Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

High Tech Printing Makes IDs More Secure

June 1, 2004
Figure 1: Good card stock can be flexed like this over 100,000 time
In a word in which the most dangerous villains use the most sophisticated anti-security methods, identification cards are coming under increased scrutiny:

“Is that driver’s license or ID card an authentic document?”

“Does it have all of the security features that staff have been told to look out for?”

Secure identification usually starts with a photo ID card; its key features being simply a good photographic likeness and a legible signature. Years ago, those features alone were thought to be sufficient. But such visual comparison methods are time and labor consuming, and not altogether accurate, while today’s identity thieves and fake ID producers have found numerous techniques to get around a simple picture and signature. Issuing authorities now incorporate a host of additional features in their photo ID cards to deter counterfeiting, while making authentication easier and more reliable.

The new authentication processes come from a combination of media features, printer capability, database verification, and singular or unusual techniques, including covert and forensic features.

Media features, which pertain to the material from which the card itself is fashioned, include surface quality, durability and some built-in security elements. Printer capability encompasses high resolution graphics and reliable bar codes in addition to any covert features printed at the time of issue. Database verification consists of a central archive of cardholder data, including a photo, personal statistics, employee number, date, time and place of issue. Card manufacturers also can usually offer a number of uniquely engineered security features, which are only shared with customers to protect their covert qualities.

Figure 3: Card manufacturers can print graphics into the card’s laminate, with options like invisible ink, holographic metallization and embossed text available.

Start with strong cards

First and most important, the card itself has to be tough. Gone are the days when ID cards could be printed on garden variety PVC stock with a photo that merely resembled the cardholder. Today’s cards must be extremely durable. A good card stock usually has ten times the flex life of regular PVC cards (see Figure 1). Such stock should meet or exceed all international standards for resistance to cracking, permanent adhesion of over-laminate and durability of image.

The lanyard slot in a regular PVC card is often fragile. If it tears out, an unauthorized user needs only to change the photo to go past a careless inspector. Therefore, the end user should choose a card that does not tear easily, keeping a look out for unique, tear-resistant designs when making a purchase.

Figure 2: Special security features can often be printed directly on the card. Micro-printing of text, designs and graphics can secure the validity of signatures and make

the card difficult to duplicate.

Modern print features are hard to copy

In this security-conscious age, government and other large organizations usually prefer customized card media of constantly increasing sophistication. Multiple security features not only create greater difficulties for counterfeiters , but guards can use them to quickly validate unique features known only to the organization’s security force.

There are many techniques that companies can employ with digital printers to prevent counterfeiting, alteration or duplication, including the use of multiple security images or holograms. One security image alone increases the difficulty of counterfeiting; two makes it at least twice as hard. The holographic image lamination process also provides a visually attractive card. Multiple screenings of the same photograph increase the card’s integrity; this practice has almost become the norm on driver’s licenses.

Card manufacturers can offer a number of pre-printed security features, including ultraviolet-visible text and graphics in green and blue. Micro-printing allows text to be added to the end user’s specifications, using techniques like deliberately random font changes and misspellings to add to a card’s inimitability. Character height for such text is only about 0.005 inches. Pre-printed serial numbers can also be incorporated into card stock. Laser etching is another option. Fine line guilloche patterns with hidden micro-text behind a signature line have been successful in foiling counterfeiters, while micro-printing of text or miniature graphic elements are also difficult to duplicate (see Figure 2).

An over-laminate film can add security to the printed ID card. The inner surface of the laminate can be pre-printed with OVI ink or UV-visible ink in up to three colors. Today’s high-tech printers can also laminate with holographic metallization, including embossed micro-text (see Figure 3).

Keeping track of critical information

It’s important to keep track of card transactions in the printer’s host computer. Cards reader systems can obtain personal and other point-of-issue data, providing a means for security officers to validate the card by comparing its information with centrally located data.

Card serialization also adds security. Printers with the magnetic stripe encoder, proximity encoder and smart card contact options can be set up to function only with serial numbered card stock, and also to add serial numbers to the data recorded by a card reading system. When used with a database, the technology can allow a security officer to instantly check the correlation of a person’s card serial number and credentials in addition to performing a usual comparison of photo and subject.

By utilizing the latest printing and card stock technology, an organization can rest assured that it is doing everything it can to prevent identity fraud and verify that a cardholder is who they say they are. In a world of advanced security risks, today’s security systems can require no less.

Sidebar: More Security to Protect Privacy, Too

Numerous federal, state and industry rules and regulations now aim at protecting the privacy of workers, customers and visitors.

One example comes from Software House of Lexington, Mass., with its release of C•CURE 800 (version 8.2).

It includes new features that answer the latest needs in security, including meeting recent federal mandates for the health industry, enhancing worker privacy and simplifying security managers’ jobs.

According to Software House, these new features include enhanced audit trail capabilities for changes made to the access control system, biometric enrollment support with ID badging, and enhanced database partitioning to streamline and protect the access control provisioning process.

The audit trail feature is especially helpful in protecting the integrity of company records. It lets a security official view modifications made to essential data fields such as the level of security clearance - ultimately protecting sensitive company and personnel information.

This feature is especially useful for healthcare companies and their security and information technology operations charged with protecting medical records due to the Health Insurance Portability and Accountability Act (HIPAA). HIPAA includes provisions that mandate the adoption of federal privacy protections for individually identifiable health information. Companies not meeting the requirements set forth in HIPAA could face large civil fines and criminal penalties.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Report: Travelers Would Feel More Secure if IDs Scanned by Airport Security

    See More
  • Printing Tech for ID & Visitor Cards

    See More
  • SEC0219-data-Feat-slide1_900px

    Data Breach Report: British Printing Press Leaks Confidential Material and More

    See More

Related Products

See More Products
  • Physical-Layer-Security.gif

    Physical Layer Security in Wireless Communications

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!