An Anti-Counterfeiting Method of High Security and Reliability Based on Unique Internal Fiber Pattern of Paper

被引:0
作者
Chen, Duan [1 ,2 ]
Hu, Qinglei [1 ,2 ]
Zeng, Shaoqun [1 ,2 ]
机构
[1] Huazhong Univ Sci & Technol, Wuhan Natl Lab Optoelect, Britton Chance Ctr Biomed Photon, Wuhan, Peoples R China
[2] Huazhong Univ Sci & Technol, Collaborat Innovat Ctr Biomed Engn, Sch Engn Sci, MOE Key Lab Biomed Photon, Wuhan, Peoples R China
来源
2020 IEEE 14TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID) | 2020年
关键词
anti-counterfeiting technique; microscopic translucent texture; internal fiber pattern;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Anti-counterfeiting technique is a research hotspot in information security domain. Common techniques are usually based on artificial physical cloneable feature which is forgeable. In this paper, we proposed an anti-counterfeit method based on microscopic translucent texture of paper (MTTP). MTTP is image of internal fiber pattern of paper (IFPP) captured by microscope under translucent light source. The IFPP has property of uniqueness and randomness, and the fiber scale of IFPP is at sub-micron or micron level. Then the IFPP is unable to be forged. Furthermore, fiber texture in IFPP is stable under disturbances (including illumination intensity change and surface damage), which guarantees the stability of the MTTP. Experiment results show that the authentication accuracy achieve 100% in our dataset (totally 13,4550 pairs of MTTPs) and the false reject rate achieves the order of magnitude of 10(-136) in ideal condition and 10(-59) even in condition of illumination change or surface damage. Above results indicate that our method has rather high security and reliability.
引用
收藏
页码:174 / 178
页数:5
相关论文
共 15 条
[1]   Fingerprinting' documents and packaging [J].
Buchanan, JDR ;
Cowburn, RP ;
Jausovec, AV ;
Petit, D ;
Seem, P ;
Xiong, G ;
Atkinson, D ;
Fenton, K ;
Allwood, DA ;
Bryan, MT .
NATURE, 2005, 436 (7050) :475-475
[2]   Fingerprinting Blank Paper Using Commodity Scanners [J].
Clarkson, William ;
Weyrich, Tim ;
Finkelstein, Adam ;
Heninger, Nadia ;
Halderman, J. Alex ;
Felten, Edward W. .
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, :301-+
[3]   How iris recognition works [J].
Daugman, J .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2004, 14 (01) :21-30
[4]  
Diephuis M., 2014, P SPIE MED WAT SEC F, P96
[5]  
Diephuis M, 2013, INT SYMP IMAGE SIG, P119
[6]  
Guarnera F, 2019, IEEE IMAGE PROC, P4594, DOI [10.1109/ICIP.2019.8803502, 10.1109/icip.2019.8803502]
[7]   Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions [J].
Maes, Roel ;
Verbauwhede, Ingrid .
TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, :3-37
[8]   Optimization of Iris Codes for Improved Recognition [J].
Mahadeo, Nitin K. ;
Paplinski, Andrew P. ;
Ray, Sid .
2014 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2014, :48-55
[9]  
Sharma A, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P99
[10]  
Smith J, 2002, 3 WORKSH AUT ID