150:
25:
263:
Digital watermarks may be used as well to differentiate original prints from counterfeits. A digital watermark may also be inserted into a 2D barcode. The fundamental difference between digital watermarks and CDPs is that a digital watermark must be embedded into an existing image while respecting a
259:
are inserted into banknotes to be detected by scanners, photocopiers and image processing software. However the objective of these techniques is not to detect whether a given banknote is a counterfeit, but to deter amateur counterfeiters from reproducing banknotes by blocking the device or software
123:
The detection of counterfeits using a CDP relies on an "information loss principle", which states that every time a digital image is printed or scanned, some information about the original digital image is lost. A CDP is a maximum entropy image that attempts to take advantage of this information
161:
real image size is 4.2mm x 4.2mm. This original CDP was scanned at 2400 ppi with a CanoScan 9000F flatbed scanner. The scan was processed with GIMP for image restoration, then printed on the same Canon C6045 laser printer. The copied CDP real image size is also 4.2mm x 4.2mm. Comparison of the
124:
loss. Since producing a counterfeit CDP requires an additional scanning and printing processes, it will have less information than an original CDP. By measuring the information in the scanned CDP, the detector can determine whether the CDP is an original print or a copy.
146:. While they have been cited as a "powerful tool to detect copies", it is noted however that CDPs "require an extensive knowledge of printing technologies" because the printing process introduces variation that is foundational to copy detection.
192:
In, the impact of multiple printed observations of the same CDP is studied, and it is shown that the noise due to the printing process can be reduced but not completely removed, due to deterministic printing
438:
385:
Tkachenko, Iuliia; Puech, William; Destruel, Christophe; Strauss, Olivier; Gaudin, Jean-Marc; Guichard, Christian (2016-03-01). "Two-Level QR Code for
Private Message Sharing and Document Authentication".
429:
539:
Picard, Justin; Vielhauer, Claus; Thorwirth, Niels (2004-06-22). Delp Iii, Edward J; Wong, Ping W (eds.). "Towards fraud-proof ID documents using multiple data hiding technologies and biometrics".
205:
In, different attack methods based on restoration of the scanned CDP are tested. and show that a classifier based on support vector domain description outperforms other classification methods.
1116:
Mahmoud, Khaled W.; Blackledge, Jonathon M.; Datta, Sekharjit; Flint, James A. (2004-06-22). Delp Iii, Edward J.; Wong, Ping W. (eds.). "Print protection using high-frequency fractal noise".
662:. Sundmaeker, Harald., Guillemin, Patrick., Friess, Peter., Woelfflé, Sylvie., European Commission. Directorate-General for the Information Society and Media. Luxembourg: EUR-OP. 2010.
515:
171:
The theoretical and practical assessment of the security level of CDPs, in other words the detector's ability to detect counterfeit attempts, is an ongoing area of research:
131:. They are motivated by the need for security features that can be originated, managed and transferred digitally, and that are machine readable. Contrarily to many traditional
175:
In, practical recommendations on printing stability, taking into account scanning quality of the detector, and managing the security of printing facilities.
831:
Taran, Olga; Bonev, Slavi; Voloshynovskiy, Slava (2019-03-18). "Clonability of anti-counterfeiting printable graphical codes: a machine learning approach".
111:. It is possible to store additional product-specific data into the CDP that will be decoded during the scanning process. A CDP can also be inserted into a
913:
Zhang, Pei; Zhang, Weiming; Yu, Nenghai (April 2019). "Copy
Detection Pattern-Based Authentication for Printed Documents with Multi-Dimensional Features".
202:
In, quality control challenges are reviewed, and an inline verification system of secure graphics is proposed for high security printing applications.
199:
In and, deep learning methods are used to recover portions of the digital CDP, and it is shown that these can be used to launch clonability attacks.
1266:
1176:
979:
930:
876:
807:
667:
467:
507:
182:
assumption for the print channel and an attacker who takes optimal decisions, it is shown that the most effective decision function is a
178:
In, a decision theoretic-model is developed to determine optimality properties of CDPs in idealised conditions. Based on an additive
41:
63:
34:
139:, as the algorithm for generating CDPs can be public as long as the key used to generate it or the digital CDP is not revealed.
1326:
229:, in combination with digital watermarks and 2D barcodes. They were used in 2006 to protect identification badges during the
1003:
189:
In, different new CDP detection metrics are proposed and confirmed a significant improvement of copy detection accuracy.
1321:
143:
45:
691:
491:
136:
1027:
786:
1067:
853:
724:
Dirik, A. E.; Haas, B. (2012-11-01). "Copy detection pattern-based document protection for variable media".
1293:
899:
Picard, Justin; Khatri, Nick; 100% Inline
Verification of Secure Graphics at High Resolution; 2019-05-15;
157:(100x100 pixel binary image) is printed at 600 pixels per inch (ppi) on a Canon C6045 laser printer. The
1053:
711:
NIP & Digital
Fabrication Conference, 2008 International Conference on Digital Printing Technologies
336:"Document authentication using graphical codes: reliable performance analysis and channel optimization"
1298:
1202:"A Watermarking Technique to Secure Printed Matrix Barcode—Application for Anti-Counterfeit Packaging"
1213:
1125:
959:
780:"Physical object authentication: Detection-theoretic comparison of natural and artificial randomness"
548:
297:
252:
183:
954:
Chaves, Leonardo W. F.; Nochta, Zoltán (2010-07-12), "Breakthrough
Towards the Internet of Things",
108:
1182:
1141:
985:
936:
882:
832:
813:
685:
564:
411:
313:
256:
219:
510:[Home page of the Italian Patent and Trademark Office -Copy Detection Patterns – CDP].
460:
Protection against product piracy: A handbook for the mechanical and plant engineering industry
1331:
1272:
1262:
1231:
1172:
975:
926:
872:
803:
779:
741:
673:
663:
629:
473:
463:
403:
367:
226:
132:
128:
1336:
1254:
1221:
1200:
Nguyen, Hoai Phuong; Retraint, Florent; Morain-Nicolier, Frédéric; Delahaies, Angès (2019).
1164:
1133:
967:
918:
864:
795:
733:
621:
556:
395:
357:
347:
305:
196:
In, a theoretical comparison is made between the performance of CDPs and natural randomness.
89:
149:
1159:
Zhou, Jifeng; Pang, Mingyong (September 2010). "Digital watermark for printed materials".
508:"Pagina iniziale dell'Ufficio Italiano Brevetti e Marchi - Copy Detection Patterns – CDP"
431:
Technology and
Security: Countering Criminal Infiltrations in the Legitimate Supply Chain
1217:
1129:
963:
552:
301:
230:
179:
100:
40:
It may require cleanup to comply with
Knowledge (XXG)'s content policies, particularly
788:
2016 IEEE International
Conference on Acoustics, Speech and Signal Processing (ICASSP)
1315:
940:
886:
706:
586:
335:
285:
115: to facilitate smartphone authentication and to connect with traceability data.
104:
92:
1304:
1186:
1161:
2010 2nd IEEE International
Conference on Network Infrastructure and Digital Content
1145:
989:
915:
2019 7th
International Conference on Information, Communication and Networks (ICICN)
817:
568:
317:
415:
455:
Schutz vor Produktpiraterie : ein Handbuch fĂĽr den Maschinen- und Anlagenbau
1226:
1201:
1168:
1068:"Digital and Analog Technologies for Product Authentication and Tamper Evidence"
971:
799:
240:
to enable consumers to check product authenticity with a smartphone application.
96:
922:
760:
609:
334:
Phan Ho, Anh Thu; Mai Hoang, Bao An; Sawaya, Wadih; Bas, Patrick (2014-06-05).
737:
625:
496:. European Observatory on Infringements of Intellectual Property Rights. 2021.
399:
362:
112:
85:
1276:
1235:
861:
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security
745:
677:
633:
477:
407:
371:
352:
868:
765:
2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO)
852:
Yadav, Rohit; Tkachenko, Iuliia; Trémeau, Alain; Fournel, Thierry (2019).
657:
453:
1249:
Barni, Mauro; Cox, Ingemar; Kalker, Ton; Kim, Hyoung-Joong, eds. (2005).
1092:
214:
CDPs are used for different physical item authentication applications:
237:
1137:
560:
309:
1258:
610:"Copy detection pattern-based document protection for variable media"
127:
CDPs aim to address limitations of optical security features such as
1118:
Security, Steganography, and Watermarking of Multimedia Contents VI
837:
778:
Voloshynovskiy, Slava; Holotyak, Taras; Bas, Patrick (2016-03-01).
541:
Security, Steganography, and Watermarking of Multimedia Contents VI
218:
As a means of providing a product authentication service using the
264:
fidelity constraint, while the CDP does not have such constraint.
148:
439:
United Nations Interregional Crime and Justice Research Institute
162:
original and copied CDP reveals a loss of details in the latter.
591:
Conference on Optical Security and Counterfeit Deterrence 2008
18:
854:"Estimation of Copy-sensitive Codes Using a Neural Approach"
659:
Vision and challenges for realising the Internet of things
284:
Picard, Justin (2004-06-03). Van Renesse, Rudolf L (ed.).
1093:"Software Detection of Currency // Dr Steven J. Murdoch"
290:
Optical Security and Counterfeit Deterrence Techniques V
462:]. Ksuke, Philipp., Lang, Horst. Berlin: Springer.
388:
IEEE Transactions on Information Forensics and Security
863:. New York, New York, USA: ACM Press. pp. 77–82.
761:"2D bar-codes for authentication: A security approach"
95:
which is printed on documents, labels or products for
33:
A major contributor to this article appears to have a
1253:. Lecture Notes in Computer Science. Vol. 3710.
286:"Digital authentication with copy-detection patterns"
142:CDPs have also been described as a type of optical
608:Dirik, Ahmet Emir; Haas, Bertrand (November 2012).
597:: 372–381 – via Reconnaissance International.
1299:Dataset of CDPs from the University of St-Etienne
587:"Copy Detectable Images: From Theory to Practice"
103:is made by scanning the printed CDP using an
1004:"FIFA World Cup Case Study - Code Corporation"
958:, Springer Berlin Heidelberg, pp. 25–38,
8:
956:Unique Radio Innovation for the 21st Century
243:For authenticating pharmaceutical packaging.
759:Baras, Cleo; Cayre, François (2012-08-01).
707:"On the Security of Copy Detectable Images"
1054:"Combatting counterfeiting using QR codes"
493:EUIPO Anti-Counterfeiting Technology Guide
1305:Dataset of CDPs from University of Geneva
1225:
836:
361:
351:
64:Learn how and when to remove this message
534:
532:
340:EURASIP Journal on Information Security
273:
1028:"Pattern makes 2D barcodes copy-proof"
683:
1294:Dataset of CDPs with copies on Kaggle
652:
650:
7:
580:
578:
329:
327:
279:
277:
14:
135:techniques, CDPs do not rely on
44:. Please discuss further on the
23:
518:from the original on 2021-01-29
903:; Reconnaissance International
260:used to make the counterfeit.
1:
794:. IEEE. pp. 2029–2033.
144:physical unclonable function
78:copy detection pattern (CDP)
1227:10.1109/ACCESS.2019.2937465
1169:10.1109/icnidc.2010.5657884
972:10.1007/978-3-642-03462-6_2
800:10.1109/icassp.2016.7472033
1353:
1163:. IEEE. pp. 758–762.
923:10.1109/icicn.2019.8834939
917:. IEEE. pp. 150–157.
901:Digital Document Security
738:10.1049/iet-ipr.2012.0297
626:10.1049/iet-ipr.2012.0297
452:Abele, Eberhard. (2011).
400:10.1109/TIFS.2015.2506546
1032:www.securingindustry.com
353:10.1186/1687-417X-2014-9
253:The EURion constellation
227:identification documents
1301:(for academic use only)
869:10.1145/3335203.3335718
705:Picard, Justin (2008).
585:Picard, Justin (2008).
1327:Authentication methods
690:: CS1 maint: others (
163:
152:
137:Security by Obscurity
42:neutral point of view
16:Counterfeit detection
1251:Digital Watermarking
726:IET Image Processing
614:IET Image Processing
184:correlation function
1322:Anti-counterfeiting
1218:2019IEEEA...7m1839N
1130:2004SPIE.5306..446M
964:2010urif.book...25C
553:2004SPIE.5306..416P
302:2004SPIE.5310..176P
167:Security assessment
109:mobile phone camera
363:20.500.12210/25915
257:digital watermarks
248:Related techniques
220:Internet of Things
164:
129:security holograms
1268:978-3-540-28768-1
1212:: 131839–131850.
1178:978-1-4244-6851-5
1138:10.1117/12.526677
981:978-3-642-03461-9
932:978-1-7281-0425-6
878:978-1-4503-6821-6
809:978-1-4799-9988-0
669:978-92-79-15088-3
561:10.1117/12.525446
469:978-3-642-19280-7
310:10.1117/12.528055
133:security printing
74:
73:
66:
37:with its subject.
1344:
1281:
1280:
1259:10.1007/11551492
1246:
1240:
1239:
1229:
1197:
1191:
1190:
1156:
1150:
1149:
1113:
1107:
1106:
1104:
1103:
1089:
1083:
1082:
1080:
1079:
1072:Packaging Europe
1064:
1058:
1057:
1049:
1043:
1042:
1040:
1039:
1024:
1018:
1017:
1015:
1014:
999:
993:
992:
951:
945:
944:
910:
904:
897:
891:
890:
858:
849:
843:
842:
840:
828:
822:
821:
793:
784:
775:
769:
768:
756:
750:
749:
732:(8): 1102–1113.
721:
715:
714:
702:
696:
695:
689:
681:
654:
645:
644:
642:
640:
620:(8): 1102–1113.
605:
599:
598:
582:
573:
572:
536:
527:
526:
524:
523:
512:uibm.mise.gov.it
504:
498:
497:
488:
482:
481:
449:
443:
442:
436:
426:
420:
419:
382:
376:
375:
365:
355:
331:
322:
321:
281:
236:Integrated into
69:
62:
58:
55:
49:
35:close connection
27:
26:
19:
1352:
1351:
1347:
1346:
1345:
1343:
1342:
1341:
1312:
1311:
1290:
1285:
1284:
1269:
1248:
1247:
1243:
1199:
1198:
1194:
1179:
1158:
1157:
1153:
1115:
1114:
1110:
1101:
1099:
1091:
1090:
1086:
1077:
1075:
1066:
1065:
1061:
1051:
1050:
1046:
1037:
1035:
1026:
1025:
1021:
1012:
1010:
1001:
1000:
996:
982:
953:
952:
948:
933:
912:
911:
907:
898:
894:
879:
856:
851:
850:
846:
830:
829:
825:
810:
791:
782:
777:
776:
772:
758:
757:
753:
723:
722:
718:
704:
703:
699:
682:
670:
656:
655:
648:
638:
636:
607:
606:
602:
584:
583:
576:
538:
537:
530:
521:
519:
506:
505:
501:
490:
489:
485:
470:
451:
450:
446:
434:
428:
427:
423:
384:
383:
379:
333:
332:
325:
283:
282:
275:
270:
250:
212:
169:
121:
70:
59:
53:
50:
39:
28:
24:
17:
12:
11:
5:
1350:
1348:
1340:
1339:
1334:
1329:
1324:
1314:
1313:
1310:
1309:
1307:
1302:
1296:
1289:
1288:External links
1286:
1283:
1282:
1267:
1241:
1192:
1177:
1151:
1108:
1084:
1059:
1044:
1019:
994:
980:
946:
931:
905:
892:
877:
844:
823:
808:
770:
751:
716:
697:
668:
646:
600:
574:
528:
499:
483:
468:
444:
421:
394:(3): 571–583.
377:
323:
272:
271:
269:
266:
249:
246:
245:
244:
241:
234:
231:FIFA World Cup
223:
211:
208:
207:
206:
203:
200:
197:
194:
190:
187:
180:Gaussian noise
176:
168:
165:
120:
117:
101:Authentication
82:graphical code
72:
71:
31:
29:
22:
15:
13:
10:
9:
6:
4:
3:
2:
1349:
1338:
1335:
1333:
1330:
1328:
1325:
1323:
1320:
1319:
1317:
1308:
1306:
1303:
1300:
1297:
1295:
1292:
1291:
1287:
1278:
1274:
1270:
1264:
1260:
1256:
1252:
1245:
1242:
1237:
1233:
1228:
1223:
1219:
1215:
1211:
1207:
1203:
1196:
1193:
1188:
1184:
1180:
1174:
1170:
1166:
1162:
1155:
1152:
1147:
1143:
1139:
1135:
1131:
1127:
1124:. SPIE: 446.
1123:
1119:
1112:
1109:
1098:
1094:
1088:
1085:
1073:
1069:
1063:
1060:
1055:
1048:
1045:
1033:
1029:
1023:
1020:
1009:
1005:
998:
995:
991:
987:
983:
977:
973:
969:
965:
961:
957:
950:
947:
942:
938:
934:
928:
924:
920:
916:
909:
906:
902:
896:
893:
888:
884:
880:
874:
870:
866:
862:
855:
848:
845:
839:
834:
827:
824:
819:
815:
811:
805:
801:
797:
790:
789:
781:
774:
771:
766:
762:
755:
752:
747:
743:
739:
735:
731:
727:
720:
717:
712:
708:
701:
698:
693:
687:
679:
675:
671:
665:
661:
660:
653:
651:
647:
635:
631:
627:
623:
619:
615:
611:
604:
601:
596:
592:
588:
581:
579:
575:
570:
566:
562:
558:
554:
550:
547:. SPIE: 416.
546:
542:
535:
533:
529:
517:
513:
509:
503:
500:
495:
494:
487:
484:
479:
475:
471:
465:
461:
457:
456:
448:
445:
440:
433:
432:
425:
422:
417:
413:
409:
405:
401:
397:
393:
389:
381:
378:
373:
369:
364:
359:
354:
349:
345:
341:
337:
330:
328:
324:
319:
315:
311:
307:
303:
299:
296:. SPIE: 176.
295:
291:
287:
280:
278:
274:
267:
265:
261:
258:
254:
247:
242:
239:
235:
232:
228:
225:For securing
224:
221:
217:
216:
215:
209:
204:
201:
198:
195:
191:
188:
185:
181:
177:
174:
173:
172:
166:
160:
156:
151:
147:
145:
140:
138:
134:
130:
125:
118:
116:
114:
110:
106:
105:image scanner
102:
98:
94:
93:digital image
91:
90:pseudo-random
87:
83:
79:
68:
65:
57:
47:
43:
38:
36:
30:
21:
20:
1250:
1244:
1209:
1205:
1195:
1160:
1154:
1121:
1117:
1111:
1100:. Retrieved
1096:
1087:
1076:. Retrieved
1074:. 2019-03-28
1071:
1062:
1047:
1036:. Retrieved
1034:. 2009-07-15
1031:
1022:
1011:. Retrieved
1007:
997:
955:
949:
914:
908:
900:
895:
860:
847:
826:
787:
773:
767:: 1760–1766.
764:
754:
729:
725:
719:
710:
700:
658:
637:. Retrieved
617:
613:
603:
594:
590:
544:
540:
520:. Retrieved
511:
502:
492:
486:
459:
454:
447:
430:
424:
391:
387:
380:
343:
339:
293:
289:
262:
251:
213:
210:Applications
170:
159:original CDP
158:
154:
141:
126:
122:
84:is a small
81:
77:
75:
60:
51:
32:
1206:IEEE Access
1002:Yumpu.com.
155:digital CDP
99:detection.
97:counterfeit
1316:Categories
1102:2020-04-23
1097:murdoch.is
1078:2020-04-23
1038:2020-04-19
1013:2020-04-19
838:1903.07359
522:2021-01-22
268:References
193:artefacts.
113:2D barcode
1277:0302-9743
1236:2169-3536
1008:yumpu.com
941:202561547
887:195848782
746:1751-9667
686:cite book
678:847355368
639:12 August
634:1751-9667
478:726826809
408:1556-6021
372:1687-417X
119:Principle
54:June 2020
46:talk page
1332:Security
1187:16587568
1146:46155853
1052:Carron.
990:58916135
818:10331654
569:15931951
516:Archived
346:(1): 9.
318:58492104
238:QR Codes
1337:Forgery
1214:Bibcode
1126:Bibcode
960:Bibcode
549:Bibcode
441:. 2021.
416:9465424
298:Bibcode
1275:
1265:
1234:
1185:
1175:
1144:
988:
978:
939:
929:
885:
875:
816:
806:
744:
676:
666:
632:
567:
476:
466:
414:
406:
370:
316:
86:random
1183:S2CID
1142:S2CID
986:S2CID
937:S2CID
883:S2CID
857:(PDF)
833:arXiv
814:S2CID
792:(PDF)
783:(PDF)
565:S2CID
458:[
435:(PDF)
412:S2CID
314:S2CID
1273:ISSN
1263:ISBN
1232:ISSN
1173:ISBN
1122:5306
976:ISBN
927:ISBN
873:ISBN
804:ISBN
742:ISSN
692:link
674:OCLC
664:ISBN
641:2020
630:ISSN
545:5306
474:OCLC
464:ISBN
404:ISSN
368:ISSN
344:2014
294:5310
255:and
1255:doi
1222:doi
1165:doi
1134:doi
968:doi
919:doi
865:doi
796:doi
734:doi
622:doi
557:doi
396:doi
358:hdl
348:doi
306:doi
107:or
88:or
80:or
1318::
1271:.
1261:.
1230:.
1220:.
1208:.
1204:.
1181:.
1171:.
1140:.
1132:.
1120:.
1095:.
1070:.
1030:.
1006:.
984:,
974:,
966:,
935:.
925:.
881:.
871:.
859:.
812:.
802:.
785:.
763:.
740:.
728:.
709:.
688:}}
684:{{
672:.
649:^
628:.
616:.
612:.
593:.
589:.
577:^
563:.
555:.
543:.
531:^
514:.
472:.
437:.
410:.
402:.
392:11
390:.
366:.
356:.
342:.
338:.
326:^
312:.
304:.
292:.
288:.
276:^
153:A
76:A
1279:.
1257::
1238:.
1224::
1216::
1210:7
1189:.
1167::
1148:.
1136::
1128::
1105:.
1081:.
1056:.
1041:.
1016:.
970::
962::
943:.
921::
889:.
867::
841:.
835::
820:.
798::
748:.
736::
730:6
713:.
694:)
680:.
643:.
624::
618:6
595:1
571:.
559::
551::
525:.
480:.
418:.
398::
374:.
360::
350::
320:.
308::
300::
233:.
222:.
186:.
67:)
61:(
56:)
52:(
48:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.