Forensic Authentication of Data Bearing Halftones
Stephen Pollard, Robert Ulichney, Matthew Gaubatz, Steven Simske
2013
Abstract
This paper introduces a practical system for combining overt, covert and forensic information in a single, small printed feature. The overt “carrier” feature need not be a dedicated security mark such as a 2D or color barcode, but can instead be integrated into a desirable object such as a logo as part of the aesthetically-desired layout using steganographic halftones (Stegatones). High-resolution imaging in combination with highly accurate and robust image registration is used to recover, simultaneously, a unique identity suitable for associating a unique print with an on-line database and a unique forensic signature that is both tamper and copy sensitive.
References
- Adams, G., 2010, Handheld Dyson Relay Lens for AntiCounterfeiting, IEEE IST.
- Bouguet, J-Y., 1999, Pyramid Implementation of Lucas Kanade Feature Tracker: Description of the algorithm, OpenCV Documents, Intel Corporation, Microprocessor Research Lab.
- Daugman, J. G., 1993, High confidence visual recognition of persons by a test of visual phase information, IEEE PAMI, 15(11).
- Daugman, J., 2006, Probing the uniqueness and randomness of IrisCodes: results from 200 billion comparisons, Proc. IEEE, 94(11).
- Daugman, J., 2007, New methods in iris recognition, IEEE SMC, 37(5).
- Lucas, B., Kanade, T., 1981, An iterative image registration technique with an application to stereo vision, IJCAI.
- Pollard, S., Simske, S., Adams G., 2010, Model based print signature profile extraction for forensic analysis of individual text glyphs, IEEE WIFS.
- Pollard, S., Simske, S., Adams G, 2012, Print Biometrics: Recovering Forensic Signatures from Halftone Images, IAPR ICPR.
- Pizzanelli, D., 2009, The Future of Anti-Counterfeiting, Brand Protection and Security Packaging V, Pira International, Leatherhead, UK.
- Ulichney, R., Gaubatz, M., Simske, S., 2010 Encoding information in clustered-dot halftones, IS&T NIP26.
Paper Citation
in Harvard Style
Pollard S., Ulichney R., Gaubatz M. and Simske S. (2013). Forensic Authentication of Data Bearing Halftones . In Proceedings of the International Conference on Computer Vision Theory and Applications - Volume 2: VISAPP, (VISIGRAPP 2013) ISBN 978-989-8565-48-8, pages 109-113. DOI: 10.5220/0004296201090113
in Bibtex Style
@conference{visapp13,
author={Stephen Pollard and Robert Ulichney and Matthew Gaubatz and Steven Simske},
title={Forensic Authentication of Data Bearing Halftones},
booktitle={Proceedings of the International Conference on Computer Vision Theory and Applications - Volume 2: VISAPP, (VISIGRAPP 2013)},
year={2013},
pages={109-113},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004296201090113},
isbn={978-989-8565-48-8},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Computer Vision Theory and Applications - Volume 2: VISAPP, (VISIGRAPP 2013)
TI - Forensic Authentication of Data Bearing Halftones
SN - 978-989-8565-48-8
AU - Pollard S.
AU - Ulichney R.
AU - Gaubatz M.
AU - Simske S.
PY - 2013
SP - 109
EP - 113
DO - 10.5220/0004296201090113