2017
DOI: 10.2352/issn.2470-1173.2017.7.mwsf-335
|View full text |Cite
|
Sign up to set email alerts
|

Sensitivity of different correlation measures to print-and-scan process

Abstract: The authentication of printed documents is a nowadays challenge. One of the promising solutions for document authentication is the use of copy sensitive graphical codes that can offer data storage and support authentication. Both data decoding and physical authentication are based on comparison between printed-and-scanned samples and original numerical codes. In this paper we want to evaluate different existing correlation measures (Kendall and Spearman) and to propose a new Kendall weighted correlation metric… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 10 publications
(15 citation statements)
references
References 9 publications
0
10
0
Order By: Relevance
“…The opponent can perform histogram equalization or application of sharpen enhancement of printed and scanned CSGC. These basic image processing techniques can improve the quality of CSGC, but the naive use of image processing techniques [23] cannot help to create good quality counterfeits and thus cannot fool the authentication test. The authors in [7] propose the so-called "smart" attack: (a) an attacker may try to estimate the original CDP pixels utilizing inverse print-and-scan model; (b) then, s/he can generate genuine-like CDPs and copy CDP protected documents safely.…”
Section: Smart Attackmentioning
confidence: 99%
“…The opponent can perform histogram equalization or application of sharpen enhancement of printed and scanned CSGC. These basic image processing techniques can improve the quality of CSGC, but the naive use of image processing techniques [23] cannot help to create good quality counterfeits and thus cannot fool the authentication test. The authors in [7] propose the so-called "smart" attack: (a) an attacker may try to estimate the original CDP pixels utilizing inverse print-and-scan model; (b) then, s/he can generate genuine-like CDPs and copy CDP protected documents safely.…”
Section: Smart Attackmentioning
confidence: 99%
“…If the authentication test has a positive result, the scanned document is considered as authentic. The authentication process of 2LQR code is based on correlation values [10] and a pre-calculated authentication threshold.…”
Section: Authentication System Based On Copy Sensitive Graphical Codesmentioning
confidence: 99%
“…, cor n ) ≥ T h). The studied duplication and naive attacks [7,10] show the problems of authentication process. The correlation values of several authentic codes are quite small and thus leads sometimes to its rejection.…”
Section: Authentication System Based On Copy Sensitive Graphical Codesmentioning
confidence: 99%
“…Then in [8,9] the dark modules of QR code are replaced with patters to form a new textured image called two-level QR (2LQR) code. The 2LQR code is one of the most promising solutions thanks to low-cost generation and easy integration [10]. The patterns in 2LQR codes are sensitive to print-and-scan (P&S) process.…”
Section: Introductionmentioning
confidence: 99%