authentication systems – towards a standardised approach
Franz Daubner, Research Engineer, AIT Austrian Institute of Technology, Austria

Many border guards have little understanding about what security features a document inspection system can detect reliably. This understanding is crucial to achieving an optimal partnership between human and machine. In addition, there are currently no standardised tests of inspection systems available in order to verify the claims of vendors.

In this presentation, we will present the results of our systematic tests on the ability of inspection systems to detect certain classes of counterfeit documents and correctly identify a range of genuine documents.

In order to achieve this, we have defined different classes of counterfeit documents, ranging from low-effort (paper sheets with MRZ imprints) to high-effort (almost identical copies) of counterfeits. To increase the number of counterfeits we have been able to test, we used previously captured images of documents that were manipulated with image-processing software, mimicking the appearance of counterfeits. In addition to our synthetic tests, we also carried out tests with a series of different counterfeits collected by the Austrian police in the field.
In total, five different providers of authentication software solutions took part in our challenge, using seven different document readers. This talk will present the main findings of our work.
•    Standardised testing of document inspection systems;
•    Document authentication challenge.



14.05
Which blackbox should I buy? – Evaluation of document inspection software: systematic approach and practical limitations
Dr. Christian Weigand, Forensic Document Expert, KT54 – Questioned Documents and ID-Systems, Bundeskriminalamt, Germany

The quality and reliability of document-inspection software plays a key role for border security, since it is employed to aid the examining border police officer or even to provide fully automated border control (ABC gates).

Today, various document inspection systems, i.e. ‘blackboxes’ containing document reader hardware bundled with document inspection software, are available on the market, each of them promising to secure your borders most efficiently. Potential buyers are left with the question of which system to choose. Systematic performance comparisons, however, require particular, extensive and costly testing events.

The ‘Advanced Research on Optical Machine Authentication’ (AROMA) project provides a systematic approach to answering the question of ‘how to compare document inspection systems’, utilizing selected ‘real case’ examples of genuine documents originating from existing operational systems, e.g. at Frankfurt Airport. Image data is transferred from these systems to an evaluation server and fed to the software of three different inspection systems for a simulated document examination. Via extended log files in conformance with the guideline BSI TR-03135 v2.1, detailed information on check results was gathered, evaluated and compared among all three providers of inspection software.

This talk presents the results, benefits and limitations of this evaluation method for enabling comparability.

•    Systematic evaluation method of document inspection software based on BSI guideline TR-031315;
•    Based on ‘real cases’ of genuine documents from existing document inspection systems in operational environments;
•    Results – benefits – limitations.


14.25
From standardization to prototyping: the vision of vendor-independent testing of document inspection software
Evelyn Spitzwieser, Consultant Division Homeland Security, secunet Security Networks AG

For more than five years, secunet has been evaluating the performance of optical authentication systems jointly with the German Bundeskriminalamt in several research projects – recently at border control stations of Frankfurt Airport.

Based on the results from these performance evaluations, a need for an independent evaluation of optical machine authentication systems has been noticed. While analysis data acquired in concrete operational settings are available, systematic and independent comparison of different vendor products for optical machine authentication remains difficult due to unequal prerequisites. As a continuation of the ‘Advanced Research on Optical Machine Authentication’ (AROMA) project, the German Bundeskriminalamt and secunet are envisioning a new approach to address this issue: conformity testing of optical inspection systems based on the logging of BSI technical guideline 03135, as it is already common for the electronic part of security documents. Furthermore, the planned vendor-independent test setup will automatically evaluate the ‘ability’ of inspection systems to detect counterfeits, assess the inspection scope and predict the performance in a real life scenario. 

This presentation will focus on the main challenges of designing the test setup for optical inspection systems.

•    Conformity testing of optical inspection systems;
•    Challenges of designing a vendor-independent test setup;
•    Prediction of the performance in real life scenarios.


14.45
Questions and answers


Share this page :
Follow us on :

Title Sponsor


See more

Premier Sponsors


See more

Sponsors


See more

Strategic & Premier Partners


See more

Media Partners


See more

Supporting Associations


See more