Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach

06/23/2022
by   Brian Pulfer, et al.
1

Copy detection patterns (CDP) are an attractive technology that allows manufacturers to defend their products against counterfeiting. The main assumption behind the protection mechanism of CDP is that these codes printed with the smallest symbol size (1x1) on an industrial printer cannot be copied or cloned with sufficient accuracy due to data processing inequality. However, previous works have shown that Machine Learning (ML) based attacks can produce high-quality fakes, resulting in decreased accuracy of authentication based on traditional feature-based authentication systems. While Deep Learning (DL) can be used as a part of the authentication system, to the best of our knowledge, none of the previous works has studied the performance of a DL-based authentication system against ML-based attacks on CDP with 1x1 symbol size. In this work, we study such a performance assuming a supervised learning (SL) setting.

READ FULL TEXT
research
10/05/2021

Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?

Nowadays, the modern economy critically requires reliable yet cheap prot...
research
09/29/2022

Anomaly localization for copy detection patterns through print estimations

Copy detection patterns (CDP) are recent technologies for protecting pro...
research
12/14/2022

Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns

Nowadays, copy detection patterns (CDP) appear as a very promising anti-...
research
10/05/2021

Mobile authentication of copy detection patterns: how critical is to know fakes?

Protection of physical objects against counterfeiting is an important ta...
research
03/04/2022

Mobile authentication of copy detection patterns

In the recent years, the copy detection patterns (CDP) attracted a lot o...
research
09/13/2019

Supervised Learning for Physical Layer based Message Authentication in URLLC scenarios

PHYSEC based message authentication can, as an alternative to convention...
research
04/17/2019

Authenticated Preambles for Denial of Service Mitigation in LPWANs

In this article we introduce authentication preambles as a mechanism to ...

Please sign up or login with your details

Forgot password? Click here to reset