ABSTRACT
Authentication may be separated into three specific categories: overt, covert, and forensic level.
Overt
security features are apparent and visible and do not require additional readers or instruments to detect them. The general public or untrained personnel can often verify them.