Secure Graphic
   HOME

TheInfoList



OR:

A copy detection pattern (CDP) or graphical code is a small
random In common usage, randomness is the apparent or actual lack of pattern or predictability in events. A random sequence of events, symbols or steps often has no :wikt:order, order and does not follow an intelligible pattern or combination. Ind ...
or
pseudo-random A pseudorandom sequence of numbers is one that appears to be statistically random, despite having been produced by a completely deterministic and repeatable process. Background The generation of random numbers has many uses, such as for rando ...
digital image A digital image is an image composed of picture elements, also known as ''pixels'', each with ''finite'', '' discrete quantities'' of numeric representation for its intensity or gray level that is an output from its two-dimensional functions ...
which is printed on documents, labels or products for
counterfeit To counterfeit means to imitate something authentic, with the intent to steal, destroy, or replace the original, for use in illegal transactions, or otherwise to deceive individuals into believing that the fake is of equal or greater value tha ...
detection.
Authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicati ...
is made by scanning the printed CDP using an
image scanner An image scanner—often abbreviated to just scanner—is a device that optically scans images, printed text, handwriting or an object and converts it to a digital image. Commonly used in offices are variations of the desktop ''flatbed scanner'' ...
or mobile phone camera. It is possible to store additional product-specific data into the CDP that will be decoded during the scanning process. A CDP can also be inserted into a 2D barcode to facilitate smartphone authentication and to connect with traceability data.


Principle

The detection of counterfeits using a CDP relies on an "information loss principle", which states that every time a digital image is printed or scanned, some information about the original digital image is lost. A CDP is a maximum entropy image that attempts to take advantage of this information loss. Since producing a counterfeit CDP requires an additional scanning and printing processes, it will have less information than an original CDP. By measuring the information in the scanned CDP, the detector can determine whether the CDP is an original print or a copy. CDPs aim to address limitations of optical security features such as security holograms. They are motivated by the need for security features that can be originated, managed and transferred digitally, and that are machine readable. Contrarily to many traditional
security printing Security printing is the field of the printing industry that deals with the printing of items such as banknotes, cheques, passports, tamper-evident labels, security tapes, product authentication, stock certificates, postage stamps and identity ca ...
techniques, CDPs do not rely on
Security by Obscurity Security through obscurity (or security by obscurity) is the reliance in security engineering on design or implementation secrecy as the main method of providing security to a system or component. History An early opponent of security through o ...
, as the algorithm for generating CDPs can be public as long as the key used to generate it or the digital CDP is not revealed. CDPs have also been described as a type of optical
physical unclonable function A physical unclonable function (sometimes also called physically unclonable function, which refers to a weaker security metric than a physical unclonable function), or PUF, is a physical object that for a given input and conditions (challenge), pr ...
. While they have been cited as a "powerful tool to detect copies", it is noted however that CDPs "require an extensive knowledge of printing technologies" because the printing process introduces variation that is foundational to copy detection.


Security assessment

The theoretical and practical assessment of the security level of CDPs, in other words the detector's ability to detect counterfeit attempts, is an ongoing area of research: * In, practical recommendations on printing stability, taking into account scanning quality of the detector, and managing the security of printing facilities. *In, a decision theoretic-model is developed to determine optimality properties of CDPs in idealised conditions. Based on an additive
Gaussian noise Gaussian noise, named after Carl Friedrich Gauss, is a term from signal processing theory denoting a kind of signal noise that has a probability density function (pdf) equal to that of the normal distribution (which is also known as the Gaussia ...
assumption for the print channel and an attacker who takes optimal decisions, it is shown that the most effective decision function is a
correlation function A correlation function is a function that gives the statistical correlation between random variables, contingent on the spatial or temporal distance between those variables. If one considers the correlation function between random variables rep ...
. * In, different new CDP detection metrics are proposed and confirmed a significant improvement of copy detection accuracy. *In, the impact of multiple printed observations of the same CDP is studied, and it is shown that the noise due to the printing process can be reduced but not completely removed, due to deterministic printing artefacts. * In, a theoretical comparison is made between the performance of CDPs and natural randomness. * In and, deep learning methods are used to recover portions of the digital CDP, and it is shown that these can be used to launch clonability attacks. *In, quality control challenges are reviewed, and an inline verification system of secure graphics is proposed for high security printing applications. *In, different attack methods based on restoration of the scanned CDP are tested. and show that a classifier based on support vector domain description outperforms other classification methods.


Applications

CDPs are used for different physical item authentication applications: * As a means of providing a product authentication service using the
Internet of Things The Internet of things (IoT) describes physical objects (or groups of such objects) with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other comm ...
. * For securing
identification documents An identity document (also called ID or colloquially as papers) is any document that may be used to prove a person's identity. If issued in a small, standard credit card size form, it is usually called an identity card (IC, ID card, citizen ca ...
, in combination with digital watermarks and 2D barcodes. They were used in 2006 to protect identification badges during the
FIFA World Cup The FIFA World Cup, often simply called the World Cup, is an international association football competition contested by the senior men's national teams of the members of the ' ( FIFA), the sport's global governing body. The tournament ha ...
. * Integrated into
QR Codes A QR code (an initialism for quick response code) is a type of matrix barcode (or two-dimensional barcode) invented in 1994 by the Japanese company Denso Wave. A barcode is a machine-readable optical label that can contain information about the ...
to enable consumers to check product authenticity with a smartphone application. * For authenticating pharmaceutical packaging.


Related techniques

The EURion constellation and digital watermarks are inserted into banknotes to be detected by scanners, photocopiers and image processing software. However the objective of these techniques is not to detect whether a given banknote is a counterfeit, but to deter amateur counterfeiters from reproducing banknotes by blocking the device or software used to make the counterfeit. Digital watermarks may be used as well to differentiate original prints from counterfeits. A digital watermark may also be inserted into a 2D barcode. The fundamental difference between digital watermarks and CDPs is that a digital watermark must be embedded into an existing image while respecting a fidelity constraint, while the CDP does not have such constraint.


References

{{Reflist


External links


Dataset of CDPs with copies on Kaggle
(for academic use only)
Dataset of CDPs from University of Geneva
* Anti-counterfeiting Authentication methods Security Forgery