Creating a Security Printing Document

  As long as there are people who feel compelled for whatever reason to copy or alter documents of any value, there will be a need to ensure that those documents will be extremely difficult to reproduce.

  With counterfeiting (duplication) and forgery (alteration) costing billions of dollars a year worldwide, security printing is becoming a growing need. The document provides examples of security printing techniques that can be implemented by the average mid-sized and even smaller printers and to demonstrate the security features of prepress software from Amgraf Inc. and Barco. The two-sided document served as the certificate of completion for attendees.

  Security printing is often considered a specialized field in the graphic arts. However, advances in desktop production and digital printing have made it easier for counterfeiters to produce fake documents, thus highlighting the importance of security printing features in documents. There are generally two reasons for using security features in a document:

  • Publishers or printers would like to deter counterfeiting or unauthorized reproduction of documents.
  • Persons who accept documents as proof need to be able to authenticate or verify their validity.

  Examples of security document publishers include corporations who issue stock certificates, event organizers who sell tickets, and governments who print money. Individuals who must verify the validity of these documents include banks and brokerages that accept the stock certificates, ticket collectors at events, and merchants who accept bank-notes or checks.

  Security Printing Features.Security printing features that can be implemented using standard commercial printing techniques that include the following:

  Security patterns.Complex patterns of lines, points, arcs, and other shapes make documents difficult for counterfeiters to fake. Some patterns cannot be reproduced accurately by photocopiers, thwarting easy counterfeiting. Patterns can be made with off-the-shelf illustration software, but specialized programs from Amgraf and Barco include the ability to create the intricate, complex borders and patterns.

  Split ink fountain. A blend of different colored inks across a document can be created by splitting the ink fountain into different sections using ink fountain dividers on press. A split ink fountain is commonly used to print security patterns across a document. The mixing of inks created with the split fountain produces a blend of colors across the document that is difficult for counterfeiters to reproduce.

  UV visible inks. Ultraviolet (UV) fluorescent inks are invisible or inconspicuous to the human eye when viewed in visible light, but fluoresce in bright colors when exposed to UV radiation. UV radiation is classified as types "A" and "B." UV-A is short-wave radiation harmful to the eyes and skin. UV-B, harmless long-wave radiation, is found in "black lights" available to consumers. Some UV inks fluoresce only under UV-A or UV-B, while others exhibit color or intensity that differs when under A or B radiation. UV inks provide a challenge to would-be counterfeiters, and they also provide a way to authenticate documents when the user has the required UV light source and knowledge of how the document should appear.

  UV fluorescent ink was used to print the GATF logo in a blend of three different colors (red, yellow, and blue) and to print the portrait of Dick Warner, co-moderator of the security printing conference, on the back of the certificate as a yellow-red duotone.

  Microprinting. Microprinting refers to microscopic letters (character height of 15–150mm or 0.5–6 mil) that are too small to see without magnification. The characters appear as a line at a normal viewing distance. Microprinting is difficult for counterfeiters to reproduce accurately, especially those using photocopiers. And, as a hidden document feature, it may not be apparent to would-be counterfeiters. When viewed with a magnifying loupe by someone who knows where to look for it, microprinting provides a method of document verification.

  Thermochromic ink. Visible at room temperature, this ink changes color or becomes invisible at a different temperature and returns to its original color when restored to room temperature. As with UV fluorescent ink, thermochromic ink is a security feature that is difficult to counterfeit. Even though would-be counterfeiters can see the ink, they may not realize that it changes color. Document examiners can subject a thermochromic security element to specified temperatures to verify the correct color change.

  Thermochromic ink. The ink appears pink at room temperature, and disappears when heated to body temperature or higher, e.g., when a finger is held in contact with the portrait for a few seconds.

  Diecutting in register. Diecutting creates openings in or complex edges around documents. Cutouts are difficult to duplicate without access to diecutting equipment. Also, when the diecut is registered with another document feature, the document can be authenticated by comparing the register of the document feature with the diecut.

  Watermark. A watermark is a logo or wording created as a light or dark area (negative or positive image) in paper during manufacturing. Watermarks are visible when the paper is held up to diffuse light. The watermark is created during paper manufacturing either using a Fourdrinier paper machine or holding a cylinder mold of a design against the paper at the time it is screened, so that the paper is slightly thinner in certain areas and thus transmits more or less light there. Watermarks are difficult for counterfeiters to reproduce without resorting to custom-made paper. Also, since the watermark is difficult to see unless the paper is held up to light, it can serve as a hidden feature for document verification.

  Sequential numbering. Numbering each security document in sequence and alternating fonts provides a way to track and secure the documents that have been issued and, when required, to match them to other information on the document, such as the bearer’s name. Examples of sequentially numbered documents include stock certificates, banknotes, and checks.

  More Than Tools and Techniques
"You are accepting a liability that goes way beyond that of anything you have printed before," what infrastructure printers need beyond tools and techniques to enter security printing and attempt to sell secure documents to clients. Security printers can’t, for instance, simply put waste paper in the dumpster. Makeready time will change and it has to be done right; material handling needs to be controlled and building access limited.

  Noting that a magazine had stated that printers could charge up to nine times more for a secure job than a regular one, that needing the following support measures could explain why:

  • Building security
  • Guard force
  • Employee clearances
  • Secure files and materials
  • Client security
  • Local authority contacts
  • Paper accountability
  • Waste destruction
  • Sample control
  • Insurance
  • Transportation/delivery
  • Quality of work
  • Secrecy
  • Accountability
  • Consultants
  • Liability
  • The right attitude
  While many things are required to become a security printer, it can be the right niche for the right printer. It is a fun business with very good returns if you learn and play by the rules.

[时间:2003-12-22  作者:Bisenet  来源:Bisenet]

黄品青微站