“…Mechanisms that provide cryptographic-like mechanisms to authenticate certain physical objects do exist, however. For example, there is a body of work has been done to study how specific paper documents could be authenticated based on their physical characteristics [43], [51], [85], [117], [165], [173], [190], [193], [199]. This would allow the document to be logged with its fingerprint, allowing it to be authenticated later if required.…”