Available free with Membership! Find out more
Covert Tagging can play an important role within wider authentication systems. The factors in developing an authentication strategy, the benefit of the relationships with the other technologies and technology categories, and methodologies for choosing among alternative solutions are explored.
This publication includes a section on the types and benefits of various covert technologies and short introductions to some of the currently available technologies. The e-book concludes with a section related to future trends that can be expected to accompany the growing public awareness and the likely technological and legislative impact on future anti-counterfeit systems that could follow, so you can plan future strategy with confidence.