2021 IEEE International Workshop on Information Forensics and Security (WIFS) 2021
DOI: 10.1109/wifs53200.2021.9648387
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning attack on copy detection patterns: are $1\times 1$ patterns cloneable?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…These two types of originally binary anti-copy elements correspond to the subclasses of Copy Sensitive Graphical Codes (CSGCs) [28], [30], [37], [26] and Print Test Patterns (PTPs) [44], [31], respectively. Recent research works showed the vulnerability of CS-GCs based approaches to deep-learning based estimation attacks [43], [1]. Nevertheless, the countermeasures based on pre-processing technique [16] and the use of similarity metrics combinations [35] showed the usability of such solution in real-world applications for packaging protection.…”
Section: Overview Of Existing Printing Solutionsmentioning
confidence: 99%
See 2 more Smart Citations
“…These two types of originally binary anti-copy elements correspond to the subclasses of Copy Sensitive Graphical Codes (CSGCs) [28], [30], [37], [26] and Print Test Patterns (PTPs) [44], [31], respectively. Recent research works showed the vulnerability of CS-GCs based approaches to deep-learning based estimation attacks [43], [1]. Nevertheless, the countermeasures based on pre-processing technique [16] and the use of similarity metrics combinations [35] showed the usability of such solution in real-world applications for packaging protection.…”
Section: Overview Of Existing Printing Solutionsmentioning
confidence: 99%
“…The World Health Organization (WHO) estimates that 1 in 10 medical products in low-and middle-income countries is substandard or falsified 1 . The falsified medicines are dangerous for human health and life.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…An attacker accesses the original printed CDP in the public domain and estimates, for an observed original x d i , the digital template t i as td i through a ML-based estimation model [4,5,6,7]. Having the estimation td i , the attacker is then able to produce a fake code f a/d i ∈ R w×h using one of the attacker's printing processes a ∈ A, |A| = A.…”
Section: Problem Formulationmentioning
confidence: 99%
“…cloned under certain conditions [3,4,5]. More recent works, which used industrial printers such as HP Indigo capable of producing symbols of size 1x1 at the resolution of 812.8 dpi, have shown that attacks based on ML-methods make the authentication based on hand-crafted features and SVM-based classifiers harder for the defender [6,7].…”
Section: Introductionmentioning
confidence: 99%