Banknote Authentication with Mobile Devices

被引:15
|
作者
Lohweg, Volker [1 ]
Hoffmann, Jan Leif [1 ]
Doerksen, Helene [1 ]
Hildebrand, Roland [1 ]
Gillich, Eugen [1 ]
Hofmann, Juerg [2 ]
Schaede, Johannes [2 ]
机构
[1] Ostwestfalen Lippe Univ Appl Sci, InIT Inst Ind IT, D-32657 Lemgo, Germany
[2] KBA NotaSys SA, CH-1018 Lausanne, Switzerland
关键词
Banknote; Authentication; Mobile Device; smartphone; Wavelet Transform; Classification; Adaptation; Sound-of-Intaglio; FEATURE-EXTRACTION; WAVELET;
D O I
10.1117/12.2001444
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Maintaining confidence in security documents, especially banknotes, is and remains a major concern for the central banks in order to maintain the stability of the economy around the world. In this paper we describe an image processing and pattern recognition approach which is based on the Sound-of-Intaglio principle for the usage in smart devices such as smartphones. Today, in many world regions smartphones are in use. These devices become more and more computing units, equipped with resource-limited, but effective CPUs, cameras with illumination, and flexible operating systems. Hence, it is obvious to apply smartphones for banknote authentication, especially for visually impaired persons. Our approach shows that those devices are capable of processing data under the constraints of image quality and processing power. Strictly a mobile device as such is not an industrial product for harsh environments, but it is possible to use mobile devices for banknote authentication. The concept is based on a new strategy for constructing adaptive Wavelets for the analysis of different print patterns on a banknote. Furthermore, a banknote specific feature vector is generated which describes an authentic banknote effectively under various illumination conditions. A multi-stage Linear-discriminant-analysis classifier generates stable and reliable output.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Touch to Authenticate - Continuous Biometric Authentication on Mobile Devices
    Temper, Marlies
    Tjoa, Simon
    Kaiser, Manfred
    PROCEEDINGS 2015 FIRST INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA 2015), 2015, : 30 - 35
  • [42] Identity authentication based on trajectory characteristics of mobile devices
    Gao, Zhigang
    Cheng, Zhichao
    Diao, Wenjie
    Zhang, Jianhui
    Lu, Huijuan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 112
  • [43] Active authentication for mobile devices utilising behaviour profiling
    Li, Fudong
    Clarke, Nathan
    Papadaki, Maria
    Dowland, Paul
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (03) : 229 - 244
  • [44] Mutual authentication for low-power mobile devices
    Jakobsson, M
    Pointcheval, D
    FINANCIAL CRYTOGRAPHY, PROCEEDINGS, 2002, 2339 : 178 - 195
  • [45] Towards Multiple User Active Authentication in Mobile Devices
    Perera, Pramuditha
    Patel, Vishal M.
    2017 12TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION (FG 2017), 2017, : 354 - 361
  • [46] Keystroke dynamics-based authentication for mobile devices
    Hwang, Seong-Seob
    Cho, Sungzoon
    Park, Sunghoon
    COMPUTERS & SECURITY, 2009, 28 (1-2) : 85 - 93
  • [47] Authentication in mobile devices through hand gesture recognition
    J. Guerra-Casanova
    C. Sánchez-Ávila
    G. Bailador
    A. de Santos Sierra
    International Journal of Information Security, 2012, 11 : 65 - 83
  • [48] User authentication on mobile devices: Approaches, threats and trends
    Wang, Chen
    Wang, Yan
    Chen, Yingying
    Liu, Hongbo
    Liu, Jian
    COMPUTER NETWORKS, 2020, 170
  • [49] Action-based Authentication Scheme for Mobile Devices
    Garcia, Jan Edson S.
    Atienza, Rowel O.
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL I, 2010, : 380 - 383
  • [50] Authentication in mobile devices through hand gesture recognition
    Guerra-Casanova, J.
    Sanchez-Avila, C.
    Bailador, G.
    de Santos Sierra, A.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (02) : 65 - 83