Experimental Investigation of Protection Method for Detection of Cloning Attack on Paper Certificates

Cover Page

Cite item

Full Text

Abstract

A method of paper certificate protection against a cloning attack is investigated, that was proposed recently theoretically in a paper of the same author. This method is based on the use of digital watermarks. In order to extend watermark approach to a protection against cloning attacks, it has been suggested to execute estimation of the noise power which appear during the image scanning and printing. Algorithms of embedding and extraction of watermarks out of the images are presented along with a method of detecting of the cloning attack after scanning and printing by an attacker. Numerical results of the experiments for the error probabilities of a cloning missing and a false alarm are also presented and are in agreement with theoretical results obtained before.

About the authors

D. A. Flaksman

Research and Production Enterprise “Novye Tekhnologii Telekommunikatsii”, Ltd

Email: flxdima4951@gmail.com
ORCID iD: 0000-0002-0326-4592
SPIN-code: 2668-7361

References

  1. Коржик В.И., Анфиногенов С.О., Кочкарёв А.И., Федянин И.А., Жувикин А.Г., Флаксман Д.А. Цифровая стеганография и цифровые водяные знаки. Часть 2. Цифровые водяные знаки. СПб: СПбГУТ, 2017. 198 с.
  2. Tkachenko I. Generation and analysis of graphical codes using textured patterns for printed document authentication. D.Sc Thesis. Montpellier: Université de Montpellier, 2015.
  3. Nguyen H.P., Delahaies A., Retraint F., Nguyen D.H., Pic M., Morain-Nicolier F. A watermarking technique to secure printed QR codes using a statistical test // Proceedings of the IEEE Global Conference on Signal and Information Processing (GlobalSIP, Montreal, Canada, 14‒16 November 2017). IEEE, 2017. PP. 288‒292. doi: 10.1109/GlobalSIP.2017.8308650
  4. Chen C., Li M., Ferreira A., Huang J., Cai R. A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Chan-nel Models // IEEE Transactions on Information Forensics and Security. 2019. Vol. 15. PP. 1056‒1071. doi: 10.1109/TIFS.2019.2934861
  5. Taran O., Bonev S., Voloshynovskiy S. Clonability of Anti-counterfeiting Printable Graphical Codes: A Machine Learning Approach // Proceedings of the ICASSP 2019 ‒ 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP, Brighton, UK, 12‒17 May 2019). 2019. PP. 2482‒2486. doi: 10.1109/ICASSP.2019.8682967
  6. Коржик В.И., Старостин В.С., Флаксман Д.А. Разработка метода использования цифровых водяных знаков для защиты от атаки клонирования бумажных сертификатов // Труды учебных заведений связи. 2021. Т. 7. № 2. С. 79‒84. doi: 10.31854/1813-324X-2021-7-2-79-84
  7. Korzhik V., Starostin V., Yakovlev V., Flaksman D., Bukshin I., Izotov B. Digital Watermarking System for Hard Cover Objects Against Cloning Attacks // Proceedings of the XXth Conference of Open Innovations Association FRUCT (Oulu, Finland, . 27‒29 October 2021). IEEE, 2021. PP. 79‒85. doi: 10.23919/FRUCT53335.2021.9599967
  8. Solomon C., Breckin T. Fundamentals of digital signal processing. Wiley, 2011.
  9. Korzhik V., Starostin V., Yakovlev V., Flaksman D. Digital Watermark System with an Ability of its Extraction from Hard Copies of Data // Труды учебных заведений связи. 2019. Т. 5. № 3. С. 75‒85. doi: 10.31854/1813-324X-2019-5-3-75

Supplementary files

Supplementary Files
Action
1. JATS XML


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Согласие на обработку персональных данных

 

Используя сайт https://journals.rcsi.science, я (далее – «Пользователь» или «Субъект персональных данных») даю согласие на обработку персональных данных на этом сайте (текст Согласия) и на обработку персональных данных с помощью сервиса «Яндекс.Метрика» (текст Согласия).