Title | ||
---|---|---|
Exploitation of redundancy for pattern estimation of copy-sensitive two level QR code |
Abstract | ||
---|---|---|
The falsification of hardcopy documents is a common problem these days. Numerous industrial and scientific solutions have been proposed to prevent these falsifications. In this paper, we want to study the security of the two level QR code which is constructed using specific textured patterns that are sensitive to print-and-scan impact. Such code is a good candidate because it generalizes several concepts from several codes. We take a falsifier point of view that aims to reconstruct the two level QR code and to fool the authentication system detector. As the two level QR code contains sets of the same textured patterns, the opponent has access to different printed-and-scanned versions of these textured patterns. These sets of patterns can be used for structure estimation. Several local strategies for pattern estimation are suggest in this paper. The experimental results show that the increasing number of printed-and-scanned patterns cannot improve the estimation results. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/WIFS.2018.8630792 | 2018 IEEE International Workshop on Information Forensics and Security (WIFS) |
Keywords | Field | DocType |
structure estimation,authentication system detector,hardcopy documents,copy-sensitive two level QR code pattern estimation,printed-and-scanned patterns,pattern texture | Authentication system,Computer science,Theoretical computer science,Redundancy (engineering),Detector | Conference |
ISSN | ISBN | Citations |
2157-4766 | 978-1-5386-6537-4 | 1 |
PageRank | References | Authors |
0.41 | 2 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Iuliia Tkachenko | 1 | 5 | 3.79 |
Christophe Destruel | 2 | 4 | 2.99 |