Cargando…

Mobile authentication of copy detection patterns

In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection applications. However, the security of CDP in terms of their reproducibility by unauthoriz...

Descripción completa

Detalles Bibliográficos
Autores principales: Taran, Olga, Tutt, Joakim, Holotyak, Taras, Chaban, Roman, Bonev, Slavi, Voloshynovskiy, Slava
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer International Publishing 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10244288/
https://www.ncbi.nlm.nih.gov/pubmed/37292064
http://dx.doi.org/10.1186/s13635-023-00140-5
_version_ 1785054604907511808
author Taran, Olga
Tutt, Joakim
Holotyak, Taras
Chaban, Roman
Bonev, Slavi
Voloshynovskiy, Slava
author_facet Taran, Olga
Tutt, Joakim
Holotyak, Taras
Chaban, Roman
Bonev, Slavi
Voloshynovskiy, Slava
author_sort Taran, Olga
collection PubMed
description In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection applications. However, the security of CDP in terms of their reproducibility by unauthorized parties or clonability remains largely unexplored. In this respect, this paper addresses a problem of anti-counterfeiting of physical objects and aims at investigating the authentication aspects and the resistances to illegal copying of the modern CDP from machine learning perspectives. A special attention is paid to a reliable authentication under the real-life verification conditions when the codes are printed on an industrial printer and enrolled via modern mobile phones under regular light conditions. The theoretical and empirical investigation of authentication aspects of CDP is performed with respect to four types of copy fakes from the point of view of (i) multi-class supervised classification as a baseline approach and (ii) one-class classification as a real-life application case. The obtained results show that the modern machine-learning approaches and the technical capacities of modern mobile phones allow to reliably authenticate CDP on end-user mobile phones under the considered classes of fakes.
format Online
Article
Text
id pubmed-10244288
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Springer International Publishing
record_format MEDLINE/PubMed
spelling pubmed-102442882023-06-08 Mobile authentication of copy detection patterns Taran, Olga Tutt, Joakim Holotyak, Taras Chaban, Roman Bonev, Slavi Voloshynovskiy, Slava EURASIP J Inf Secur Research In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection applications. However, the security of CDP in terms of their reproducibility by unauthorized parties or clonability remains largely unexplored. In this respect, this paper addresses a problem of anti-counterfeiting of physical objects and aims at investigating the authentication aspects and the resistances to illegal copying of the modern CDP from machine learning perspectives. A special attention is paid to a reliable authentication under the real-life verification conditions when the codes are printed on an industrial printer and enrolled via modern mobile phones under regular light conditions. The theoretical and empirical investigation of authentication aspects of CDP is performed with respect to four types of copy fakes from the point of view of (i) multi-class supervised classification as a baseline approach and (ii) one-class classification as a real-life application case. The obtained results show that the modern machine-learning approaches and the technical capacities of modern mobile phones allow to reliably authenticate CDP on end-user mobile phones under the considered classes of fakes. Springer International Publishing 2023-06-06 2023 /pmc/articles/PMC10244288/ /pubmed/37292064 http://dx.doi.org/10.1186/s13635-023-00140-5 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Research
Taran, Olga
Tutt, Joakim
Holotyak, Taras
Chaban, Roman
Bonev, Slavi
Voloshynovskiy, Slava
Mobile authentication of copy detection patterns
title Mobile authentication of copy detection patterns
title_full Mobile authentication of copy detection patterns
title_fullStr Mobile authentication of copy detection patterns
title_full_unstemmed Mobile authentication of copy detection patterns
title_short Mobile authentication of copy detection patterns
title_sort mobile authentication of copy detection patterns
topic Research
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10244288/
https://www.ncbi.nlm.nih.gov/pubmed/37292064
http://dx.doi.org/10.1186/s13635-023-00140-5
work_keys_str_mv AT taranolga mobileauthenticationofcopydetectionpatterns
AT tuttjoakim mobileauthenticationofcopydetectionpatterns
AT holotyaktaras mobileauthenticationofcopydetectionpatterns
AT chabanroman mobileauthenticationofcopydetectionpatterns
AT bonevslavi mobileauthenticationofcopydetectionpatterns
AT voloshynovskiyslava mobileauthenticationofcopydetectionpatterns