A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models

被引:16
作者
Chen, Changsheng [1 ,2 ,3 ,4 ]
Li, Mulin [5 ]
Ferreira, Anselmo [6 ]
Huang, Jiwu [1 ,2 ,3 ,4 ]
Cai, Rizhao [7 ]
机构
[1] Shenzhen Univ, Guangdong Key Lab Intelligent Informat Proc, Shenzhen 518060, Peoples R China
[2] Shenzhen Univ, Shenzhen Key Lab Media Secur, Shenzhen 518060, Peoples R China
[3] Shenzhen Univ, Coll Elect & Informat Engn, Natl Engn Lab Big Data Syst Comp Technol, Shenzhen 518060, Peoples R China
[4] Shenzhen Inst Artificial Intelligence & Robot Soc, Shenzhen 518172, Peoples R China
[5] Tencent Holdings Ltd, Shenzhen 518057, Peoples R China
[6] Univ Cagliari, Dept Math & Informat, I-09100 Cagliari, Italy
[7] Nanyang Technol Univ, Rapid Rich Object Search Lab, Singapore 639798, Singapore
关键词
Copy-proof; 2D barcode; Fourier domain; local binary pattern; TEXTURE CLASSIFICATION; SECURITY; AUTHENTICATION; CODES;
D O I
10.1109/TIFS.2019.2934861
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The traditional two-dimensional (2D) barcode has been employed in anti-counterfeiting systems as a storage media for serial numbers. However, an attack can be initiated by simply copying the 2D barcode and attaching it to a counterfeit product. In this paper, we aim at proposing an authentication scheme with a mobile imaging device for a 2D barcode. This work presents a competitive solution among the 2D barcode authentication schemes that have been verified under mobile imaging conditions. The proposed copy-proof scheme is composed of two sets of features which are extracted by exploiting the characteristics of barcoding channel models. The proposed features identify the intrinsic differences between genuine and counterfeit barcode images in the frequency and spatial domains. An efficient two-stage barcode authentication framework is then proposed by combining the two sets of features in a cascading manner. To evaluate the practicality of the proposed authentication scheme, four databases with different devices (printers, scanners, mobile cameras), barcode sizes, and barcode designs are considered in the experiments. By comparing with the existing texture descriptors and some deep learning-based approaches, it is shown that the proposed scheme has a higher authentication accuracy under various conditions, such as cross-database, cross-size and cross-pattern experiments which study the generalities of a pre-trained model towards challenging conditions commonly found in real-world scenarios. Last but not least, the proposed scheme has been evaluated under some state-of-the-art attack scenarios where the attacker employs several realizations of genuine patterns or the deep learning-based technique to produce a counterfeit copy. The source code and data for producing the results in our experiments are available at https://bit.ly/2FOlJH7.
引用
收藏
页码:1056 / 1071
页数:16
相关论文
共 50 条
  • [1] [Anonymous], 2005, PROC CVPR IEEE
  • [2] [Anonymous], THESIS
  • [3] [Anonymous], 2015, 180042015 ISOIEC
  • [4] [Anonymous], 2017, ARXIV170404861
  • [5] [Anonymous], 2017, 340622017 GBT
  • [6] [Anonymous], 2007, CONS EL 2007 ICCE 20
  • [7] Baras C, 2013, IEEE INT WORKS INFOR, P115, DOI 10.1109/WIFS.2013.6707804
  • [8] Dominant local binary patterns for texture classification: Labelled or unlabelled?
    Bianconi, Francesco
    Gonzalez, Elena
    Fernandez, Antonio
    [J]. PATTERN RECOGNITION LETTERS, 2015, 65 : 8 - 14
  • [9] Security Evaluation of Pattern Classifiers under Attack
    Biggio, Battista
    Fumera, Giorgio
    Roli, Fabio
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (04) : 984 - 996
  • [10] First Steps Toward Camera Model Identification With Convolutional Neural Networks
    Bondi, Luca
    Baroffio, Luca
    Gueera, David
    Bestagini, Paolo
    Delp, Edward J.
    Tubaro, Stefano
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (03) : 259 - 263