chapter  12
8 Pages

Selecting authentication and tracking technologies for packaging

Authentication may be separated into three specific categories: overt, covert, and forensic level.


security features are apparent and visible and do not require additional readers or instruments to detect them. The general public or untrained personnel can often verify them.