Proceedings of the ACM Workshop on Information Hiding and Multimedia Security 2019
DOI: 10.1145/3335203.3335718
|View full text |Cite
|
Sign up to set email alerts
|

Estimation of Copy-sensitive Codes Using a Neural Approach

Abstract: Copy sensitive graphical codes are used as anti-counterfeiting solution in packaging and document protection. Their security is funded on a design hard-to-predict after print and scan. In practice there exist different designs. Here random codes printed at the printer resolution are considered. We suggest an estimation of such codes by using neural networks, an in-trend approach which has however not been studied yet in the present context. In this paper, we test a state-of-the-art architecture efficient in th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 17 publications
(18 citation statements)
references
References 22 publications
(25 reference statements)
0
18
0
Order By: Relevance
“…Obviously, if the resolution of the scanner is equal to that of the printer, the printed-and-scanned units have the same size as the printed ones: u = v. An opponent can try to estimate and retrieve the original binary CSGC by scanning the genuine printed version before re-printing in order to produce a fake one. Such an estimation attack consists of the following steps: 1) scanning at a resolution v o , where v o ≥ u, 2) image processing including a binarization process (as digital printers available on the market can only print black-and-white images), using a statistical approach [5] or machine learning techniques as SVM, LDA [3] and neural networks [6], [7], 3) printing the estimated CSGC, I at the same print resolution as the generation stage. The considered authentication system is presented in Fig.…”
Section: Authentication System Based On Csgcmentioning
confidence: 99%
See 4 more Smart Citations
“…Obviously, if the resolution of the scanner is equal to that of the printer, the printed-and-scanned units have the same size as the printed ones: u = v. An opponent can try to estimate and retrieve the original binary CSGC by scanning the genuine printed version before re-printing in order to produce a fake one. Such an estimation attack consists of the following steps: 1) scanning at a resolution v o , where v o ≥ u, 2) image processing including a binarization process (as digital printers available on the market can only print black-and-white images), using a statistical approach [5] or machine learning techniques as SVM, LDA [3] and neural networks [6], [7], 3) printing the estimated CSGC, I at the same print resolution as the generation stage. The considered authentication system is presented in Fig.…”
Section: Authentication System Based On Csgcmentioning
confidence: 99%
“…The underlying process basically requests processing each input pixel for classification. Taking advantage of recent advancements in deep networks, the authors of [7] suggested the use of a fully convolutional auto-encoder that has previously demonstrated promising results in binarization of degraded manuscripts [11]. Additional use of residual connection in the architecture provides an opportunity to efficiently train the deep network.…”
Section: Neural Approach With Resolution Managementmentioning
confidence: 99%
See 3 more Smart Citations