ABSTRACT

Authentication may be separated into three specific categories: overt, covert, and forensic level.

Overt

security features are apparent and visible and do not require additional readers or instruments to detect them. The general public or untrained personnel can often verify them.