A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models

The traditional two-dimensional (2D) barcode has been employed in anti-counterfeiting systems as a storage media for serial numbers. However, an attack can be initiated by simply copying the 2D barcode and attaching it to a counterfeit product. In this paper, we aim at proposing an authentication scheme with a mobile imaging device for a 2D barcode. This work presents a competitive solution among the 2D barcode authentication schemes that have been verified under mobile imaging conditions. The proposed copy-proof scheme is composed of two sets of features which are extracted by exploiting the characteristics of barcoding channel models. The proposed features identify the intrinsic differences between genuine and counterfeit barcode images in the frequency and spatial domains. An efficient two-stage barcode authentication framework is then proposed by combining the two sets of features in a cascading manner. To evaluate the practicality of the proposed authentication scheme, four databases with different devices (printers, scanners, mobile cameras), barcode sizes, and barcode designs are considered in the experiments. By comparing with the existing texture descriptors and some deep learning-based approaches, it is shown that the proposed scheme has a higher authentication accuracy under various conditions, such as cross-database, cross-size and cross-pattern experiments which study the generalities of a pre-trained model towards challenging conditions commonly found in real-world scenarios. Last but not least, the proposed scheme has been evaluated under some state-of-the-art attack scenarios where the attacker employs several realizations of genuine patterns or the deep learning-based technique to produce a counterfeit copy. The source code and data for producing the results in our experiments are available at https://bit.ly/2FOlJH7.

[1]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[2]  Diana Adler,et al.  Single Sensor Imaging Methods And Applications For Digital Cameras , 2016 .

[3]  Wai Ho Mow,et al.  Accurate Modeling and Efficient Estimation of the Print-Capture Channel With Application in Barcoding , 2019, IEEE Transactions on Image Processing.

[4]  Rafael C. González,et al.  Digital image processing, 3rd Edition , 2008 .

[5]  Bill Triggs,et al.  Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[6]  Iuliia Tkachenko,et al.  Exploitation of redundancy for pattern estimation of copy-sensitive two level QR code , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).

[7]  Patrick Bas,et al.  Document authentication using graphical codes: reliable performance analysis and channel optimization , 2014, EURASIP Journal on Information Security.

[8]  Francesco Bianconi,et al.  Dominant local binary patterns for texture classification: Labelled or unlabelled? , 2015, Pattern Recognit. Lett..

[9]  Paolo Bestagini,et al.  First Steps Toward Camera Model Identification With Convolutional Neural Networks , 2016, IEEE Signal Processing Letters.

[10]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[11]  William Puech,et al.  Printed document authentication using two level or code , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[12]  Xiangdong Liu,et al.  Analysis and reduction of moire patterns in scanned halftone pictures , 1996 .

[13]  Bo Chen,et al.  MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications , 2017, ArXiv.

[14]  Patrick Bas,et al.  Physical object authentication: Detection-theoretic comparison of natural and artificial randomness , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[15]  Hui Kong,et al.  A Generalized Laplacian of Gaussian Filter for Blob Detection and Its Applications , 2013, IEEE Transactions on Cybernetics.

[16]  Yuqing Dong,et al.  Three-dimensional quick response code based on inkjet printing of upconversion fluorescent nanoparticles for drug anti-counterfeiting. , 2016, Nanoscale.

[17]  Marc Pic,et al.  A watermarking technique to secure printed QR codes using a statistical test , 2017, 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[18]  Alex ChiChung Kot,et al.  A two-stage quality measure for mobile phone captured 2D barcode images , 2013, Pattern Recognit..

[19]  Masatoshi Okutomi,et al.  Motion Blur Parameter Identification from a Linearly Blurred Image , 2007, 2007 Digest of Technical Papers International Conference on Consumer Electronics.

[20]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[21]  François Cayre,et al.  Towards a realistic channel model for security analysis of authentication using graphical codes , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).

[22]  Olga Taran,et al.  Clonability of Anti-counterfeiting Printable Graphical Codes: A Machine Learning Approach , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[23]  Ngoc Thang Vu,et al.  Densely Connected Convolutional Networks for Speech Recognition , 2018, ITG Symposium on Speech Communication.

[24]  William Puech,et al.  Two-Level QR Code for Private Message Sharing and Document Authentication , 2016, IEEE Transactions on Information Forensics and Security.

[25]  Wai Ho Mow,et al.  PiCode: A New Picture-Embedding 2D Barcode , 2016, IEEE Transactions on Image Processing.

[26]  Thierry Pun,et al.  Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management , 2006, IEEE Trans. Inf. Forensics Secur..

[27]  Wai Ho Mow,et al.  RA Code: A Robust and Aesthetic Code for Resolution-Constrained Applications , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[28]  Bao An Mai Hoang Performance Analysis of an Authentication Method relying on Graphical Codes , 2014 .

[29]  M. Lewis China's Cosmopolitan Empire: The Tang Dynasty , 2009 .

[30]  Hsi-Chun Wang,et al.  Using Modified Digital Halftoning Technique to Design Invisible 2D Barcode by Infrared Detection , 2013 .

[31]  Fernando Pérez-González,et al.  A Novel Model for the Print-and-Capture Channel in 2D Bar Codes , 2006, MRCS.

[32]  Anderson Rocha,et al.  Laser printer attribution: exploring new features and beyond. , 2015, Forensic science international.

[33]  Justin Picard Digital authentication with copy-detection patterns , 2004, IS&T/SPIE Electronic Imaging.

[34]  Fabio Roli,et al.  Security Evaluation of Pattern Classifiers under Attack , 2014, IEEE Transactions on Knowledge and Data Engineering.

[35]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[36]  Sun-Yuan Kung,et al.  Biometric Authentication: A Machine Learning Approach , 2004 .

[37]  Min Wu,et al.  Counterfeit Detection Based on Unclonable Feature of Paper Using Mobile Camera , 2017, IEEE Transactions on Information Forensics and Security.

[38]  프레데릭 그레마우드,et al.  Identification and authentication using liquid crystal material markings , 2009 .

[39]  J. Fridrich,et al.  Digital image forensics , 2009, IEEE Signal Processing Magazine.

[40]  Shunzhi Zhu,et al.  Anti-counterfeiting digital watermarking algorithm for printed QR barcode , 2015, Neurocomputing.