PHYSICAL OBJECT AUTHENTICATION: ...
Document type :
Communication dans un congrès avec actes
Title :
PHYSICAL OBJECT AUTHENTICATION: DETECTION-THEORETIC COMPARISON OF NATURAL AND ARTIFICIAL RANDOMNESS
Author(s) :
Voloshynovskiy, Slava [Auteur]
Computer Vision and Multimedia Laboratory [Geneve] [CVML]
Holotyak, Taras [Auteur]
Computer Vision and Multimedia Laboratory [Geneve] [CVML]
Bas, Patrick [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Computer Vision and Multimedia Laboratory [Geneve] [CVML]
Holotyak, Taras [Auteur]
Computer Vision and Multimedia Laboratory [Geneve] [CVML]
Bas, Patrick [Auteur]

Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Conference title :
ICASSP
City :
Shanghai
Country :
Chine
Start date of the conference :
2016-03-21
HAL domain(s) :
Sciences de l'ingénieur [physics]/Traitement du signal et de l'image [eess.SP]
English abstract : [en]
In this paper, we compare two methods that can be used by the anti-counterfeiting industry to protect physical objects, which are either based on an object's natural randomness or on artificial randomness embedded on the ...
Show more >In this paper, we compare two methods that can be used by the anti-counterfeiting industry to protect physical objects, which are either based on an object's natural randomness or on artificial randomness embedded on the object. We show that the considered verification architectures rely either on a comparison between an enrolled fingerprint and an extracted one or between a tag and a fingerprint. We compare these setups from detection-theoretic perspectives for both types of architectures. Authentication performance using false and miss error probabilities of the two systems are analysed and then compared using two practical setups. We highlight the advantages and limitations of each architecture. These theoretical results derived for binary fingerprints are useful to construct and optimise practical methods and to help select the appropriate architecture.Show less >
Show more >In this paper, we compare two methods that can be used by the anti-counterfeiting industry to protect physical objects, which are either based on an object's natural randomness or on artificial randomness embedded on the object. We show that the considered verification architectures rely either on a comparison between an enrolled fingerprint and an extracted one or between a tag and a fingerprint. We compare these setups from detection-theoretic perspectives for both types of architectures. Authentication performance using false and miss error probabilities of the two systems are analysed and then compared using two practical setups. We highlight the advantages and limitations of each architecture. These theoretical results derived for binary fingerprints are useful to construct and optimise practical methods and to help select the appropriate architecture.Show less >
Language :
Anglais
Peer reviewed article :
Oui
Audience :
Internationale
Popular science :
Non
Collections :
Source :
Files
- https://hal.archives-ouvertes.fr/hal-01283068/document
- Open access
- Access the document
- https://hal.archives-ouvertes.fr/hal-01283068/document
- Open access
- Access the document
- https://hal.archives-ouvertes.fr/hal-01283068/document
- Open access
- Access the document
- document
- Open access
- Access the document
- 2016.ICASSP.Randomness9.pdf
- Open access
- Access the document