Banknote Authentication with Mobile Devices

被引:15
作者
Lohweg, Volker [1 ]
Hoffmann, Jan Leif [1 ]
Doerksen, Helene [1 ]
Hildebrand, Roland [1 ]
Gillich, Eugen [1 ]
Hofmann, Juerg [2 ]
Schaede, Johannes [2 ]
机构
[1] Ostwestfalen Lippe Univ Appl Sci, InIT Inst Ind IT, D-32657 Lemgo, Germany
[2] KBA NotaSys SA, CH-1018 Lausanne, Switzerland
来源
MEDIA WATERMARKING, SECURITY, AND FORENSICS 2013 | 2013年 / 8665卷
关键词
Banknote; Authentication; Mobile Device; smartphone; Wavelet Transform; Classification; Adaptation; Sound-of-Intaglio; FEATURE-EXTRACTION; WAVELET;
D O I
10.1117/12.2001444
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Maintaining confidence in security documents, especially banknotes, is and remains a major concern for the central banks in order to maintain the stability of the economy around the world. In this paper we describe an image processing and pattern recognition approach which is based on the Sound-of-Intaglio principle for the usage in smart devices such as smartphones. Today, in many world regions smartphones are in use. These devices become more and more computing units, equipped with resource-limited, but effective CPUs, cameras with illumination, and flexible operating systems. Hence, it is obvious to apply smartphones for banknote authentication, especially for visually impaired persons. Our approach shows that those devices are capable of processing data under the constraints of image quality and processing power. Strictly a mobile device as such is not an industrial product for harsh environments, but it is possible to use mobile devices for banknote authentication. The concept is based on a new strategy for constructing adaptive Wavelets for the analysis of different print patterns on a banknote. Furthermore, a banknote specific feature vector is generated which describes an authentic banknote effectively under various illumination conditions. A multi-stage Linear-discriminant-analysis classifier generates stable and reliable output.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Quantum secure two party authentication protocol for mobile devices
    Moony, Bshisht
    Barnwal, Amit K.
    Singh, Mrityunjay
    Mishra, Dheerendra
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (05) : 2548 - 2559
  • [32] Quantum secure two party authentication protocol for mobile devices
    Bshisht Moony
    Amit K. Barnwal
    Mrityunjay Singh
    Dheerendra Mishra
    Peer-to-Peer Networking and Applications, 2023, 16 : 2548 - 2559
  • [33] Multi-modal Behavioural Biometric Authentication for Mobile Devices
    Saevanee, Hataichanok
    Clarke, Nathan L.
    Furnell, Steven M.
    INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 465 - 474
  • [34] Continuous Authentication and Identification for Mobile Devices: Combining Security and Forensics
    Mondal, Soumik
    Bours, Patrick
    2015 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2015,
  • [35] Understanding visual lip-based biometric authentication for mobile devices
    Wright, Carrie
    Stewart, Darryl William
    EURASIP JOURNAL ON INFORMATION SECURITY, 2020, 2020 (01)
  • [36] On Authentication in a Connected Vehicle: Secure Integration of Mobile Devices with Vehicular Networks
    Han, Kyusuk
    Potluri, Swapna Divya
    Shin, Kang G.
    2013 ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS), 2013, : 160 - 169
  • [37] ASSESSMENT OF THE VIABILITY OF A BIOMETRIC CHARACTERISTIC IN THE CONTEXT OF BIOMETRIC AUTHENTICATION ON MOBILE DEVICES
    Nawrocki, Piotr
    Kubaty, Wojciech
    COMPUTING AND INFORMATICS, 2021, 40 (01) : 169 - 194
  • [38] Blink to Get In: Biometric Authentication for Mobile Devices using EEG Signals
    Gupta, Ekansh
    Agarwal, Mohit
    Sivakumar, Raghupathy
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [39] Improving authentication of remote card transactions with mobile personal trusted devices
    Bottoni, Andrea
    Dini, Gianluca
    COMPUTER COMMUNICATIONS, 2007, 30 (08) : 1697 - 1712
  • [40] Understanding visual lip-based biometric authentication for mobile devices
    Carrie Wright
    Darryl William Stewart
    EURASIP Journal on Information Security, 2020