Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3335203.3335718acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
short-paper

Estimation of Copy-sensitive Codes Using a Neural Approach

Published: 02 July 2019 Publication History

Abstract

Copy sensitive graphical codes are used as anti-counterfeiting solution in packaging and document protection. Their security is funded on a design hard-to-predict after print and scan. In practice there exist different designs. Here random codes printed at the printer resolution are considered. We suggest an estimation of such codes by using neural networks, an in-trend approach which has however not been studied yet in the present context. In this paper, we test a state-of-the-art architecture efficient in the binarization of handwritten characters. The results show that such an approach can be successfully used by an attacker to provide a valid counterfeited code so fool an authentication system.

References

[1]
G. Adams, S. Pollard, and S. Simske. 2011. A study of the interaction of paper substrates on printed forensic imaging. In Proceedings of the 11th ACM symposium on Document engineering. ACM, 263--266.
[2]
C. Baras and F. Cayre. 2012. 2D bar-codes for authentication: A security approach. In Signal Processing Conference (EUSIPCO), Proceedings of the 20th European. 1760--1766.
[3]
C. Baras and F. Cayre. 2013. Towards a realistic channel model for security analysis of authentication using graphical codes. In Information Forensics and Security (WIFS), 2013 IEEE International Workshop on. IEEE, 115--119.
[4]
L. Bottou. 2010. Large-scale machine learning with stochastic gradient descent. In Proceedings of COMPSTAT'2010. Springer, 177--186.
[5]
J. Calvo-Zaragoza and A.-J. Gallego. 2019. A selectional auto-encoder approach for document image binarization. Pattern Recognition 86 (2019), 37--47.
[6]
M. L Diong, P. Bas, C. Pelle, and W. Sawaya. 2012. Document authentication using 2D codes: Maximizing the decoding performance using statistical inference. In IFIP International Conference on Communications and Multimedia Security. Springer, 39--54.
[7]
A. E. Dirik and B. Haas. 2012. Copy detection pattern-based document protection for variable media. IET Image Processing 6, 8 (2012), 1102--1113.
[8]
X. Glorot and Y. Bengio. 2010. Understanding the difficulty of training deep feedforward neural networks. In Proceedings of the thirteenth international conference on artificial intelligence and statistics. 249--256.
[9]
R. N. Goldman. 1983. Non-counterfeitable document system. US Patent 4,423,415.
[10]
K. He, X. Zhang, S. Ren, and J. Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition. 770--778.
[11]
A. T. P. Ho, B. A. M. Hoang, W. Sawaya, and P. Bas. 2014. Document Authentication Using Graphical Codes: Reliable Performance Analysis and Channel Optimization. EURASIP Journal on Information Security 2014, 1 (2014), 9.
[12]
X. Mao, C. Shen, and Y-B. Yang. 2016. Image restoration using very deep convolutional encoder-decoder networks with symmetric skip connections. In Advances in neural information processing systems. 2802--2810.
[13]
A-T. Phan Ho, B-A. Mai Hoang,W. Sawaya, and P. Bas. 2013. Document authentication using graphical codes: impacts of the channel model. In Proceedings of the first ACM workshop on Information hiding and multimedia security. ACM, 87--94.
[14]
J. Picard. 2004. Digital authentication with copy-detection patterns. In Electronic Imaging 2004. International Society for Optics and Photonics, 176--183.
[15]
J. Picard and P. Landry. 2017. Two dimensional barcode and method of authentication of such barcode. US Patent 9,594,993.
[16]
S. B Pollard, S. J Simske, and G. B Adams. 2010. Model based print signature profile extraction for forensic analysis of individual text glyphs. In Information Forensics and Security (WIFS), 2010 IEEE International Workshop on. IEEE, 1--6.
[17]
I. Pratikakis, K. Zagoris, G. Barlas, and B. Gatos. 2016. ICFHR2016 handwritten document image binarization contest (H-DIBCO 2016). In 2016 15th International Conference on Frontiers in Handwriting Recognition (ICFHR). IEEE, 619--623.
[18]
R. Schraml, L. Debiasi, and A. Uhl. 2018. Real or Fake: Mobile Device Drug Packaging Authentication. In Proceedings of the 6th ACMWorkshop on Information Hiding and Multimedia Security. ACM, 121--126.
[19]
S. J Simske and G. Adams. 2010. High-resolution glyph-inspection based security system. In Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on. IEEE, 1794--1797.
[20]
O. Taran, S. Bonev, and S. Voloshynovskiy. 2019. Clonability of anti-counterfeiting printable graphical codes: a machine learning approach. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Brighton, United Kingdom.
[21]
J. Tchan. 2004. The development of an image analysis system that can detect fraudulent alterations made to printed images. In Optical Security and Counterfeit Deterrence Techniques V, Vol. 5310. International Society for Optics and Photonics, 151--160.
[22]
I. Tkachenko and C. Destruel. 2018. Exploitation of redundancy for pattern estimation of copy-sensitive two level QR code. In Workshop on Information Forensics and security (WIFS), IEEE.
[23]
I. Tkachenko, C. Destruel, O. Strauss, and W. Puech. 2017. Sensitivity of different correlation measures to print-and-scan process. Electronic Imaging 2017 (2017).
[24]
I. Tkachenko, W. Puech, C. Destruel, O. Strauss, J-M. Gaudin, and C. Guichard. 2016. Two-Level QR Code for Private Message Sharing and Document Authentication. IEEE Transactions on Information Forensics and Security 11, 3 (2016), 571--583.
[25]
I. Tkachenko, W. Puech, O. Strauss, C. Destruel, and J-M. Gaudin. 2016. Printed document authentication using two level or code. In Acoustics, Speech and Signal Processing (ICASSP), 2016 IEEE International Conference on. IEEE, 2149--2153.
[26]
W. Wang, Y. Huang, Y. Wang, and L. Wang. 2014. Generalized autoencoder: A neural network framework for dimensionality reduction. In Proceedings of the IEEE conference on computer vision and pattern recognition workshops. 490--497.
[27]
C-W.Wong and M.Wu. 2017. Counterfeit Detection Based on Unclonable Feature of Paper Using Mobile Camera. IEEE Transactions on Information Forensics and Security 12, 8 (2017), 1885--1899.

Cited By

View all
  • (2024)A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection PatternsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.336179819(3395-3408)Online publication date: 2024
  • (2024)Authentication of Copy Detection Patterns: A Pattern Reliability Based ApproachIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335951019(3124-3134)Online publication date: 2024
  • (2023)Mobile authentication of copy detection patternsEURASIP Journal on Information Security10.1186/s13635-023-00140-52023:1Online publication date: 6-Jun-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
IH&MMSec'19: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security
July 2019
249 pages
ISBN:9781450368216
DOI:10.1145/3335203
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 July 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authentication
  2. copy-sensitive codes
  3. estimation attack
  4. neural networks for binarization
  5. print-and-scan process

Qualifiers

  • Short-paper

Conference

IH&MMSec '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection PatternsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.336179819(3395-3408)Online publication date: 2024
  • (2024)Authentication of Copy Detection Patterns: A Pattern Reliability Based ApproachIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335951019(3124-3134)Online publication date: 2024
  • (2023)Mobile authentication of copy detection patternsEURASIP Journal on Information Security10.1186/s13635-023-00140-52023:1Online publication date: 6-Jun-2023
  • (2023)CDP-Sim: Similarity Metric Learning to Identify the Fake Copy Detection Patterns2023 IEEE International Workshop on Information Forensics and Security (WIFS)10.1109/WIFS58808.2023.10374744(1-6)Online publication date: 4-Dec-2023
  • (2022)Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns2022 IEEE International Workshop on Information Forensics and Security (WIFS)10.1109/WIFS55849.2022.9975447(1-6)Online publication date: 12-Dec-2022
  • (2022)Printing variability of copy detection patterns2022 IEEE International Workshop on Information Forensics and Security (WIFS)10.1109/WIFS55849.2022.9975380(1-6)Online publication date: 12-Dec-2022
  • (2022)Detection of Information Hiding at Anti-Copying 2D BarcodesIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2021.305909232:1(437-450)Online publication date: Jan-2022
  • (2022)Authentication Of Copy Detection Patterns Under Machine Learning Attacks: A Supervised Approach2022 IEEE International Conference on Image Processing (ICIP)10.1109/ICIP46576.2022.9897700(1296-1300)Online publication date: 16-Oct-2022
  • (2022)Protecting Documents Using Printed Anticopy ElementsMultimedia Security 210.1002/9781119987390.ch2(31-58)Online publication date: Jul-2022
  • (2021)Mobile authentication of copy detection patterns: how critical is to know fakes?2021 IEEE International Workshop on Information Forensics and Security (WIFS)10.1109/WIFS53200.2021.9648398(1-6)Online publication date: 7-Dec-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media