Cargando…
Mobile authentication of copy detection patterns
In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection applications. However, the security of CDP in terms of their reproducibility by unauthoriz...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer International Publishing
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10244288/ https://www.ncbi.nlm.nih.gov/pubmed/37292064 http://dx.doi.org/10.1186/s13635-023-00140-5 |
_version_ | 1785054604907511808 |
---|---|
author | Taran, Olga Tutt, Joakim Holotyak, Taras Chaban, Roman Bonev, Slavi Voloshynovskiy, Slava |
author_facet | Taran, Olga Tutt, Joakim Holotyak, Taras Chaban, Roman Bonev, Slavi Voloshynovskiy, Slava |
author_sort | Taran, Olga |
collection | PubMed |
description | In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection applications. However, the security of CDP in terms of their reproducibility by unauthorized parties or clonability remains largely unexplored. In this respect, this paper addresses a problem of anti-counterfeiting of physical objects and aims at investigating the authentication aspects and the resistances to illegal copying of the modern CDP from machine learning perspectives. A special attention is paid to a reliable authentication under the real-life verification conditions when the codes are printed on an industrial printer and enrolled via modern mobile phones under regular light conditions. The theoretical and empirical investigation of authentication aspects of CDP is performed with respect to four types of copy fakes from the point of view of (i) multi-class supervised classification as a baseline approach and (ii) one-class classification as a real-life application case. The obtained results show that the modern machine-learning approaches and the technical capacities of modern mobile phones allow to reliably authenticate CDP on end-user mobile phones under the considered classes of fakes. |
format | Online Article Text |
id | pubmed-10244288 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Springer International Publishing |
record_format | MEDLINE/PubMed |
spelling | pubmed-102442882023-06-08 Mobile authentication of copy detection patterns Taran, Olga Tutt, Joakim Holotyak, Taras Chaban, Roman Bonev, Slavi Voloshynovskiy, Slava EURASIP J Inf Secur Research In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection applications. However, the security of CDP in terms of their reproducibility by unauthorized parties or clonability remains largely unexplored. In this respect, this paper addresses a problem of anti-counterfeiting of physical objects and aims at investigating the authentication aspects and the resistances to illegal copying of the modern CDP from machine learning perspectives. A special attention is paid to a reliable authentication under the real-life verification conditions when the codes are printed on an industrial printer and enrolled via modern mobile phones under regular light conditions. The theoretical and empirical investigation of authentication aspects of CDP is performed with respect to four types of copy fakes from the point of view of (i) multi-class supervised classification as a baseline approach and (ii) one-class classification as a real-life application case. The obtained results show that the modern machine-learning approaches and the technical capacities of modern mobile phones allow to reliably authenticate CDP on end-user mobile phones under the considered classes of fakes. Springer International Publishing 2023-06-06 2023 /pmc/articles/PMC10244288/ /pubmed/37292064 http://dx.doi.org/10.1186/s13635-023-00140-5 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Research Taran, Olga Tutt, Joakim Holotyak, Taras Chaban, Roman Bonev, Slavi Voloshynovskiy, Slava Mobile authentication of copy detection patterns |
title | Mobile authentication of copy detection patterns |
title_full | Mobile authentication of copy detection patterns |
title_fullStr | Mobile authentication of copy detection patterns |
title_full_unstemmed | Mobile authentication of copy detection patterns |
title_short | Mobile authentication of copy detection patterns |
title_sort | mobile authentication of copy detection patterns |
topic | Research |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10244288/ https://www.ncbi.nlm.nih.gov/pubmed/37292064 http://dx.doi.org/10.1186/s13635-023-00140-5 |
work_keys_str_mv | AT taranolga mobileauthenticationofcopydetectionpatterns AT tuttjoakim mobileauthenticationofcopydetectionpatterns AT holotyaktaras mobileauthenticationofcopydetectionpatterns AT chabanroman mobileauthenticationofcopydetectionpatterns AT bonevslavi mobileauthenticationofcopydetectionpatterns AT voloshynovskiyslava mobileauthenticationofcopydetectionpatterns |