咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >A Copy-Proof Scheme Based on t... 收藏

A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models

基于的一个防拷贝的计划光谱、空间 Barcoding 隧道模型

作     者:Chen, Changsheng Li, Mulin Ferreira, Anselmo Huang, Jiwu Cai, Rizhao 

作者机构:Shenzhen Univ Guangdong Key Lab Intelligent Informat Proc Shenzhen 518060 Peoples R China Shenzhen Univ Shenzhen Key Lab Media Secur Shenzhen 518060 Peoples R China Shenzhen Univ Coll Elect & Informat Engn Natl Engn Lab Big Data Syst Comp Technol Shenzhen 518060 Peoples R China Shenzhen Inst Artificial Intelligence & Robot Soc Shenzhen 518172 Peoples R China Tencent Holdings Ltd Shenzhen 518057 Peoples R China Univ Cagliari Dept Math & Informat I-09100 Cagliari Italy Nanyang Technol Univ Rapid Rich Object Search Lab Singapore 639798 Singapore 

出 版 物:《IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY》 (IEEE信息鉴识与安全汇刊)

年 卷 期:2020年第15卷

页      面:1056-1071页

核心收录:

学科分类:0808[工学-电气工程] 08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:NSFC [61702340, U1636202] Natural Science Foundation of Guangdong Province, China [2017A030310382] Guangdong Province Research and Development Plan in Key Areas [2019B010139003] Science and Technology Innovation Commission of Shenzhen, China [JCYJ20180305124550725, 827/000213] 

主  题:Copy-proof 2D barcode Fourier domain local binary pattern 

摘      要:The traditional two-dimensional (2D) barcode has been employed in anti-counterfeiting systems as a storage media for serial numbers. However, an attack can be initiated by simply copying the 2D barcode and attaching it to a counterfeit product. In this paper, we aim at proposing an authentication scheme with a mobile imaging device for a 2D barcode. This work presents a competitive solution among the 2D barcode authentication schemes that have been verified under mobile imaging conditions. The proposed copy-proof scheme is composed of two sets of features which are extracted by exploiting the characteristics of barcoding channel models. The proposed features identify the intrinsic differences between genuine and counterfeit barcode images in the frequency and spatial domains. An efficient two-stage barcode authentication framework is then proposed by combining the two sets of features in a cascading manner. To evaluate the practicality of the proposed authentication scheme, four databases with different devices (printers, scanners, mobile cameras), barcode sizes, and barcode designs are considered in the experiments. By comparing with the existing texture descriptors and some deep learning-based approaches, it is shown that the proposed scheme has a higher authentication accuracy under various conditions, such as cross-database, cross-size and cross-pattern experiments which study the generalities of a pre-trained model towards challenging conditions commonly found in real-world scenarios. Last but not least, the proposed scheme has been evaluated under some state-of-the-art attack scenarios where the attacker employs several realizations of genuine patterns or the deep learning-based technique to produce a counterfeit copy. The source code and data for producing the results in our experiments are available at https://***/2FOlJH7.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分