Banknote Authentication with Mobile Devices

被引:15
作者
Lohweg, Volker [1 ]
Hoffmann, Jan Leif [1 ]
Doerksen, Helene [1 ]
Hildebrand, Roland [1 ]
Gillich, Eugen [1 ]
Hofmann, Juerg [2 ]
Schaede, Johannes [2 ]
机构
[1] Ostwestfalen Lippe Univ Appl Sci, InIT Inst Ind IT, D-32657 Lemgo, Germany
[2] KBA NotaSys SA, CH-1018 Lausanne, Switzerland
来源
MEDIA WATERMARKING, SECURITY, AND FORENSICS 2013 | 2013年 / 8665卷
关键词
Banknote; Authentication; Mobile Device; smartphone; Wavelet Transform; Classification; Adaptation; Sound-of-Intaglio; FEATURE-EXTRACTION; WAVELET;
D O I
10.1117/12.2001444
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Maintaining confidence in security documents, especially banknotes, is and remains a major concern for the central banks in order to maintain the stability of the economy around the world. In this paper we describe an image processing and pattern recognition approach which is based on the Sound-of-Intaglio principle for the usage in smart devices such as smartphones. Today, in many world regions smartphones are in use. These devices become more and more computing units, equipped with resource-limited, but effective CPUs, cameras with illumination, and flexible operating systems. Hence, it is obvious to apply smartphones for banknote authentication, especially for visually impaired persons. Our approach shows that those devices are capable of processing data under the constraints of image quality and processing power. Strictly a mobile device as such is not an industrial product for harsh environments, but it is possible to use mobile devices for banknote authentication. The concept is based on a new strategy for constructing adaptive Wavelets for the analysis of different print patterns on a banknote. Furthermore, a banknote specific feature vector is generated which describes an authentic banknote effectively under various illumination conditions. A multi-stage Linear-discriminant-analysis classifier generates stable and reliable output.
引用
收藏
页数:14
相关论文
共 50 条
  • [11] A survey on touch dynamics authentication in mobile devices
    Teh, Pin Shen
    Zhang, Ning
    Teoh, Andrew Beng Jin
    Chen, Ke
    COMPUTERS & SECURITY, 2016, 59 : 210 - 235
  • [12] Authentication of users of mobile devices by their motor reactions
    Nechiporenko A.S.
    Gubarenko E.V.
    Gubarenko M.S.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2019, 78 (12): : 987 - 1003
  • [13] Proximity-based authentication for mobile devices
    Jansen, W
    Gavrila, S
    Korolev, V
    SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 398 - 404
  • [14] Efficiency of Paid Authentication Methods for Mobile Devices
    Jeong Yeon Kim
    Wireless Personal Communications, 2017, 93 : 543 - 551
  • [15] Behaviour Profiling for Transparent Authentication for Mobile Devices
    Li, Fudong
    Clarke, Nathan
    Papadaki, Maria
    Dowland, Paul
    PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 307 - 314
  • [16] Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices
    Feng, Qi
    He, Debiao
    Zeadally, Sherali
    Kumar, Neeraj
    Liang, Kaitai
    IEEE SYSTEMS JOURNAL, 2019, 13 (03): : 2775 - 2785
  • [17] Continuous authentication on mobile devices using behavioral biometrics
    Dybczak, Jakub
    Nawrocki, Piotr
    2022 22ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2022), 2022, : 1028 - 1035
  • [18] Spin-lock Gesture Authentication for Mobile Devices
    Aly, Yomna
    Munteanu, Cosmin
    Raimondo, Stefania
    Wu, Alan Yusheng
    Wei, Molly
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON HUMAN-COMPUTER INTERACTION WITH MOBILE DEVICES AND SERVICES (MOBILEHCI 2016), 2016, : 775 - 782
  • [19] Towards authentication using mobile devices An investigation of the prerequisites
    Weippl, E
    Essmayr, W
    Gruber, F
    Stockner, W
    Trenker, T
    ADVANCED COMMUNICATIONS AND MULTIMEDIA SECURITY, 2002, 100 : 91 - 105
  • [20] A Remote User Authentication Scheme with Anonymity for Mobile Devices
    Shin, Soobok
    Kim, Kangseok
    Kim, Ki-Hyung
    Yeh, Hongjin
    INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2012, 9