. . . "FIG. 2 is an exemplary illustration of a secure document created using the system." .