{"id":169,"date":"2019-01-30T18:14:50","date_gmt":"2019-01-30T18:14:50","guid":{"rendered":"https:\/\/dns-iran.com\/?page_id=169"},"modified":"2019-03-21T21:50:22","modified_gmt":"2019-03-21T21:50:22","slug":"https-dns-iran-com-index-php-https-dns-iran-com-wp-admin-post-phppost169actionedit","status":"publish","type":"page","link":"https:\/\/dns-iran.com\/index.php\/https-dns-iran-com-index-php-https-dns-iran-com-wp-admin-post-phppost169actionedit\/","title":{"rendered":"Security Printing &#038; Application"},"content":{"rendered":"\n<p class=\"has-drop-cap\">Forgery of documents is becoming \neasier than ever before with the advancement being made in the \ntechnology of computers, scanners, printers and copiers. The problem \ndoes not only exist with check forgery but also with other documents \nthat have dollar value or data value associated with them. The examples \nbelow give you an idea of some security problems that can occur on \ndifferent documents.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/www.printingtips.com\/images\/graphicsedviser\/common\/security\/ProbChecks.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Checks<\/strong><\/p>\n\n\n\n<p>Checks can be forged in several ways. \nBecause of the advancement of technology in computers, scanners, \nprinters and copiers, checks that do not have the proper security \nfeatures, can be duplicated so that it is hard to tell the difference \nbetween the duplicated check and the original.<\/p>\n\n\n\n<p>Another type of forgery that occurs \non checks is the alteration of the dollar amount or the name of the \npayee on the check. This alteration is accomplished by a couple of \ndifferent methods. If the check is printed through a printer, the image \ncan be scraped off or lifted with tape and replaced with new \ninformation. The use of chemical solvents is another method which washes\n the ink from the check and then the amount is altered or the payee name\n is changed. It is important to incorporate security features in checks \nbecause the customer is held responsible for losses incurred from the \nforged checks unless they can show \u201cdue diligence\u201d. \u201cDue diligence\u201d \nmeans that they must show that they have taken proper precaution on \ntheir part to protect their checks. This includes everything from \nincorporating proper security features to proper storage of checks.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"http:\/\/www.printingtips.com\/images\/graphicsedviser\/common\/security\/ProbCert.gif\" alt=\"\"\/><\/figure><\/div>\n\n\n\n<p><strong>Gift Certificates<\/strong><\/p>\n\n\n\n<p>Gift certificates can be altered in much the same way\n in which checks are altered. They may be duplicated or they can have \nthe name and dollar amounts altered. This could result in a huge loss to\n a company if not detected soon enough.<\/p>\n\n\n\n<p><strong>Academic Transcripts<\/strong><\/p>\n\n\n\n<p>Transcripts have been \naltered by students to show higher grades than what were actually \nearned. Students alter their transcripts to affect their eligibility \ninto another school or to mislead a prospective employer when being \nconsidered for employment.<\/p>\n\n\n\n<p><strong>Event Tickets\/Passes<\/strong><\/p>\n\n\n\n<p>Scalpers will duplicate passes or \ntickets to events and then sell them for a profit. Not only is this a \ntype of counterfeiting and illegal, it also can cause huge problems when\n large groups of people come to an event and find their seats have \nalready been sold to another person.<\/p>\n\n\n\n<p><strong>Coupons<\/strong><\/p>\n\n\n\n<p>Without proper security  features, coupons could be easily duplicated by using the technology of  the computers and output devices that are available today. A restaurant  owner may distribute a \u201cFree Dinner\u201d coupon to promote the opening of a  new restaurant. If the coupon is illegally duplicated and distributed to  more people than originally intended, the owner may incur substantial  losses. Consumer coupon fraud is a big concern that needs to be dealt  with but along with consumer fraud is retail fraud. Retail coupon fraud  occurs when non-legitimate retailers add in coupons that have not  actually been received through a consumer\u2019s purchase. One way additional  coupons are obtained is through fraudulent duplication of the original  coupons. The counterfeit coupons are sent in with the actual consumer  coupons to the manufacturer for redemption. Any business, from a private  restaurant to a large company, could loose a substantial amount from  fraudulent coupons.<\/p>\n\n\n\n<p><strong>True Watermarks | Artificial Watermarks<\/strong><\/p>\n\n\n\n<p>Watermarks can be used on documents to provide an effective form of \nprotection against counterfeiting. The watermark images are invisible or\n difficult to view unless held up to the light or held at a 45\u00b0 angle. \nThey can be applied as a true watermark which is applied to the paper \nduring the manufacturing process or as an artificial watermark which is \napplied by a printing process. Either type of watermark provides a \nsecurity feature that is difficult, if not impossible, to copy by \ncopiers and scanners. Shown below is a description of a true watermark \nand an artificial watermarks.<\/p>\n\n\n\n<p><strong>True Watermarks<\/strong><\/p>\n\n\n\n<p>True watermarks are made during the paper manufacturing process. An \nimage is formed when different degrees of pressure are applied to the \npaper by a dandy roll, containing the image, while the paper is still \nwet. True watermarks are also referred to as fourdrinier watermarks. \nSecurity paper with this feature is distributed only to authorized \nmanufactures, making it difficult for counterfeiters to obtain.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/dns-iran.com\/wp-content\/uploads\/2019\/01\/SecWMtrue1-1.gif\" alt=\"\" class=\"wp-image-210\" width=\"269\" height=\"166\"\/><\/figure><\/div>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><td>A true watermark is visible from the front and the back  of the paper when viewed in regular light. The image of a true  watermark cannot be copied or scanned to produce the same effect. The  inability to be copied or scanned provides, to your document, a high  level of security against counterfeiting<\/td><\/tr><tr><td>\n\n<\/td><\/tr><\/tbody><\/table>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><td>True watermarks are most often a standard watermark  applied by the paper manufacturer but can be applied as a custom  application. A custom watermark will add extra security to your document  by making it next to impossible for the counterfeiter to obtain your  special watermarked paper. There are a few things to keep in mind when  considering the use of a custom watermark. A dandy roll must be special  ordered with the custom image that is to be applied. The cost of the  custom dandy roll can add a substantial amount to the initial cost of  the paper but is usually a one time charge as long as the image does not  change. The cost per hundred weight of the paper may also be affected.  There are generally additional setup charges from the mill, minimum  order requirements, and extended lead times on delivery of the paper.  These issues need to be considered when determining the value of a  custom watermark.<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p><strong>Artificial Watermarks<\/strong><\/p>\n\n\n\n<p>Artificial watermarks are applied after the paper manufacturing \nprocess. They can be applied by the paper manufacturer or by the \nprinter. Many paper manufacturers offer stock security papers that have a\n standard artificial watermark applied to them. The cost of the security\n paper with an artificial watermark is generally a little less expensive\n than one with a true watermark.<\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><td>An artificial watermark can be seen from one side only.\n It is generally applied to the back side but can be applied to the \nfront side also. The watermark is achieved by printing the image in \nopaque white ink, transparent ink or by using varnish. They will all \nproduce an image that is visible when viewed at an angle. An artificial \nwatermark is sometimes also referred to as ghost printing. Artificial \nwatermarks are nearly impossible to duplicate by copier or scanners, \nmaking this a good security feature to add to your documents.\nAdding a customized artificial watermark to your document will make \nit even more difficult to duplicate. Customizing an artificial watermark\n is less expensive than customizing a true watermark. The customizing \ncan be accomplished by the paper manufacturer or the printer. The most \ncost effective alternative will depend on the quantity of watermarked \npaper needed. Consult your supplier as to what would be the best \nalternative for your needs.<\/td><\/tr><tr><td> <br>  <\/td><\/tr><\/tbody><\/table>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/dns-iran.com\/wp-content\/uploads\/2019\/01\/SecWMartifical.gif\" alt=\"\" class=\"wp-image-209\" width=\"289\" height=\"161\"\/><\/figure><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">Security Features |  Special Print Processes<\/h4>\n\n\n\n<p><strong>Hot Stamp Foil Printing<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"http:\/\/www.printingtips.com\/images\/graphicsedviser\/common\/security\/PrintFoil.jpg\" alt=\"\"\/><\/figure><\/div>\n\n\n\n<p>The hot stamp foil printing process bonds foil to paper \nor plastic to create a special foil image. The bonding of the foil to \npaper or plastic is created by using a metal die, heat and pressure. \nUsing foil printing is a very effective way to add security to your \ndocument. It cannot be duplicated by scanners or copiers. Hot stamp foil\n printing makes an effective deterrent to forgers since they would have \nto use the actual foil stamping process to reproduce the document with \nthe foil image. Foil printing can be applied in single color, multiple \ncolor, rainbow color or with a holographic pattern.<\/p>\n\n\n\n<p>Prismatic Printing<\/p>\n\n\n\n<p>Prismatic printing is a special printing technique where a pantograph\n background is printed in two or more colors on the same printing unit. \nThe different ink colors merge where they meet in the ink fountain to \nform a blend of colors in the background. The special varying effect is \nvery difficult to reproduce by using a scanner, computer or copier.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"http:\/\/www.printingtips.com\/images\/graphicsedviser\/common\/security\/PrintPrismatic.jpg\" alt=\"\"\/><\/figure><\/div>\n\n\n\n<p>Intaglio Printing<\/p>\n\n\n\n<p>The intaglio printing process uses a metal plate that  has had the image cut into the surface. The sunken image is filled with  ink and the surface is wiped clean so only ink is left in the sunken  image areas. Then dampened paper comes in contact with the plate and  pressure is applied, embossing the image and forcing the ink in the  image areas to transfer to the paper. The embossed ridges can be felt  when rubbing across the surface, indicating the the document is an  original. The intaglio printing process is used on old US currency and  95% of the world\u2019s currency. It is also used on stocks, bonds and other  valuable documents. It is a very specialized process that gives a  document a very high quality look. This high quality printing cannot be  reproduced by using scanners, color copiers or computers with laser  printers. Intaglio is an old printing process but is still used today as  one of the best security features on valuable documents.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Security Using an Intaglio Press<\/h4>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><a href=\"http:\/\/cronite.com\/wp-content\/uploads\/2011\/12\/leaf-2-yuan-100.jpg\"><img decoding=\"async\" src=\"http:\/\/cronite.com\/wp-content\/uploads\/2011\/12\/leaf-2-yuan-100-137x300.jpg\" alt=\"Close-up of an engraved image\" class=\"wp-image-552\"\/><\/a><\/figure><\/div>\n\n\n\n<p>Close-up of an engraved image<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Secure Far Beyond Offset or Digitized Printing<\/strong><\/h4>\n\n\n\n<p>In a world where photocopy machines, scanners, and computers can \nreproduce two-dimensional images within seconds, a raised intaglio image\n adds tactile, undigitizable protection to documents.<\/p>\n\n\n\n<p>More importantly, the pressure generated in the intaglio impression \nforces the ink into the fibers of the paper. The image is not only \ntactile as an overt security check, but once dry, the ink will be \nembedded in the paper.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Cronite\u2019s Equipment and Inks \u2013 An Unbeatable System<\/strong><\/h4>\n\n\n\n<p>Cronite flat stamping intaglio presses are the most cost effective \nway to produce an intaglio image. In addition to being vastly less \nexpensive than a rotary intaglio system, Cronite presses are extremely \nversatile.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Cronite Presses Can:<\/strong><\/h4>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><a href=\"http:\/\/cronite.com\/wp-content\/uploads\/2011\/12\/torch.jpg\"><img decoding=\"async\" src=\"http:\/\/cronite.com\/wp-content\/uploads\/2011\/12\/torch-130x300.jpg\" alt=\"Egngraved images are tactile\" class=\"wp-image-553\"\/><\/a><\/figure><\/div>\n\n\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/V3v1KLlTVHk\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n\n\n<p>Engraved images are tactile<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Print latent images<\/li><li>Print micro text<\/li><li>Print guilloches<\/li><li>Print multi-color intaglio images<\/li><li>Print a raised image with more height than traditional rotary machinery can produce<\/li><li>Blind emboss<\/li><li>Hot foil stamp<\/li><li>With an additional part, attach registered holograms<\/li><li><\/li><\/ul>\n\n\n\n<p><strong>Combine Layers of Protection<\/strong><\/p>\n\n\n\n<p>As with any security printing operation, many layers of both overt \nand covert protection are added to make a document harder to reproduce.&nbsp;\n Another layer of protection is gained by using security inks.&nbsp; Cronite \nproduces a wide range of inks which can be used in security operations.&nbsp;\n Please see our <a href=\"http:\/\/cronite.com\/index.php\/security-inks-2\">Security Ink page<\/a> for a partial listing<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Forgery of documents is becoming easier than ever before with the advancement being made in the technology of computers, scanners, printers and copiers. The problem does not only exist with check forgery but also with other documents that have dollar value or data value associated with them. The examples below [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1251,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-169","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/dns-iran.com\/index.php\/wp-json\/wp\/v2\/pages\/169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dns-iran.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dns-iran.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dns-iran.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dns-iran.com\/index.php\/wp-json\/wp\/v2\/comments?post=169"}],"version-history":[{"count":18,"href":"https:\/\/dns-iran.com\/index.php\/wp-json\/wp\/v2\/pages\/169\/revisions"}],"predecessor-version":[{"id":1497,"href":"https:\/\/dns-iran.com\/index.php\/wp-json\/wp\/v2\/pages\/169\/revisions\/1497"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dns-iran.com\/index.php\/wp-json\/wp\/v2\/media\/1251"}],"wp:attachment":[{"href":"https:\/\/dns-iran.com\/index.php\/wp-json\/wp\/v2\/media?parent=169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}