Document Authentication Using Graphical ...
Document type :
Compte-rendu et recension critique d'ouvrage
DOI :
Title :
Document Authentication Using Graphical Codes: Reliable Performance Analysis and Channel Optimization
Author(s) :
Phan Ho, Anh Thu [Auteur]
LAGIS-SI
Hoang Mai, Bao An [Auteur]
LAGIS-SI
Sawaya, Wadih [Auteur]
LAGIS-SI
Bas, Patrick [Auteur]
Laboratoire d'Automatique, Génie Informatique et Signal [LAGIS]
LAGIS-SI
Hoang Mai, Bao An [Auteur]
LAGIS-SI
Sawaya, Wadih [Auteur]
LAGIS-SI
Bas, Patrick [Auteur]

Laboratoire d'Automatique, Génie Informatique et Signal [LAGIS]
Journal title :
EURASIP Journal on Information Security
Pages :
10.1186/1687-417X-2014-9
Publisher :
Hindawi/SpringerOpen
Publication date :
2014-06-05
HAL domain(s) :
Sciences de l'ingénieur [physics]/Traitement du signal et de l'image [eess.SP]
Informatique [cs]/Traitement du signal et de l'image [eess.SP]
Informatique [cs]/Traitement du signal et de l'image [eess.SP]
English abstract : [en]
This paper proposes to investigate the impact of the channel model for authentication systems based on codes that are corrupted by a physically unclonable noise such as the one emitted by a printing process. The core of ...
Show more >This paper proposes to investigate the impact of the channel model for authentication systems based on codes that are corrupted by a physically unclonable noise such as the one emitted by a printing process. The core of such a system for the receiver, is to perform a statistical test in order to recognize and accept an original code corrupted by noise and reject any illegal copy or a counterfeit. This study highlights the fact that the probability of type I and type II errors can be better approximated, by several orders of magnitude, when using the Cramér-Chernoff theorem instead of a Gaussian approximation. The practical computation of these error probabilities is also possible using Monte-Carlo simulations combined with the importance sampling method. By deriving the optimal test within a Neyman-Pearson setup, a first theoretical analysis shows that a thresholding of the received code induces a loss of performance. A second analysis proposes to find the best parameters of the channels involved in the model in order to maximize the authentication performance. This is possible when the opponent's channel is identical to the legitimate channel but also when the opponent's channel is different, leading this time to a min-max game between the two players. Finally we evaluate the impact of an uncertainty for the receiver on the opponent channel and we show that the authentication is still possible whenever the receiver can observe forged codes and uses them to estimate the parameters of the model.Show less >
Show more >This paper proposes to investigate the impact of the channel model for authentication systems based on codes that are corrupted by a physically unclonable noise such as the one emitted by a printing process. The core of such a system for the receiver, is to perform a statistical test in order to recognize and accept an original code corrupted by noise and reject any illegal copy or a counterfeit. This study highlights the fact that the probability of type I and type II errors can be better approximated, by several orders of magnitude, when using the Cramér-Chernoff theorem instead of a Gaussian approximation. The practical computation of these error probabilities is also possible using Monte-Carlo simulations combined with the importance sampling method. By deriving the optimal test within a Neyman-Pearson setup, a first theoretical analysis shows that a thresholding of the received code induces a loss of performance. A second analysis proposes to find the best parameters of the channels involved in the model in order to maximize the authentication performance. This is possible when the opponent's channel is identical to the legitimate channel but also when the opponent's channel is different, leading this time to a min-max game between the two players. Finally we evaluate the impact of an uncertainty for the receiver on the opponent channel and we show that the authentication is still possible whenever the receiver can observe forged codes and uses them to estimate the parameters of the model.Show less >
Language :
Anglais
Popular science :
Non
ANR Project :
Collections :
Source :
Files
- https://hal.archives-ouvertes.fr/hal-01056699/document
- Open access
- Access the document
- https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/1687-417X-2014-9
- Open access
- Access the document
- https://hal.archives-ouvertes.fr/hal-01056699/document
- Open access
- Access the document
- document
- Open access
- Access the document
- MontpellierToJisThirdRoundFinal.pdf
- Open access
- Access the document
- 1687-417X-2014-9
- Open access
- Access the document