cpfi-shield

Welcome 

Security technologies are the primary means being developed to counteract crimes such as currency counterfeiting, identity theft, card/document forgery and fraud, and counterfeit drug sales. It is estimated that these crimes result in losses of more than $3 trillion per year – approximately 5% of total yearly revenue worldwide1. However, the security technology industries are not well integrated, so a need exists for a center devoted to developing and integrating the requisite technologies for improving security.

The Center for Security Technology (CST) has a broad security theme, including current expertise in cybersecurity, security printing and other security disciplines. The research is facilitated through a host of industry partners. For example, in January of 2011, Dakota State University and Chenega Logistics LLC formed a partnership to develop a Center of Technology Excellence to focus on cybersecurity research, education and outreach in the federal government space. This SD EPSCoR RII T1 Proposal Planning Grant matures this partnership through the creation of a plan that operationalizes the human and technological infrastructures necessary to respond to and win all types of federal security contracts.

The CST is multi-disciplinary and minimally includes researchers from the following disciplines: computer science, information science, materials science, chemistry and electrical engineering. The initial research foci that have been identified are described below:

cst-rook
  • Unique upcoverting inks for covert and forensic document security applications have already been developed. This work will be expanded both to include development of other security inks and to integrate these inks into a variety of printing methods used in the security printing industry. In addition, inks will be developed to identify chemical/biological warfare agents or toxic environmental contaminants on documents via their signatures.
  • Computer pattern recognition and image analysis are also critical to security technology. For instance, an embedded marker making a private key for decryption gives confidence that the marked item is genuine. Error detection/correction is needed at several stages of this process so that an error in marking or printing the encrypted image would not cause the system to fail. Steganography, or similar techniques, introduces an irreproducible aspect to the marker yielding enhanced security.
  • Enabling technologies for cyber security and information assurance, R&D cyber security test beds, I.T. systems modeling, simulation and visualization. Predictive analysis, Internet modeling, simulation and visualization. Hardware and firmware security. Cyber security and information assurance characterization assessment and predictive analysis.

Last Updated: 8/1/12