2009 16th IEEE International Conference on Image Processing (ICIP) 2009
DOI: 10.1109/icip.2009.5414608
|View full text |Cite
|
Sign up to set email alerts
|

Distortion metrics for predicting authentication functionality of printed security deterrents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…The two final features are computed by averaging the following calculations over the R, G and B color channels: the average per-channel standard deviation, where the individual standard deviations are weighted by the fraction of non-white pixels in the associated color class, and the standard deviation of all the per-channel means. Note that these 36 + 2 + 2 = 40 features can be computed based on any image data, i.e., they represent generalized versions of previously described features [6,8] that were designed specifically for scanned color tiles. On the other hand, one might only expect the features to be useful in the cases where the markings were formed with a relatively small number of distinct colors.…”
Section: Color-class-based Featuresmentioning
confidence: 99%
See 1 more Smart Citation
“…The two final features are computed by averaging the following calculations over the R, G and B color channels: the average per-channel standard deviation, where the individual standard deviations are weighted by the fraction of non-white pixels in the associated color class, and the standard deviation of all the per-channel means. Note that these 36 + 2 + 2 = 40 features can be computed based on any image data, i.e., they represent generalized versions of previously described features [6,8] that were designed specifically for scanned color tiles. On the other hand, one might only expect the features to be useful in the cases where the markings were formed with a relatively small number of distinct colors.…”
Section: Color-class-based Featuresmentioning
confidence: 99%
“…Details about how color tile patterns are structured, how they are decoded, and what features are computed from them for classification purposes are described in [6,8]. Guilloche curve patterns are formed with combinations of solid color regions, but the spatial relationships between the regions are more sophisticated since the regions are composed of groups of polar curves.…”
Section: Structured Image Datamentioning
confidence: 99%
“…Support Vector Machines (SVM) appears to be widely used throughout the literature and promise a wide variety of applications such as banknote classification [76,77,78,79,80,81]. SVM is successfully implemented to recognize serial numbers on banknotes [82], and used for detection of stains to determine worn out banknotes [81].…”
Section: ) Authenticating Security Componentsmentioning
confidence: 99%
“…It is shown in [34,35,36,40,78,79,105,106], print anomalies can be detected and calculated to create a signature based on pixel distribution and satellite droplets. Similarly texture analysis of paper [41,47] investigates various qualities of the texture and roughness of surfaces relating to documents and banknotes, similarly [42] investigates the texture of the ink pattern.…”
Section: Trendsmentioning
confidence: 99%
“…Because of both the defaults of the physical process and the stochastic nature of the matter, this interaction can be considered as a physically unclonable function (PUF) [4] that cannot be reproduced by the forger and can consequently be used to perform authentication. In [5], the authors measure the degradation of the inks within printed color tiles and use discrepancy between the statistics of the authentic and print-and-scan tiles to perform authentication. Other marking techniques can also be used; in [6], the authors propose to characterize the random profiles of laser marks on materials such as metals (the technique is called LPUF for laser-written PUF) to use them as authentication features.…”
Section: Addressed Problem and Related Workmentioning
confidence: 99%