Knowledge (XXG)

Copy detection pattern

Source đź“ť

150: 25: 263:
Digital watermarks may be used as well to differentiate original prints from counterfeits. A digital watermark may also be inserted into a 2D barcode. The fundamental difference between digital watermarks and CDPs is that a digital watermark must be embedded into an existing image while respecting a
259:
are inserted into banknotes to be detected by scanners, photocopiers and image processing software. However the objective of these techniques is not to detect whether a given banknote is a counterfeit, but to deter amateur counterfeiters from reproducing banknotes by blocking the device or software
123:
The detection of counterfeits using a CDP relies on an "information loss principle", which states that every time a digital image is printed or scanned, some information about the original digital image is lost. A CDP is a maximum entropy image that attempts to take advantage of this information
161:
real image size is 4.2mm x 4.2mm. This original CDP was scanned at 2400 ppi with a CanoScan 9000F flatbed scanner. The scan was processed with GIMP for image restoration, then printed on the same Canon C6045 laser printer. The copied CDP real image size is also 4.2mm x 4.2mm. Comparison of the
124:
loss. Since producing a counterfeit CDP requires an additional scanning and printing processes, it will have less information than an original CDP. By measuring the information in the scanned CDP, the detector can determine whether the CDP is an original print or a copy.
146:. While they have been cited as a "powerful tool to detect copies", it is noted however that CDPs "require an extensive knowledge of printing technologies" because the printing process introduces variation that is foundational to copy detection. 192:
In, the impact of multiple printed observations of the same CDP is studied, and it is shown that the noise due to the printing process can be reduced but not completely removed, due to deterministic printing
438: 385:
Tkachenko, Iuliia; Puech, William; Destruel, Christophe; Strauss, Olivier; Gaudin, Jean-Marc; Guichard, Christian (2016-03-01). "Two-Level QR Code for Private Message Sharing and Document Authentication".
429: 539:
Picard, Justin; Vielhauer, Claus; Thorwirth, Niels (2004-06-22). Delp Iii, Edward J; Wong, Ping W (eds.). "Towards fraud-proof ID documents using multiple data hiding technologies and biometrics".
205:
In, different attack methods based on restoration of the scanned CDP are tested. and show that a classifier based on support vector domain description outperforms other classification methods.
1116:
Mahmoud, Khaled W.; Blackledge, Jonathon M.; Datta, Sekharjit; Flint, James A. (2004-06-22). Delp Iii, Edward J.; Wong, Ping W. (eds.). "Print protection using high-frequency fractal noise".
662:. Sundmaeker, Harald., Guillemin, Patrick., Friess, Peter., Woelfflé, Sylvie., European Commission. Directorate-General for the Information Society and Media. Luxembourg: EUR-OP. 2010. 515: 171:
The theoretical and practical assessment of the security level of CDPs, in other words the detector's ability to detect counterfeit attempts, is an ongoing area of research:
131:. They are motivated by the need for security features that can be originated, managed and transferred digitally, and that are machine readable. Contrarily to many traditional 175:
In, practical recommendations on printing stability, taking into account scanning quality of the detector, and managing the security of printing facilities.
831:
Taran, Olga; Bonev, Slavi; Voloshynovskiy, Slava (2019-03-18). "Clonability of anti-counterfeiting printable graphical codes: a machine learning approach".
111:. It is possible to store additional product-specific data into the CDP that will be decoded during the scanning process. A CDP can also be inserted into a 913:
Zhang, Pei; Zhang, Weiming; Yu, Nenghai (April 2019). "Copy Detection Pattern-Based Authentication for Printed Documents with Multi-Dimensional Features".
202:
In, quality control challenges are reviewed, and an inline verification system of secure graphics is proposed for high security printing applications.
199:
In and, deep learning methods are used to recover portions of the digital CDP, and it is shown that these can be used to launch clonability attacks.
1266: 1176: 979: 930: 876: 807: 667: 467: 507: 182:
assumption for the print channel and an attacker who takes optimal decisions, it is shown that the most effective decision function is a
178:
In, a decision theoretic-model is developed to determine optimality properties of CDPs in idealised conditions. Based on an additive
41: 63: 34: 139:, as the algorithm for generating CDPs can be public as long as the key used to generate it or the digital CDP is not revealed. 1326: 229:, in combination with digital watermarks and 2D barcodes. They were used in 2006 to protect identification badges during the 1003: 189:
In, different new CDP detection metrics are proposed and confirmed a significant improvement of copy detection accuracy.
1321: 143: 45: 691: 491: 136: 1027: 786: 1067: 853: 724:
Dirik, A. E.; Haas, B. (2012-11-01). "Copy detection pattern-based document protection for variable media".
1293: 899:
Picard, Justin; Khatri, Nick; 100% Inline Verification of Secure Graphics at High Resolution; 2019-05-15;
157:(100x100 pixel binary image) is printed at 600 pixels per inch (ppi) on a Canon C6045 laser printer. The 1053: 711:
NIP & Digital Fabrication Conference, 2008 International Conference on Digital Printing Technologies
336:"Document authentication using graphical codes: reliable performance analysis and channel optimization" 1298: 1202:"A Watermarking Technique to Secure Printed Matrix Barcode—Application for Anti-Counterfeit Packaging" 1213: 1125: 959: 780:"Physical object authentication: Detection-theoretic comparison of natural and artificial randomness" 548: 297: 252: 183: 954:
Chaves, Leonardo W. F.; Nochta, Zoltán (2010-07-12), "Breakthrough Towards the Internet of Things",
108: 1182: 1141: 985: 936: 882: 832: 813: 685: 564: 411: 313: 256: 219: 510:[Home page of the Italian Patent and Trademark Office -Copy Detection Patterns – CDP]. 460:
Protection against product piracy: A handbook for the mechanical and plant engineering industry
1331: 1272: 1262: 1231: 1172: 975: 926: 872: 803: 779: 741: 673: 663: 629: 473: 463: 403: 367: 226: 132: 128: 1336: 1254: 1221: 1200:
Nguyen, Hoai Phuong; Retraint, Florent; Morain-Nicolier, Frédéric; Delahaies, Angès (2019).
1164: 1133: 967: 918: 864: 795: 733: 621: 556: 395: 357: 347: 305: 196:
In, a theoretical comparison is made between the performance of CDPs and natural randomness.
89: 149: 1159:
Zhou, Jifeng; Pang, Mingyong (September 2010). "Digital watermark for printed materials".
508:"Pagina iniziale dell'Ufficio Italiano Brevetti e Marchi - Copy Detection Patterns – CDP" 431:
Technology and Security: Countering Criminal Infiltrations in the Legitimate Supply Chain
1217: 1129: 963: 552: 301: 230: 179: 100: 40:
It may require cleanup to comply with Knowledge (XXG)'s content policies, particularly
788:
2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
1315: 940: 886: 706: 586: 335: 285: 115: to facilitate smartphone authentication and to connect with traceability data. 104: 92: 1304: 1186: 1161:
2010 2nd IEEE International Conference on Network Infrastructure and Digital Content
1145: 989: 915:
2019 7th International Conference on Information, Communication and Networks (ICICN)
817: 568: 317: 415: 455:
Schutz vor Produktpiraterie : ein Handbuch fĂĽr den Maschinen- und Anlagenbau
1226: 1201: 1168: 1068:"Digital and Analog Technologies for Product Authentication and Tamper Evidence" 971: 799: 240:
to enable consumers to check product authenticity with a smartphone application.
96: 922: 760: 609: 334:
Phan Ho, Anh Thu; Mai Hoang, Bao An; Sawaya, Wadih; Bas, Patrick (2014-06-05).
737: 625: 496:. European Observatory on Infringements of Intellectual Property Rights. 2021. 399: 362: 112: 85: 1276: 1235: 861:
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security
745: 677: 633: 477: 407: 371: 352: 868: 765:
2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO)
852:
Yadav, Rohit; Tkachenko, Iuliia; Trémeau, Alain; Fournel, Thierry (2019).
657: 453: 1249:
Barni, Mauro; Cox, Ingemar; Kalker, Ton; Kim, Hyoung-Joong, eds. (2005).
1092: 214:
CDPs are used for different physical item authentication applications:
237: 1137: 560: 309: 1258: 610:"Copy detection pattern-based document protection for variable media" 127:
CDPs aim to address limitations of optical security features such as
1118:
Security, Steganography, and Watermarking of Multimedia Contents VI
837: 778:
Voloshynovskiy, Slava; Holotyak, Taras; Bas, Patrick (2016-03-01).
541:
Security, Steganography, and Watermarking of Multimedia Contents VI
218:
As a means of providing a product authentication service using the
264:
fidelity constraint, while the CDP does not have such constraint.
148: 439:
United Nations Interregional Crime and Justice Research Institute
162:
original and copied CDP reveals a loss of details in the latter.
591:
Conference on Optical Security and Counterfeit Deterrence 2008
18: 854:"Estimation of Copy-sensitive Codes Using a Neural Approach" 659:
Vision and challenges for realising the Internet of things
284:
Picard, Justin (2004-06-03). Van Renesse, Rudolf L (ed.).
1093:"Software Detection of Currency // Dr Steven J. Murdoch" 290:
Optical Security and Counterfeit Deterrence Techniques V
462:]. Ksuke, Philipp., Lang, Horst. Berlin: Springer. 388:
IEEE Transactions on Information Forensics and Security
863:. New York, New York, USA: ACM Press. pp. 77–82. 761:"2D bar-codes for authentication: A security approach" 95:
which is printed on documents, labels or products for
33:
A major contributor to this article appears to have a
1253:. Lecture Notes in Computer Science. Vol. 3710. 286:"Digital authentication with copy-detection patterns" 142:CDPs have also been described as a type of optical 608:Dirik, Ahmet Emir; Haas, Bertrand (November 2012). 597:: 372–381 – via Reconnaissance International. 1299:Dataset of CDPs from the University of St-Etienne 587:"Copy Detectable Images: From Theory to Practice" 103:is made by scanning the printed CDP using an 1004:"FIFA World Cup Case Study - Code Corporation" 958:, Springer Berlin Heidelberg, pp. 25–38, 8: 956:Unique Radio Innovation for the 21st Century 243:For authenticating pharmaceutical packaging. 759:Baras, Cleo; Cayre, François (2012-08-01). 707:"On the Security of Copy Detectable Images" 1054:"Combatting counterfeiting using QR codes" 493:EUIPO Anti-Counterfeiting Technology Guide 1305:Dataset of CDPs from University of Geneva 1225: 836: 361: 351: 64:Learn how and when to remove this message 534: 532: 340:EURASIP Journal on Information Security 273: 1028:"Pattern makes 2D barcodes copy-proof" 683: 1294:Dataset of CDPs with copies on Kaggle 652: 650: 7: 580: 578: 329: 327: 279: 277: 14: 135:techniques, CDPs do not rely on 44:. Please discuss further on the 23: 518:from the original on 2021-01-29 903:; Reconnaissance International 260:used to make the counterfeit. 1: 794:. IEEE. pp. 2029–2033. 144:physical unclonable function 78:copy detection pattern (CDP) 1227:10.1109/ACCESS.2019.2937465 1169:10.1109/icnidc.2010.5657884 972:10.1007/978-3-642-03462-6_2 800:10.1109/icassp.2016.7472033 1353: 1163:. IEEE. pp. 758–762. 923:10.1109/icicn.2019.8834939 917:. IEEE. pp. 150–157. 901:Digital Document Security 738:10.1049/iet-ipr.2012.0297 626:10.1049/iet-ipr.2012.0297 452:Abele, Eberhard. (2011). 400:10.1109/TIFS.2015.2506546 1032:www.securingindustry.com 353:10.1186/1687-417X-2014-9 253:The EURion constellation 227:identification documents 1301:(for academic use only) 869:10.1145/3335203.3335718 705:Picard, Justin (2008). 585:Picard, Justin (2008). 1327:Authentication methods 690:: CS1 maint: others ( 163: 152: 137:Security by Obscurity 42:neutral point of view 16:Counterfeit detection 1251:Digital Watermarking 726:IET Image Processing 614:IET Image Processing 184:correlation function 1322:Anti-counterfeiting 1218:2019IEEEA...7m1839N 1130:2004SPIE.5306..446M 964:2010urif.book...25C 553:2004SPIE.5306..416P 302:2004SPIE.5310..176P 167:Security assessment 109:mobile phone camera 363:20.500.12210/25915 257:digital watermarks 248:Related techniques 220:Internet of Things 164: 129:security holograms 1268:978-3-540-28768-1 1212:: 131839–131850. 1178:978-1-4244-6851-5 1138:10.1117/12.526677 981:978-3-642-03461-9 932:978-1-7281-0425-6 878:978-1-4503-6821-6 809:978-1-4799-9988-0 669:978-92-79-15088-3 561:10.1117/12.525446 469:978-3-642-19280-7 310:10.1117/12.528055 133:security printing 74: 73: 66: 37:with its subject. 1344: 1281: 1280: 1259:10.1007/11551492 1246: 1240: 1239: 1229: 1197: 1191: 1190: 1156: 1150: 1149: 1113: 1107: 1106: 1104: 1103: 1089: 1083: 1082: 1080: 1079: 1072:Packaging Europe 1064: 1058: 1057: 1049: 1043: 1042: 1040: 1039: 1024: 1018: 1017: 1015: 1014: 999: 993: 992: 951: 945: 944: 910: 904: 897: 891: 890: 858: 849: 843: 842: 840: 828: 822: 821: 793: 784: 775: 769: 768: 756: 750: 749: 732:(8): 1102–1113. 721: 715: 714: 702: 696: 695: 689: 681: 654: 645: 644: 642: 640: 620:(8): 1102–1113. 605: 599: 598: 582: 573: 572: 536: 527: 526: 524: 523: 512:uibm.mise.gov.it 504: 498: 497: 488: 482: 481: 449: 443: 442: 436: 426: 420: 419: 382: 376: 375: 365: 355: 331: 322: 321: 281: 236:Integrated into 69: 62: 58: 55: 49: 35:close connection 27: 26: 19: 1352: 1351: 1347: 1346: 1345: 1343: 1342: 1341: 1312: 1311: 1290: 1285: 1284: 1269: 1248: 1247: 1243: 1199: 1198: 1194: 1179: 1158: 1157: 1153: 1115: 1114: 1110: 1101: 1099: 1091: 1090: 1086: 1077: 1075: 1066: 1065: 1061: 1051: 1050: 1046: 1037: 1035: 1026: 1025: 1021: 1012: 1010: 1001: 1000: 996: 982: 953: 952: 948: 933: 912: 911: 907: 898: 894: 879: 856: 851: 850: 846: 830: 829: 825: 810: 791: 782: 777: 776: 772: 758: 757: 753: 723: 722: 718: 704: 703: 699: 682: 670: 656: 655: 648: 638: 636: 607: 606: 602: 584: 583: 576: 538: 537: 530: 521: 519: 506: 505: 501: 490: 489: 485: 470: 451: 450: 446: 434: 428: 427: 423: 384: 383: 379: 333: 332: 325: 283: 282: 275: 270: 250: 212: 169: 121: 70: 59: 53: 50: 39: 28: 24: 17: 12: 11: 5: 1350: 1348: 1340: 1339: 1334: 1329: 1324: 1314: 1313: 1310: 1309: 1307: 1302: 1296: 1289: 1288:External links 1286: 1283: 1282: 1267: 1241: 1192: 1177: 1151: 1108: 1084: 1059: 1044: 1019: 994: 980: 946: 931: 905: 892: 877: 844: 823: 808: 770: 751: 716: 697: 668: 646: 600: 574: 528: 499: 483: 468: 444: 421: 394:(3): 571–583. 377: 323: 272: 271: 269: 266: 249: 246: 245: 244: 241: 234: 231:FIFA World Cup 223: 211: 208: 207: 206: 203: 200: 197: 194: 190: 187: 180:Gaussian noise 176: 168: 165: 120: 117: 101:Authentication 82:graphical code 72: 71: 31: 29: 22: 15: 13: 10: 9: 6: 4: 3: 2: 1349: 1338: 1335: 1333: 1330: 1328: 1325: 1323: 1320: 1319: 1317: 1308: 1306: 1303: 1300: 1297: 1295: 1292: 1291: 1287: 1278: 1274: 1270: 1264: 1260: 1256: 1252: 1245: 1242: 1237: 1233: 1228: 1223: 1219: 1215: 1211: 1207: 1203: 1196: 1193: 1188: 1184: 1180: 1174: 1170: 1166: 1162: 1155: 1152: 1147: 1143: 1139: 1135: 1131: 1127: 1124:. SPIE: 446. 1123: 1119: 1112: 1109: 1098: 1094: 1088: 1085: 1073: 1069: 1063: 1060: 1055: 1048: 1045: 1033: 1029: 1023: 1020: 1009: 1005: 998: 995: 991: 987: 983: 977: 973: 969: 965: 961: 957: 950: 947: 942: 938: 934: 928: 924: 920: 916: 909: 906: 902: 896: 893: 888: 884: 880: 874: 870: 866: 862: 855: 848: 845: 839: 834: 827: 824: 819: 815: 811: 805: 801: 797: 790: 789: 781: 774: 771: 766: 762: 755: 752: 747: 743: 739: 735: 731: 727: 720: 717: 712: 708: 701: 698: 693: 687: 679: 675: 671: 665: 661: 660: 653: 651: 647: 635: 631: 627: 623: 619: 615: 611: 604: 601: 596: 592: 588: 581: 579: 575: 570: 566: 562: 558: 554: 550: 547:. SPIE: 416. 546: 542: 535: 533: 529: 517: 513: 509: 503: 500: 495: 494: 487: 484: 479: 475: 471: 465: 461: 457: 456: 448: 445: 440: 433: 432: 425: 422: 417: 413: 409: 405: 401: 397: 393: 389: 381: 378: 373: 369: 364: 359: 354: 349: 345: 341: 337: 330: 328: 324: 319: 315: 311: 307: 303: 299: 296:. SPIE: 176. 295: 291: 287: 280: 278: 274: 267: 265: 261: 258: 254: 247: 242: 239: 235: 232: 228: 225:For securing 224: 221: 217: 216: 215: 209: 204: 201: 198: 195: 191: 188: 185: 181: 177: 174: 173: 172: 166: 160: 156: 151: 147: 145: 140: 138: 134: 130: 125: 118: 116: 114: 110: 106: 105:image scanner 102: 98: 94: 93:digital image 91: 90:pseudo-random 87: 83: 79: 68: 65: 57: 47: 43: 38: 36: 30: 21: 20: 1250: 1244: 1209: 1205: 1195: 1160: 1154: 1121: 1117: 1111: 1100:. Retrieved 1096: 1087: 1076:. Retrieved 1074:. 2019-03-28 1071: 1062: 1047: 1036:. Retrieved 1034:. 2009-07-15 1031: 1022: 1011:. Retrieved 1007: 997: 955: 949: 914: 908: 900: 895: 860: 847: 826: 787: 773: 767:: 1760–1766. 764: 754: 729: 725: 719: 710: 700: 658: 637:. Retrieved 617: 613: 603: 594: 590: 544: 540: 520:. Retrieved 511: 502: 492: 486: 459: 454: 447: 430: 424: 391: 387: 380: 343: 339: 293: 289: 262: 251: 213: 210:Applications 170: 159:original CDP 158: 154: 141: 126: 122: 84:is a small 81: 77: 75: 60: 51: 32: 1206:IEEE Access 1002:Yumpu.com. 155:digital CDP 99:detection. 97:counterfeit 1316:Categories 1102:2020-04-23 1097:murdoch.is 1078:2020-04-23 1038:2020-04-19 1013:2020-04-19 838:1903.07359 522:2021-01-22 268:References 193:artefacts. 113:2D barcode 1277:0302-9743 1236:2169-3536 1008:yumpu.com 941:202561547 887:195848782 746:1751-9667 686:cite book 678:847355368 639:12 August 634:1751-9667 478:726826809 408:1556-6021 372:1687-417X 119:Principle 54:June 2020 46:talk page 1332:Security 1187:16587568 1146:46155853 1052:Carron. 990:58916135 818:10331654 569:15931951 516:Archived 346:(1): 9. 318:58492104 238:QR Codes 1337:Forgery 1214:Bibcode 1126:Bibcode 960:Bibcode 549:Bibcode 441:. 2021. 416:9465424 298:Bibcode 1275:  1265:  1234:  1185:  1175:  1144:  988:  978:  939:  929:  885:  875:  816:  806:  744:  676:  666:  632:  567:  476:  466:  414:  406:  370:  316:  86:random 1183:S2CID 1142:S2CID 986:S2CID 937:S2CID 883:S2CID 857:(PDF) 833:arXiv 814:S2CID 792:(PDF) 783:(PDF) 565:S2CID 458:[ 435:(PDF) 412:S2CID 314:S2CID 1273:ISSN 1263:ISBN 1232:ISSN 1173:ISBN 1122:5306 976:ISBN 927:ISBN 873:ISBN 804:ISBN 742:ISSN 692:link 674:OCLC 664:ISBN 641:2020 630:ISSN 545:5306 474:OCLC 464:ISBN 404:ISSN 368:ISSN 344:2014 294:5310 255:and 1255:doi 1222:doi 1165:doi 1134:doi 968:doi 919:doi 865:doi 796:doi 734:doi 622:doi 557:doi 396:doi 358:hdl 348:doi 306:doi 107:or 88:or 80:or 1318:: 1271:. 1261:. 1230:. 1220:. 1208:. 1204:. 1181:. 1171:. 1140:. 1132:. 1120:. 1095:. 1070:. 1030:. 1006:. 984:, 974:, 966:, 935:. 925:. 881:. 871:. 859:. 812:. 802:. 785:. 763:. 740:. 728:. 709:. 688:}} 684:{{ 672:. 649:^ 628:. 616:. 612:. 593:. 589:. 577:^ 563:. 555:. 543:. 531:^ 514:. 472:. 437:. 410:. 402:. 392:11 390:. 366:. 356:. 342:. 338:. 326:^ 312:. 304:. 292:. 288:. 276:^ 153:A 76:A 1279:. 1257:: 1238:. 1224:: 1216:: 1210:7 1189:. 1167:: 1148:. 1136:: 1128:: 1105:. 1081:. 1056:. 1041:. 1016:. 970:: 962:: 943:. 921:: 889:. 867:: 841:. 835:: 820:. 798:: 748:. 736:: 730:6 713:. 694:) 680:. 643:. 624:: 618:6 595:1 571:. 559:: 551:: 525:. 480:. 418:. 398:: 374:. 360:: 350:: 320:. 308:: 300:: 233:. 222:. 186:. 67:) 61:( 56:) 52:( 48:.

Index

close connection
neutral point of view
talk page
Learn how and when to remove this message
random
pseudo-random
digital image
counterfeit
Authentication
image scanner
mobile phone camera
2D barcode
security holograms
security printing
Security by Obscurity
physical unclonable function

Gaussian noise
correlation function
Internet of Things
identification documents
FIFA World Cup
QR Codes
The EURion constellation
digital watermarks


"Digital authentication with copy-detection patterns"
Bibcode
2004SPIE.5310..176P

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑