Mobile authentication of copy detection patterns

被引:2
|
作者
Taran, Olga [1 ]
Tutt, Joakim [1 ]
Holotyak, Taras [1 ]
Chaban, Roman [1 ]
Bonev, Slavi [1 ]
Voloshynovskiy, Slava [1 ]
机构
[1] Univ Geneva, Dept Comp Sci, Stochast Informat Proc Grp, 7 Route Drize, CH-1227 Carouge, Switzerland
基金
瑞士国家科学基金会;
关键词
Authentication; Copy detection patterns; Copy fakes; Multi-class classification; One-class classification; PRINTABLE GRAPHICAL CODES; 2-LEVEL QR CODE;
D O I
10.1186/s13635-023-00140-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection applications. However, the security of CDP in terms of their reproducibility by unauthorized parties or clonability remains largely unexplored. In this respect, this paper addresses a problem of anti-counterfeiting of physical objects and aims at investigating the authentication aspects and the resistances to illegal copying of the modern CDP from machine learning perspectives. A special attention is paid to a reliable authentication under the real-life verification conditions when the codes are printed on an industrial printer and enrolled via modern mobile phones under regular light conditions. The theoretical and empirical investigation of authentication aspects of CDP is performed with respect to four types of copy fakes from the point of view of (i) multi-class supervised classification as a baseline approach and (ii) one-class classification as a real-life application case. The obtained results show that the modern machine-learning approaches and the technical capacities of modern mobile phones allow to reliably authenticate CDP on end-user mobile phones under the considered classes of fakes.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] Anomaly localization for copy detection patterns through print estimations
    Pulfer, Brian
    Belousov, Yury
    Tutt, Joakim
    Chaban, Roman
    Taran, Olga
    Holotyak, Taras
    Voloshynovskiy, Slava
    2022 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2022,
  • [22] An authentication method for copy areas of images
    Ju, Shenggen
    Zhou, Jiliu
    He, Kun
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON IMAGE AND GRAPHICS, 2007, : 303 - +
  • [23] Mobile digital rights management: Security requirements and copy detection mechanisms
    Soriano, M
    Flake, S
    Tacken, J
    Bormann, F
    Tomas, J
    Sixteenth International Workshop on Database and Expert Systems Applications, Proceedings, 2005, : 251 - 256
  • [24] Handover authentication latency reduction using mobile edge computing and mobility patterns
    Fatima Abdullah
    Dragi Kimovski
    Radu Prodan
    Kashif Munir
    Computing, 2021, 103 : 2667 - 2686
  • [25] Handover authentication latency reduction using mobile edge computing and mobility patterns
    Abdullah, Fatima
    Kimovski, Dragi
    Prodan, Radu
    Munir, Kashif
    COMPUTING, 2021, 103 (11) : 2667 - 2686
  • [26] Mobile Phone Multi-Factor Authentication with Robustness of Clone Detection
    Zhuk, Sergiy
    Gepko, Igor
    2016 13TH INTERNATIONAL CONFERENCE ON MODERN PROBLEMS OF RADIO ENGINEERING, TELECOMMUNICATIONS AND COMPUTER SCIENCE (TCSET), 2016, : 432 - 435
  • [27] Novelty Detection for Risk-based User Authentication on Mobile Devices
    Papaioannou, Maria
    Zachos, Georgios
    Mantas, Georgios
    Rodriguez, Jonathan
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 837 - 842
  • [28] A Secure Intrusion Detection System with Authentication in Mobile Ad hoc Network
    Shrestha, Rakesh
    Sung, Jong-Yeop
    Lee, Sang-Duck
    Sik-Yun, Pyung
    Choi, Dong-You
    Han, Seung-Jo
    PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 759 - 762
  • [29] Outlier Detection for Risk-based User Authentication on Mobile Devices
    Papaioannou, Maria
    Zachos, Georgios
    Mantas, Georgios
    Essop, Ismael
    Saghezchi, Firooz B.
    Rodriguez, Jonathan
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2778 - 2783
  • [30] Continuous face authentication scheme for mobile devices with tracking and liveness detection
    Smith-Creasey, Max
    Albalooshi, Fatema A.
    Rajarajan, Muttukrishnan
    MICROPROCESSORS AND MICROSYSTEMS, 2018, 63 : 147 - 157