2013
DOI: 10.1016/j.compind.2012.11.002
|View full text |Cite
|
Sign up to set email alerts
|

A two-factor authentication system using Radio Frequency Identification and watermarking technology

Abstract: Counterfeiting has been growing at an alarming rate worldwide. The increasing number of counterfeit products has penetrated into various industries, especially the luxury goods industry. Numerous anti-counterfeit and product authentication technologies are available to combat this problem. At present, the verification principle in product authentication mainly relies on optical detection and security feature identification which require human experts or machines to determine the product's genuineness. As a res… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 18 publications
0
8
0
1
Order By: Relevance
“…A significant research has been carried out in the past to develop various technologies to prevent counterfeiting and/or tracking and tracing the product in a supply chain [20][21][22]. There are authentication technologies that aim to identify counterfeits without tracing the product footprint in the supply chain.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…A significant research has been carried out in the past to develop various technologies to prevent counterfeiting and/or tracking and tracing the product in a supply chain [20][21][22]. There are authentication technologies that aim to identify counterfeits without tracing the product footprint in the supply chain.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Feature-based identification techniques are useful for differentiating the original product from counterfeits [21]. These are most widely used technologies for product authentication but do not support product tracking.…”
Section: Authentication Technologymentioning
confidence: 99%
See 1 more Smart Citation
“…• technological possibilities available, in terms of track-and-trace, overt and covert solutions (Acken 1998;Chaudhry and Walsh 1996;Cheung and Choi 2011;Duchêne and Waelbroeck 2006;Li 2013;Ting and Tsang 2013;Wong et al 2006); • the country or culture they refer to, mostly in reference to countries replete with counterfeits, such as China, and other emerging markets (Bender 2006;Chaudhry 2006;Clark 2006;Stumpf and Chaudhry 2010;Swike et al 2008;Zimmerman 2013); • the strategic and operational choices companies have in fighting against counterfeiting and piracy, from awareness to prosecution, from withdrawal to hands off (Cesareo and Pastore 2014a;Cooper and Eckstein 2008;Harvey 1987;Jacobs et al 2001;Kaikati and LaGarce 1980;Shultz and Saporito 1996;Yang et al 2004), • the subjects they target: institutions, governments, employees, channel members, infringers and, last but not least, consumers (Chaudhry et al 2005;.…”
Section: Managerial Answers To Consumer Education Today and Tomorrowmentioning
confidence: 99%
“…The final issue is fraud prevention and anti-counterfeit techniques. These technologies for food authentication can be paired in the traceability systems [24,25,26,27] and are implemented in both RFID tags and barcodes.…”
Section: Introductionmentioning
confidence: 99%