Mobile authentication of copy detection patterns

被引:2
|
作者
Taran, Olga [1 ]
Tutt, Joakim [1 ]
Holotyak, Taras [1 ]
Chaban, Roman [1 ]
Bonev, Slavi [1 ]
Voloshynovskiy, Slava [1 ]
机构
[1] Univ Geneva, Dept Comp Sci, Stochast Informat Proc Grp, 7 Route Drize, CH-1227 Carouge, Switzerland
基金
瑞士国家科学基金会;
关键词
Authentication; Copy detection patterns; Copy fakes; Multi-class classification; One-class classification; PRINTABLE GRAPHICAL CODES; 2-LEVEL QR CODE;
D O I
10.1186/s13635-023-00140-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection applications. However, the security of CDP in terms of their reproducibility by unauthorized parties or clonability remains largely unexplored. In this respect, this paper addresses a problem of anti-counterfeiting of physical objects and aims at investigating the authentication aspects and the resistances to illegal copying of the modern CDP from machine learning perspectives. A special attention is paid to a reliable authentication under the real-life verification conditions when the codes are printed on an industrial printer and enrolled via modern mobile phones under regular light conditions. The theoretical and empirical investigation of authentication aspects of CDP is performed with respect to four types of copy fakes from the point of view of (i) multi-class supervised classification as a baseline approach and (ii) one-class classification as a real-life application case. The obtained results show that the modern machine-learning approaches and the technical capacities of modern mobile phones allow to reliably authenticate CDP on end-user mobile phones under the considered classes of fakes.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] Robust Mobile Spamming Detection via Graph Patterns
    Zhao, Yuhang
    Zhang, Zhaoxiang
    Wang, Yunhong
    Liu, Jianyun
    2012 21ST INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR 2012), 2012, : 983 - 986
  • [42] A Novel Approach to Enhancing Identity Document Authentication with Copy-Move Forgery Detection Using CNN
    Devi, Kilari Jyothsna
    Dinesh, Jonnalagadda
    Neha, Kavuri Lakshmi
    Teja, Kuraku V. N. S. Ravi
    Jayashree, Maddela
    Devi, J. Rama
    4TH INTERDISCIPLINARY CONFERENCE ON ELECTRICS AND COMPUTER, INTCEC 2024, 2024,
  • [43] Copy-move forgery detection using multiresolution local binary patterns
    Davarzani, Reza
    Yaghmaie, Khashayar
    Mozaffari, Saeed
    Tapak, Meysam
    FORENSIC SCIENCE INTERNATIONAL, 2013, 231 (1-3) : 61 - 72
  • [44] Privacy Enhanced Mobile Authentication
    G. M. Køien
    Wireless Personal Communications, 2007, 40 : 443 - 455
  • [45] On the Use of Emojis in Mobile Authentication
    Kraus, Lydia
    Schmidt, Robert
    Walch, Marcel
    Schaub, Florian
    Moeller, Sebastian
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017, 2017, 502 : 265 - 280
  • [46] (In)secure Acoustic Mobile Authentication
    Han, Dianqi
    Li, Ang
    Li, Tao
    Zhang, Lili
    Zhang, Yan
    Li, Jiawei
    Zhang, Rui
    Zhang, Yanchao
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (09) : 3193 - 3207
  • [47] Privacy enhanced mobile authentication
    Koien, G. M.
    WIRELESS PERSONAL COMMUNICATIONS, 2007, 40 (03) : 443 - 455
  • [48] Authentication mechanisms for mobile agents
    Ismail, Leila
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 246 - 253
  • [49] Biometric Authentication on Mobile Devices
    Mayron, Liam M.
    IEEE SECURITY & PRIVACY, 2015, 13 (03) : 70 - 73
  • [50] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58