PHYSICAL OBJECT AUTHENTICATION: ...
Type de document :
Communication dans un congrès avec actes
Titre :
PHYSICAL OBJECT AUTHENTICATION: DETECTION-THEORETIC COMPARISON OF NATURAL AND ARTIFICIAL RANDOMNESS
Auteur(s) :
Voloshynovskiy, Slava [Auteur]
Computer Vision and Multimedia Laboratory [Geneve] [CVML]
Holotyak, Taras [Auteur]
Computer Vision and Multimedia Laboratory [Geneve] [CVML]
Bas, Patrick [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Computer Vision and Multimedia Laboratory [Geneve] [CVML]
Holotyak, Taras [Auteur]
Computer Vision and Multimedia Laboratory [Geneve] [CVML]
Bas, Patrick [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Titre de la manifestation scientifique :
ICASSP
Ville :
Shanghai
Pays :
Chine
Date de début de la manifestation scientifique :
2016-03-21
Discipline(s) HAL :
Sciences de l'ingénieur [physics]/Traitement du signal et de l'image [eess.SP]
Résumé en anglais : [en]
In this paper, we compare two methods that can be used by the anti-counterfeiting industry to protect physical objects, which are either based on an object's natural randomness or on artificial randomness embedded on the ...
Lire la suite >In this paper, we compare two methods that can be used by the anti-counterfeiting industry to protect physical objects, which are either based on an object's natural randomness or on artificial randomness embedded on the object. We show that the considered verification architectures rely either on a comparison between an enrolled fingerprint and an extracted one or between a tag and a fingerprint. We compare these setups from detection-theoretic perspectives for both types of architectures. Authentication performance using false and miss error probabilities of the two systems are analysed and then compared using two practical setups. We highlight the advantages and limitations of each architecture. These theoretical results derived for binary fingerprints are useful to construct and optimise practical methods and to help select the appropriate architecture.Lire moins >
Lire la suite >In this paper, we compare two methods that can be used by the anti-counterfeiting industry to protect physical objects, which are either based on an object's natural randomness or on artificial randomness embedded on the object. We show that the considered verification architectures rely either on a comparison between an enrolled fingerprint and an extracted one or between a tag and a fingerprint. We compare these setups from detection-theoretic perspectives for both types of architectures. Authentication performance using false and miss error probabilities of the two systems are analysed and then compared using two practical setups. We highlight the advantages and limitations of each architecture. These theoretical results derived for binary fingerprints are useful to construct and optimise practical methods and to help select the appropriate architecture.Lire moins >
Langue :
Anglais
Comité de lecture :
Oui
Audience :
Internationale
Vulgarisation :
Non
Collections :
Source :
Fichiers
- https://hal.archives-ouvertes.fr/hal-01283068/document
- Accès libre
- Accéder au document
- https://hal.archives-ouvertes.fr/hal-01283068/document
- Accès libre
- Accéder au document
- https://hal.archives-ouvertes.fr/hal-01283068/document
- Accès libre
- Accéder au document
- document
- Accès libre
- Accéder au document
- 2016.ICASSP.Randomness9.pdf
- Accès libre
- Accéder au document