2021 IEEE International Workshop on Information Forensics and Security (WIFS) 2021
DOI: 10.1109/wifs53200.2021.9648398
|View full text |Cite
|
Sign up to set email alerts
|

Mobile authentication of copy detection patterns: how critical is to know fakes?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Similarly, [15] employed a one class support vector machine (OC-SVM) for the authentication method. The research aimed to examine the feasibility of CDP authentication under real-world conditions, by using codes that were printed on an industrial printer and captured by a modern mobile phone.…”
Section: Cdp Methodsmentioning
confidence: 99%
“…Similarly, [15] employed a one class support vector machine (OC-SVM) for the authentication method. The research aimed to examine the feasibility of CDP authentication under real-world conditions, by using codes that were printed on an industrial printer and captured by a modern mobile phone.…”
Section: Cdp Methodsmentioning
confidence: 99%
“…Recent research works showed the vulnerability of CS-GCs based approaches to deep-learning based estimation attacks [43], [1]. Nevertheless, the countermeasures based on pre-processing technique [16] and the use of similarity metrics combinations [35] showed the usability of such solution in real-world applications for packaging protection. 3) Forensics approach.…”
Section: Overview Of Existing Printing Solutionsmentioning
confidence: 99%
“…This solution is interesting as it gives good results in open and closed set conditions. All the mentioned solutions, especially the recent forensics systems [27], [6] and CSGC based authentication systems [16], [35], achieve good identification/authentication results. Nevertheless, almost all cited solutions were tested on coated or uncoated paper using laser printers.…”
Section: Overview Of Existing Printing Solutionsmentioning
confidence: 99%
“…An attacker accesses the original printed CDP in the public domain and estimates, for an observed original x d i , the digital template t i as td i through a ML-based estimation model [4,5,6,7]. Having the estimation td i , the attacker is then able to produce a fake code f a/d i ∈ R w×h using one of the attacker's printing processes a ∈ A, |A| = A.…”
Section: Problem Formulationmentioning
confidence: 99%
“…The defender has to design an authentication system that, given original or fake code y i , predicts its authenticity with respect to t i . cloned under certain conditions [3,4,5]. More recent works, which used industrial printers such as HP Indigo capable of producing symbols of size 1x1 at the resolution of 812.8 dpi, have shown that attacks based on ML-methods make the authentication based on hand-crafted features and SVM-based classifiers harder for the defender [6,7].…”
Section: Introductionmentioning
confidence: 99%