Abstract | ||
---|---|---|
This paper proposes to investigate the impact of the channel model for authentication systems based on codes that are corrupted by a physically unclonable noise such as the one emitted by a printing process. The core of such a system is the comparison for the receiver between an original binary code, an original corrupted code and a copy of the original code. We analyze two strategies, depending on whether or not the receiver use a binary version of its observation to perform its authentication test. By deriving the optimal test within a Neyman-Pearson setup, a theoretical analysis shows that a thresholding of the code induces a loss of performance. This study also highlights the fact that the probability of the type I and type II errors can be better approximated, by several orders of magnitude, computing Chernoff bounds instead of the Gaussian approximation. Finally we evaluate the impact of an uncertainty for the receiver on the opponent channel and show that the authentication is still possible whenever the receiver can observe forged codes and uses them to estimate the parameters of the model. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1145/2482513.2482538 | IH&MMSec |
Keywords | Field | DocType |
opponent channel,graphical code,original code,type ii error,binary version,authentication system,channel model,optimal test,original binary code,original corrupted code,document authentication,authentication test,statistical analysis,authentication,hypothesis testing | Authentication,Computer science,Binary code,Communication channel,Algorithm,Theoretical computer science,Thresholding,Type I and type II errors,Statistical hypothesis testing,Chernoff bound,Binary number | Conference |
Citations | PageRank | References |
5 | 0.81 | 6 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Anh Thu Phan Ho | 1 | 5 | 1.48 |
Bao An Mai Hoang | 2 | 5 | 1.48 |
Wadih Sawaya | 3 | 25 | 6.35 |
Patrick Bas | 4 | 742 | 30.95 |