https://en.wikipedia.org/w/index.php?action=history&feed=atom&title=Copy_detection_pattern Copy detection pattern - Revision history 2025-06-02T21:21:00Z Revision history for this page on the wiki MediaWiki 1.45.0-wmf.3 https://en.wikipedia.org/w/index.php?title=Copy_detection_pattern&diff=1292056173&oldid=prev OAbot: Open access bot: url-access updated in citation with #oabot. 2025-05-24T23:40:51Z <p><a href="/wiki/Wikipedia:OABOT" class="mw-redirect" title="Wikipedia:OABOT">Open access bot</a>: url-access updated in citation with #oabot.</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 23:40, 24 May 2025</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 8:</td> <td colspan="2" class="diff-lineno">Line 8:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>CDPs aim to address limitations of optical security features such as [[security hologram]]s. They are motivated by the need for security features that can be originated, managed and transferred digitally, and that are machine readable.&lt;ref name=":0" /&gt; Contrarily to many traditional [[security printing]] techniques, CDPs do not rely on [[Security through obscurity|Security by Obscurity]],&lt;ref name="Picard"&gt;{{Cite journal|last1=Picard|first1=Justin|last2=Vielhauer|first2=Claus|last3=Thorwirth|first3=Niels|editor2-first=Ping W|editor2-last=Wong|editor1-first=Edward J|editor1-last=Delp Iii|date=2004-06-22|title=Towards fraud-proof ID documents using multiple data hiding technologies and biometrics|journal=Security, Steganography, and Watermarking of Multimedia Contents VI|volume=5306|pages=416|publisher=SPIE|doi=10.1117/12.525446|bibcode=2004SPIE.5306..416P|s2cid=15931951}}&lt;/ref&gt; as the algorithm for generating CDPs can be public as long as the key used to generate it or the digital CDP is not revealed.&lt;ref name=":3"&gt;{{Cite journal|last=Picard|first=Justin|date=2008|title=Copy Detectable Images: From Theory to Practice|url=https://www.researchgate.net/publication/341030602|journal=Conference on Optical Security and Counterfeit Deterrence 2008|volume=1|pages=372–381|via=Reconnaissance International}}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>CDPs aim to address limitations of optical security features such as [[security hologram]]s. They are motivated by the need for security features that can be originated, managed and transferred digitally, and that are machine readable.&lt;ref name=":0" /&gt; Contrarily to many traditional [[security printing]] techniques, CDPs do not rely on [[Security through obscurity|Security by Obscurity]],&lt;ref name="Picard"&gt;{{Cite journal|last1=Picard|first1=Justin|last2=Vielhauer|first2=Claus|last3=Thorwirth|first3=Niels|editor2-first=Ping W|editor2-last=Wong|editor1-first=Edward J|editor1-last=Delp Iii|date=2004-06-22|title=Towards fraud-proof ID documents using multiple data hiding technologies and biometrics|journal=Security, Steganography, and Watermarking of Multimedia Contents VI|volume=5306|pages=416|publisher=SPIE|doi=10.1117/12.525446|bibcode=2004SPIE.5306..416P|s2cid=15931951}}&lt;/ref&gt; as the algorithm for generating CDPs can be public as long as the key used to generate it or the digital CDP is not revealed.&lt;ref name=":3"&gt;{{Cite journal|last=Picard|first=Justin|date=2008|title=Copy Detectable Images: From Theory to Practice|url=https://www.researchgate.net/publication/341030602|journal=Conference on Optical Security and Counterfeit Deterrence 2008|volume=1|pages=372–381|via=Reconnaissance International}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>CDPs have also been described as a type of optical [[physical unclonable function]].&lt;ref name=":2" /&gt; While they have been cited as a "powerful tool to detect copies",&lt;ref&gt;{{cite journal|url=https://ieeexplore.ieee.org/document/6403957 |title=Copy detection pattern-based document protection for variable media |date=November 2012 |last1=Dirik |first1=Ahmet Emir |last2=Haas |first2=Bertrand |journal=IET Image Processing |volume=6 |issue=8 |pages=1102–1113 |doi=10.1049/iet-ipr.2012.0297 |issn=1751-9667 |access-date=12 August 2020}}{{dead link|date=July 2024|bot=medic}}{{cbignore|bot=medic}}&lt;/ref&gt; it is noted however that CDPs "require an extensive knowledge of printing technologies"&lt;ref name=":4"&gt;{{Cite book|url=https://www.worldcat.org/oclc/847355368|title=Vision and challenges for realising the Internet of things|date=2010|publisher=EUR-OP|others=Sundmaeker, Harald., Guillemin, Patrick., Friess, Peter., Woelfflé, Sylvie., European Commission. Directorate-General for the Information Society and Media.|isbn=978-92-79-15088-3|location=Luxembourg|oclc=847355368}}&lt;/ref&gt; because the printing process introduces variation that is foundational to copy detection.[[File:Cdp digital original copy.png|thumb|660x660px|A '''digital CDP''' (100x100 pixel binary image) is printed at 600 pixels per inch (ppi) on a Canon C6045 laser printer. The '''original CDP''' real image size is 4.2mm x 4.2mm. This original CDP was scanned at 2400 ppi with a CanoScan 9000F flatbed scanner. The scan was processed with GIMP for image restoration, then printed on the same Canon C6045 laser printer. The copied CDP real image size is also 4.2mm x 4.2mm. Comparison of the original and copied CDP reveals a loss of details in the latter.|alt=|none]]</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>CDPs have also been described as a type of optical [[physical unclonable function]].&lt;ref name=":2" /&gt; While they have been cited as a "powerful tool to detect copies",&lt;ref&gt;{{cite journal|url=https://ieeexplore.ieee.org/document/6403957 |title=Copy detection pattern-based document protection for variable media |date=November 2012 |last1=Dirik |first1=Ahmet Emir |last2=Haas |first2=Bertrand |journal=IET Image Processing |volume=6 |issue=8 |pages=1102–1113 |doi=10.1049/iet-ipr.2012.0297 |issn=1751-9667 |access-date=12 August 2020<ins style="font-weight: bold; text-decoration: none;">|url-access=subscription </ins>}}{{dead link|date=July 2024|bot=medic}}{{cbignore|bot=medic}}&lt;/ref&gt; it is noted however that CDPs "require an extensive knowledge of printing technologies"&lt;ref name=":4"&gt;{{Cite book|url=https://www.worldcat.org/oclc/847355368|title=Vision and challenges for realising the Internet of things|date=2010|publisher=EUR-OP|others=Sundmaeker, Harald., Guillemin, Patrick., Friess, Peter., Woelfflé, Sylvie., European Commission. Directorate-General for the Information Society and Media.|isbn=978-92-79-15088-3|location=Luxembourg|oclc=847355368}}&lt;/ref&gt; because the printing process introduces variation that is foundational to copy detection.[[File:Cdp digital original copy.png|thumb|660x660px|A '''digital CDP''' (100x100 pixel binary image) is printed at 600 pixels per inch (ppi) on a Canon C6045 laser printer. The '''original CDP''' real image size is 4.2mm x 4.2mm. This original CDP was scanned at 2400 ppi with a CanoScan 9000F flatbed scanner. The scan was processed with GIMP for image restoration, then printed on the same Canon C6045 laser printer. The copied CDP real image size is also 4.2mm x 4.2mm. Comparison of the original and copied CDP reveals a loss of details in the latter.|alt=|none]]</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Security assessment ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Security assessment ==</div></td> </tr> </table> OAbot https://en.wikipedia.org/w/index.php?title=Copy_detection_pattern&diff=1279892031&oldid=prev Headbomb: ce 2025-03-11T05:23:40Z <p>ce</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 05:23, 11 March 2025</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 17:</td> <td colspan="2" class="diff-lineno">Line 17:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*In,&lt;ref name=":1"&gt;{{Cite journal|last=Picard|first=Justin|date=2008|title=On the Security of Copy Detectable Images|url=https://www.researchgate.net/publication/341030510|journal=NIP &amp; Digital Fabrication Conference, 2008 International Conference on Digital Printing Technologies}}&lt;/ref&gt; a decision theoretic-model is developed to determine optimality properties of CDPs in idealised conditions. Based on an additive [[Gaussian noise]] assumption for the print channel and an attacker who takes optimal decisions, it is shown that the most effective decision function is a [[correlation function]].</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*In,&lt;ref name=":1"&gt;{{Cite journal|last=Picard|first=Justin|date=2008|title=On the Security of Copy Detectable Images|url=https://www.researchgate.net/publication/341030510|journal=NIP &amp; Digital Fabrication Conference, 2008 International Conference on Digital Printing Technologies}}&lt;/ref&gt; a decision theoretic-model is developed to determine optimality properties of CDPs in idealised conditions. Based on an additive [[Gaussian noise]] assumption for the print channel and an attacker who takes optimal decisions, it is shown that the most effective decision function is a [[correlation function]].</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* In,&lt;ref&gt;{{Cite journal|last1=Dirik|first1=A. E.|last2=Haas|first2=B.|date=2012-11-01|title=Copy detection pattern-based document protection for variable media|journal=IET Image Processing|language=en|volume=6|issue=8|pages=1102–1113|doi=10.1049/iet-ipr.2012.0297|issn=1751-9667}}&lt;/ref&gt; different new CDP detection metrics are proposed and confirmed a significant improvement of copy detection accuracy.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* In,&lt;ref&gt;{{Cite journal|last1=Dirik|first1=A. E.|last2=Haas|first2=B.|date=2012-11-01|title=Copy detection pattern-based document protection for variable media|journal=IET Image Processing|language=en|volume=6|issue=8|pages=1102–1113|doi=10.1049/iet-ipr.2012.0297|issn=1751-9667}}&lt;/ref&gt; different new CDP detection metrics are proposed and confirmed a significant improvement of copy detection accuracy.</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>*In,&lt;ref&gt;{{Cite book|last1=Baras|first1=Cleo|last2=Cayre|first2=François|date=2012-08-01|chapter=2D bar-codes for authentication: A security approach|url=https://ieeexplore.ieee.org/document/6334191|title=2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO)|pages=1760–1766|isbn=978-1-4673-1068-0}}&lt;/ref&gt; the impact of multiple printed observations of the same CDP is studied, and it is shown that the noise due to the printing process can be reduced but not completely removed, due to deterministic printing artefacts.</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>*In,&lt;ref&gt;{{Cite book|last1=Baras|first1=Cleo|last2=Cayre|first2=François|date=2012-08-01|chapter=2D bar-codes for authentication: A security approach|<ins style="font-weight: bold; text-decoration: none;">chapter-</ins>url=https://ieeexplore.ieee.org/document/6334191|title=2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO)|pages=1760–1766|isbn=978-1-4673-1068-0}}&lt;/ref&gt; the impact of multiple printed observations of the same CDP is studied, and it is shown that the noise due to the printing process can be reduced but not completely removed, due to deterministic printing artefacts.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* In,&lt;ref&gt;{{Cite book|last1=Voloshynovskiy|first1=Slava|last2=Holotyak|first2=Taras|last3=Bas|first3=Patrick|title=2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) |chapter=Physical object authentication: Detection-theoretic comparison of natural and artificial randomness |date=2016-03-01|chapter-url=http://sip.unige.ch/articles/2016/2016.ICASSP.Final.PUF.pdf|publisher=IEEE|pages=2029–2033|doi=10.1109/icassp.2016.7472033|isbn=978-1-4799-9988-0|s2cid=10331654|url=https://hal.archives-ouvertes.fr/hal-01283068/file/2016.ICASSP.Randomness9.pdf }}&lt;/ref&gt; a theoretical comparison is made between the performance of CDPs and natural randomness.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* In,&lt;ref&gt;{{Cite book|last1=Voloshynovskiy|first1=Slava|last2=Holotyak|first2=Taras|last3=Bas|first3=Patrick|title=2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) |chapter=Physical object authentication: Detection-theoretic comparison of natural and artificial randomness |date=2016-03-01|chapter-url=http://sip.unige.ch/articles/2016/2016.ICASSP.Final.PUF.pdf|publisher=IEEE|pages=2029–2033|doi=10.1109/icassp.2016.7472033|isbn=978-1-4799-9988-0|s2cid=10331654|url=https://hal.archives-ouvertes.fr/hal-01283068/file/2016.ICASSP.Randomness9.pdf }}&lt;/ref&gt; a theoretical comparison is made between the performance of CDPs and natural randomness.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* In &lt;ref&gt;{{cite arXiv|last1=Taran|first1=Olga|last2=Bonev|first2=Slavi|last3=Voloshynovskiy|first3=Slava|date=2019-03-18|title=Clonability of anti-counterfeiting printable graphical codes: a machine learning approach|class=cs.CR|eprint=1903.07359}}&lt;/ref&gt; and,&lt;ref&gt;{{Cite book|last1=Yadav|first1=Rohit|last2=Tkachenko|first2=Iuliia|last3=Trémeau|first3=Alain|last4=Fournel|first4=Thierry|title=Proceedings of the ACM Workshop on Information Hiding and Multimedia Security |chapter=Estimation of Copy-sensitive Codes Using a Neural Approach |date=2019|pages=77–82|location=New York, New York, USA|publisher=ACM Press|doi=10.1145/3335203.3335718|isbn=978-1-4503-6821-6|s2cid=195848782|chapter-url=https://hal.archives-ouvertes.fr/hal-02330988/file/IH_MMSec_2019_final.pdf}}&lt;/ref&gt; deep learning methods are used to recover portions of the digital CDP, and it is shown that these can be used to launch clonability attacks.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* In &lt;ref&gt;{{cite arXiv|last1=Taran|first1=Olga|last2=Bonev|first2=Slavi|last3=Voloshynovskiy|first3=Slava|date=2019-03-18|title=Clonability of anti-counterfeiting printable graphical codes: a machine learning approach|class=cs.CR|eprint=1903.07359}}&lt;/ref&gt; and,&lt;ref&gt;{{Cite book|last1=Yadav|first1=Rohit|last2=Tkachenko|first2=Iuliia|last3=Trémeau|first3=Alain|last4=Fournel|first4=Thierry|title=Proceedings of the ACM Workshop on Information Hiding and Multimedia Security |chapter=Estimation of Copy-sensitive Codes Using a Neural Approach |date=2019|pages=77–82|location=New York, New York, USA|publisher=ACM Press|doi=10.1145/3335203.3335718|isbn=978-1-4503-6821-6|s2cid=195848782|chapter-url=https://hal.archives-ouvertes.fr/hal-02330988/file/IH_MMSec_2019_final.pdf}}&lt;/ref&gt; deep learning methods are used to recover portions of the digital CDP, and it is shown that these can be used to launch clonability attacks.</div></td> </tr> </table> Headbomb https://en.wikipedia.org/w/index.php?title=Copy_detection_pattern&diff=1279892011&oldid=prev Headbomb: ce 2025-03-11T05:23:24Z <p>ce</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 05:23, 11 March 2025</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 17:</td> <td colspan="2" class="diff-lineno">Line 17:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*In,&lt;ref name=":1"&gt;{{Cite journal|last=Picard|first=Justin|date=2008|title=On the Security of Copy Detectable Images|url=https://www.researchgate.net/publication/341030510|journal=NIP &amp; Digital Fabrication Conference, 2008 International Conference on Digital Printing Technologies}}&lt;/ref&gt; a decision theoretic-model is developed to determine optimality properties of CDPs in idealised conditions. Based on an additive [[Gaussian noise]] assumption for the print channel and an attacker who takes optimal decisions, it is shown that the most effective decision function is a [[correlation function]].</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*In,&lt;ref name=":1"&gt;{{Cite journal|last=Picard|first=Justin|date=2008|title=On the Security of Copy Detectable Images|url=https://www.researchgate.net/publication/341030510|journal=NIP &amp; Digital Fabrication Conference, 2008 International Conference on Digital Printing Technologies}}&lt;/ref&gt; a decision theoretic-model is developed to determine optimality properties of CDPs in idealised conditions. Based on an additive [[Gaussian noise]] assumption for the print channel and an attacker who takes optimal decisions, it is shown that the most effective decision function is a [[correlation function]].</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* In,&lt;ref&gt;{{Cite journal|last1=Dirik|first1=A. E.|last2=Haas|first2=B.|date=2012-11-01|title=Copy detection pattern-based document protection for variable media|journal=IET Image Processing|language=en|volume=6|issue=8|pages=1102–1113|doi=10.1049/iet-ipr.2012.0297|issn=1751-9667}}&lt;/ref&gt; different new CDP detection metrics are proposed and confirmed a significant improvement of copy detection accuracy.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* In,&lt;ref&gt;{{Cite journal|last1=Dirik|first1=A. E.|last2=Haas|first2=B.|date=2012-11-01|title=Copy detection pattern-based document protection for variable media|journal=IET Image Processing|language=en|volume=6|issue=8|pages=1102–1113|doi=10.1049/iet-ipr.2012.0297|issn=1751-9667}}&lt;/ref&gt; different new CDP detection metrics are proposed and confirmed a significant improvement of copy detection accuracy.</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>*In,&lt;ref&gt;{{Cite <del style="font-weight: bold; text-decoration: none;">journal</del>|last1=Baras|first1=Cleo|last2=Cayre|first2=François|date=2012-08-01|<del style="font-weight: bold; text-decoration: none;">title</del>=2D bar-codes for authentication: A security approach|url=https://ieeexplore.ieee.org/document/6334191|<del style="font-weight: bold; text-decoration: none;">journal</del>=2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO)|pages=1760–1766}}&lt;/ref&gt; the impact of multiple printed observations of the same CDP is studied, and it is shown that the noise due to the printing process can be reduced but not completely removed, due to deterministic printing artefacts.</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>*In,&lt;ref&gt;{{Cite <ins style="font-weight: bold; text-decoration: none;">book</ins>|last1=Baras|first1=Cleo|last2=Cayre|first2=François|date=2012-08-01|<ins style="font-weight: bold; text-decoration: none;">chapter</ins>=2D bar-codes for authentication: A security approach|url=https://ieeexplore.ieee.org/document/6334191|<ins style="font-weight: bold; text-decoration: none;">title</ins>=2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO)|pages=1760–1766<ins style="font-weight: bold; text-decoration: none;">|isbn=978-1-4673-1068-0</ins>}}&lt;/ref&gt; the impact of multiple printed observations of the same CDP is studied, and it is shown that the noise due to the printing process can be reduced but not completely removed, due to deterministic printing artefacts.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* In,&lt;ref&gt;{{Cite book|last1=Voloshynovskiy|first1=Slava|last2=Holotyak|first2=Taras|last3=Bas|first3=Patrick|title=2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) |chapter=Physical object authentication: Detection-theoretic comparison of natural and artificial randomness |date=2016-03-01|chapter-url=http://sip.unige.ch/articles/2016/2016.ICASSP.Final.PUF.pdf|publisher=IEEE|pages=2029–2033|doi=10.1109/icassp.2016.7472033|isbn=978-1-4799-9988-0|s2cid=10331654|url=https://hal.archives-ouvertes.fr/hal-01283068/file/2016.ICASSP.Randomness9.pdf }}&lt;/ref&gt; a theoretical comparison is made between the performance of CDPs and natural randomness.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* In,&lt;ref&gt;{{Cite book|last1=Voloshynovskiy|first1=Slava|last2=Holotyak|first2=Taras|last3=Bas|first3=Patrick|title=2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) |chapter=Physical object authentication: Detection-theoretic comparison of natural and artificial randomness |date=2016-03-01|chapter-url=http://sip.unige.ch/articles/2016/2016.ICASSP.Final.PUF.pdf|publisher=IEEE|pages=2029–2033|doi=10.1109/icassp.2016.7472033|isbn=978-1-4799-9988-0|s2cid=10331654|url=https://hal.archives-ouvertes.fr/hal-01283068/file/2016.ICASSP.Randomness9.pdf }}&lt;/ref&gt; a theoretical comparison is made between the performance of CDPs and natural randomness.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* In &lt;ref&gt;{{cite arXiv|last1=Taran|first1=Olga|last2=Bonev|first2=Slavi|last3=Voloshynovskiy|first3=Slava|date=2019-03-18|title=Clonability of anti-counterfeiting printable graphical codes: a machine learning approach|class=cs.CR|eprint=1903.07359}}&lt;/ref&gt; and,&lt;ref&gt;{{Cite book|last1=Yadav|first1=Rohit|last2=Tkachenko|first2=Iuliia|last3=Trémeau|first3=Alain|last4=Fournel|first4=Thierry|title=Proceedings of the ACM Workshop on Information Hiding and Multimedia Security |chapter=Estimation of Copy-sensitive Codes Using a Neural Approach |date=2019|pages=77–82|location=New York, New York, USA|publisher=ACM Press|doi=10.1145/3335203.3335718|isbn=978-1-4503-6821-6|s2cid=195848782|chapter-url=https://hal.archives-ouvertes.fr/hal-02330988/file/IH_MMSec_2019_final.pdf}}&lt;/ref&gt; deep learning methods are used to recover portions of the digital CDP, and it is shown that these can be used to launch clonability attacks.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* In &lt;ref&gt;{{cite arXiv|last1=Taran|first1=Olga|last2=Bonev|first2=Slavi|last3=Voloshynovskiy|first3=Slava|date=2019-03-18|title=Clonability of anti-counterfeiting printable graphical codes: a machine learning approach|class=cs.CR|eprint=1903.07359}}&lt;/ref&gt; and,&lt;ref&gt;{{Cite book|last1=Yadav|first1=Rohit|last2=Tkachenko|first2=Iuliia|last3=Trémeau|first3=Alain|last4=Fournel|first4=Thierry|title=Proceedings of the ACM Workshop on Information Hiding and Multimedia Security |chapter=Estimation of Copy-sensitive Codes Using a Neural Approach |date=2019|pages=77–82|location=New York, New York, USA|publisher=ACM Press|doi=10.1145/3335203.3335718|isbn=978-1-4503-6821-6|s2cid=195848782|chapter-url=https://hal.archives-ouvertes.fr/hal-02330988/file/IH_MMSec_2019_final.pdf}}&lt;/ref&gt; deep learning methods are used to recover portions of the digital CDP, and it is shown that these can be used to launch clonability attacks.</div></td> </tr> </table> Headbomb https://en.wikipedia.org/w/index.php?title=Copy_detection_pattern&diff=1254503153&oldid=prev Factfox: updated link 2024-10-31T08:54:54Z <p>updated link</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 08:54, 31 October 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 1:</td> <td colspan="2" class="diff-lineno">Line 1:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>{{Short description|Counterfeit detection}}</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>{{Short description|Counterfeit detection}}</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>{{COI|date=June 2020}}</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>{{COI|date=June 2020}}</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>A '''copy detection pattern (CDP)'''&lt;ref name=":0"&gt;{{Cite journal|last=Picard|first=Justin|date=2004-06-03|editor1-last=Van Renesse|editor1-first=Rudolf L|title=Digital authentication with copy-detection patterns|url=https://www.researchgate.net/publication/253088312|journal=Optical Security and Counterfeit Deterrence Techniques V|publisher=SPIE|volume=5310|pages=176|bibcode=2004SPIE.5310..176P|doi=10.1117/12.528055|s2cid=58492104}}&lt;/ref&gt; or '''graphical code'''&lt;ref name=":2"&gt;{{Cite journal|last1=Phan Ho|first1=Anh Thu|last2=Mai Hoang|first2=Bao An|last3=Sawaya|first3=Wadih|last4=Bas|first4=Patrick|date=2014-06-05|title=Document authentication using graphical codes: reliable performance analysis and channel optimization|url=https://www.researchgate.net/publication/270463004|journal=EURASIP Journal on Information Security|language=en|volume=2014|issue=1|pages=9|doi=10.1186/1687-417X-2014-9|issn=1687-417X|doi-access=free|hdl=20.500.12210/25915|hdl-access=free}}&lt;/ref&gt;&lt;ref&gt;{{Cite journal|last1=Tkachenko|first1=Iuliia|last2=Puech|first2=William|last3=Destruel|first3=Christophe|last4=Strauss|first4=Olivier|last5=Gaudin|first5=Jean-Marc|last6=Guichard|first6=Christian|date=2016-03-01|title=Two-Level QR Code for Private Message Sharing and Document Authentication|journal=IEEE Transactions on Information Forensics and Security|volume=11|issue=3|pages=571–583|doi=10.1109/TIFS.2015.2506546|s2cid=9465424|issn=1556-6021}}&lt;/ref&gt; is a small [[Randomness|random]] or [[Pseudorandomness|pseudo-random]] [[digital image]] which is printed on documents, labels or products for [[counterfeit]] detection. [[Authentication]] is made by scanning the printed CDP using an [[image scanner]] or [[mobile phone camera]].&lt;ref&gt;{{Cite book|url=http://www.unicri.it/sites/default/files/2021-07/Technology%20and%20Security%20Countering%20Criminal%20Infiltrations%20in%20the%20Legitimate%20Supply%20Chain_1.pdf|title=Technology and Security: Countering Criminal Infiltrations in the Legitimate Supply Chain|publisher=[[United Nations Interregional Crime and Justice Research Institute]]|year=2021}}&lt;/ref&gt; It is possible to store additional product-specific data into the CDP that will be decoded during the scanning process.&lt;ref&gt;{{Cite book|last=Abele, Eberhard.|url=https://www.worldcat.org/oclc/726826809|title=Schutz vor Produktpiraterie : ein Handbuch für den Maschinen- und Anlagenbau|date=2011|publisher=Springer|others=Ksuke, Philipp., Lang, Horst.|isbn=978-3-642-19280-7|location=Berlin|pages=|trans-title=Protection against product piracy: A handbook for the mechanical and plant engineering industry|oclc=726826809}}&lt;/ref&gt; A CDP can also be inserted into a [[2D barcode]] to facilitate smartphone authentication and to connect with traceability data.&lt;ref&gt;{{Cite book|url=https://euipo.europa.eu/<del style="font-weight: bold; text-decoration: none;">ohimportal/en/web/observatory/news</del>/-/<del style="font-weight: bold; text-decoration: none;">action/view/8550135</del>|title=EUIPO Anti-Counterfeiting Technology Guide|publisher=European Observatory on Infringements of Intellectual Property Rights|year=2021}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>A '''copy detection pattern (CDP)'''&lt;ref name=":0"&gt;{{Cite journal|last=Picard|first=Justin|date=2004-06-03|editor1-last=Van Renesse|editor1-first=Rudolf L|title=Digital authentication with copy-detection patterns|url=https://www.researchgate.net/publication/253088312|journal=Optical Security and Counterfeit Deterrence Techniques V|publisher=SPIE|volume=5310|pages=176|bibcode=2004SPIE.5310..176P|doi=10.1117/12.528055|s2cid=58492104}}&lt;/ref&gt; or '''graphical code'''&lt;ref name=":2"&gt;{{Cite journal|last1=Phan Ho|first1=Anh Thu|last2=Mai Hoang|first2=Bao An|last3=Sawaya|first3=Wadih|last4=Bas|first4=Patrick|date=2014-06-05|title=Document authentication using graphical codes: reliable performance analysis and channel optimization|url=https://www.researchgate.net/publication/270463004|journal=EURASIP Journal on Information Security|language=en|volume=2014|issue=1|pages=9|doi=10.1186/1687-417X-2014-9|issn=1687-417X|doi-access=free|hdl=20.500.12210/25915|hdl-access=free}}&lt;/ref&gt;&lt;ref&gt;{{Cite journal|last1=Tkachenko|first1=Iuliia|last2=Puech|first2=William|last3=Destruel|first3=Christophe|last4=Strauss|first4=Olivier|last5=Gaudin|first5=Jean-Marc|last6=Guichard|first6=Christian|date=2016-03-01|title=Two-Level QR Code for Private Message Sharing and Document Authentication|journal=IEEE Transactions on Information Forensics and Security|volume=11|issue=3|pages=571–583|doi=10.1109/TIFS.2015.2506546|s2cid=9465424|issn=1556-6021}}&lt;/ref&gt; is a small [[Randomness|random]] or [[Pseudorandomness|pseudo-random]] [[digital image]] which is printed on documents, labels or products for [[counterfeit]] detection. [[Authentication]] is made by scanning the printed CDP using an [[image scanner]] or [[mobile phone camera]].&lt;ref&gt;{{Cite book|url=http://www.unicri.it/sites/default/files/2021-07/Technology%20and%20Security%20Countering%20Criminal%20Infiltrations%20in%20the%20Legitimate%20Supply%20Chain_1.pdf|title=Technology and Security: Countering Criminal Infiltrations in the Legitimate Supply Chain|publisher=[[United Nations Interregional Crime and Justice Research Institute]]|year=2021}}&lt;/ref&gt; It is possible to store additional product-specific data into the CDP that will be decoded during the scanning process.&lt;ref&gt;{{Cite book|last=Abele, Eberhard.|url=https://www.worldcat.org/oclc/726826809|title=Schutz vor Produktpiraterie : ein Handbuch für den Maschinen- und Anlagenbau|date=2011|publisher=Springer|others=Ksuke, Philipp., Lang, Horst.|isbn=978-3-642-19280-7|location=Berlin|pages=|trans-title=Protection against product piracy: A handbook for the mechanical and plant engineering industry|oclc=726826809}}&lt;/ref&gt; A CDP can also be inserted into a [[2D barcode]] to facilitate smartphone authentication and to connect with traceability data.&lt;ref&gt;{{Cite book<ins style="font-weight: bold; text-decoration: none;"> </ins>|url=https://euipo.europa.eu/<ins style="font-weight: bold; text-decoration: none;">anti-counterfeiting-and-anti-piracy-technology-guide</ins>/<ins style="font-weight: bold; text-decoration: none;">marking</ins>-<ins style="font-weight: bold; text-decoration: none;">technologies</ins>/<ins style="font-weight: bold; text-decoration: none;">copy-detection-patterns </ins>|title=EUIPO Anti-Counterfeiting Technology Guide<ins style="font-weight: bold; text-decoration: none;"> </ins>|publisher=European Observatory on Infringements of Intellectual Property Rights<ins style="font-weight: bold; text-decoration: none;"> </ins>|year=2021}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Principle ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Principle ==</div></td> </tr> </table> Factfox https://en.wikipedia.org/w/index.php?title=Copy_detection_pattern&diff=1237705289&oldid=prev GreenC bot: Rescued 1 archive link. Wayback Medic 2.5 per WP:URLREQ#ieee.org 2024-07-31T03:21:34Z <p>Rescued 1 archive link. <a href="/wiki/User:GreenC/WaybackMedic_2.5" title="User:GreenC/WaybackMedic 2.5">Wayback Medic 2.5</a> per <a href="/wiki/Wikipedia:URLREQ#ieee.org" class="mw-redirect" title="Wikipedia:URLREQ">WP:URLREQ#ieee.org</a></p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 03:21, 31 July 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 8:</td> <td colspan="2" class="diff-lineno">Line 8:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>CDPs aim to address limitations of optical security features such as [[security hologram]]s. They are motivated by the need for security features that can be originated, managed and transferred digitally, and that are machine readable.&lt;ref name=":0" /&gt; Contrarily to many traditional [[security printing]] techniques, CDPs do not rely on [[Security through obscurity|Security by Obscurity]],&lt;ref name="Picard"&gt;{{Cite journal|last1=Picard|first1=Justin|last2=Vielhauer|first2=Claus|last3=Thorwirth|first3=Niels|editor2-first=Ping W|editor2-last=Wong|editor1-first=Edward J|editor1-last=Delp Iii|date=2004-06-22|title=Towards fraud-proof ID documents using multiple data hiding technologies and biometrics|journal=Security, Steganography, and Watermarking of Multimedia Contents VI|volume=5306|pages=416|publisher=SPIE|doi=10.1117/12.525446|bibcode=2004SPIE.5306..416P|s2cid=15931951}}&lt;/ref&gt; as the algorithm for generating CDPs can be public as long as the key used to generate it or the digital CDP is not revealed.&lt;ref name=":3"&gt;{{Cite journal|last=Picard|first=Justin|date=2008|title=Copy Detectable Images: From Theory to Practice|url=https://www.researchgate.net/publication/341030602|journal=Conference on Optical Security and Counterfeit Deterrence 2008|volume=1|pages=372–381|via=Reconnaissance International}}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>CDPs aim to address limitations of optical security features such as [[security hologram]]s. They are motivated by the need for security features that can be originated, managed and transferred digitally, and that are machine readable.&lt;ref name=":0" /&gt; Contrarily to many traditional [[security printing]] techniques, CDPs do not rely on [[Security through obscurity|Security by Obscurity]],&lt;ref name="Picard"&gt;{{Cite journal|last1=Picard|first1=Justin|last2=Vielhauer|first2=Claus|last3=Thorwirth|first3=Niels|editor2-first=Ping W|editor2-last=Wong|editor1-first=Edward J|editor1-last=Delp Iii|date=2004-06-22|title=Towards fraud-proof ID documents using multiple data hiding technologies and biometrics|journal=Security, Steganography, and Watermarking of Multimedia Contents VI|volume=5306|pages=416|publisher=SPIE|doi=10.1117/12.525446|bibcode=2004SPIE.5306..416P|s2cid=15931951}}&lt;/ref&gt; as the algorithm for generating CDPs can be public as long as the key used to generate it or the digital CDP is not revealed.&lt;ref name=":3"&gt;{{Cite journal|last=Picard|first=Justin|date=2008|title=Copy Detectable Images: From Theory to Practice|url=https://www.researchgate.net/publication/341030602|journal=Conference on Optical Security and Counterfeit Deterrence 2008|volume=1|pages=372–381|via=Reconnaissance International}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>CDPs have also been described as a type of optical [[physical unclonable function]].&lt;ref name=":2" /&gt; While they have been cited as a "powerful tool to detect copies",&lt;ref&gt;{{cite journal|url=https://ieeexplore.ieee.org/document/6403957 |title=Copy detection pattern-based document protection for variable media |date=November 2012 |last1=Dirik |first1=Ahmet Emir |last2=Haas |first2=Bertrand |journal=IET Image Processing |volume=6 |issue=8 |pages=1102–1113 |doi=10.1049/iet-ipr.2012.0297 |issn=1751-9667 |access-date=12 August 2020}}&lt;/ref&gt; it is noted however that CDPs "require an extensive knowledge of printing technologies"&lt;ref name=":4"&gt;{{Cite book|url=https://www.worldcat.org/oclc/847355368|title=Vision and challenges for realising the Internet of things|date=2010|publisher=EUR-OP|others=Sundmaeker, Harald., Guillemin, Patrick., Friess, Peter., Woelfflé, Sylvie., European Commission. Directorate-General for the Information Society and Media.|isbn=978-92-79-15088-3|location=Luxembourg|oclc=847355368}}&lt;/ref&gt; because the printing process introduces variation that is foundational to copy detection.[[File:Cdp digital original copy.png|thumb|660x660px|A '''digital CDP''' (100x100 pixel binary image) is printed at 600 pixels per inch (ppi) on a Canon C6045 laser printer. The '''original CDP''' real image size is 4.2mm x 4.2mm. This original CDP was scanned at 2400 ppi with a CanoScan 9000F flatbed scanner. The scan was processed with GIMP for image restoration, then printed on the same Canon C6045 laser printer. The copied CDP real image size is also 4.2mm x 4.2mm. Comparison of the original and copied CDP reveals a loss of details in the latter.|alt=|none]]</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>CDPs have also been described as a type of optical [[physical unclonable function]].&lt;ref name=":2" /&gt; While they have been cited as a "powerful tool to detect copies",&lt;ref&gt;{{cite journal|url=https://ieeexplore.ieee.org/document/6403957 |title=Copy detection pattern-based document protection for variable media |date=November 2012 |last1=Dirik |first1=Ahmet Emir |last2=Haas |first2=Bertrand |journal=IET Image Processing |volume=6 |issue=8 |pages=1102–1113 |doi=10.1049/iet-ipr.2012.0297 |issn=1751-9667 |access-date=12 August 2020<ins style="font-weight: bold; text-decoration: none;">}}{{dead link|date=July 2024|bot=medic}}{{cbignore|bot=medic</ins>}}&lt;/ref&gt; it is noted however that CDPs "require an extensive knowledge of printing technologies"&lt;ref name=":4"&gt;{{Cite book|url=https://www.worldcat.org/oclc/847355368|title=Vision and challenges for realising the Internet of things|date=2010|publisher=EUR-OP|others=Sundmaeker, Harald., Guillemin, Patrick., Friess, Peter., Woelfflé, Sylvie., European Commission. Directorate-General for the Information Society and Media.|isbn=978-92-79-15088-3|location=Luxembourg|oclc=847355368}}&lt;/ref&gt; because the printing process introduces variation that is foundational to copy detection.[[File:Cdp digital original copy.png|thumb|660x660px|A '''digital CDP''' (100x100 pixel binary image) is printed at 600 pixels per inch (ppi) on a Canon C6045 laser printer. The '''original CDP''' real image size is 4.2mm x 4.2mm. This original CDP was scanned at 2400 ppi with a CanoScan 9000F flatbed scanner. The scan was processed with GIMP for image restoration, then printed on the same Canon C6045 laser printer. The copied CDP real image size is also 4.2mm x 4.2mm. Comparison of the original and copied CDP reveals a loss of details in the latter.|alt=|none]]</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Security assessment ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Security assessment ==</div></td> </tr> </table> GreenC bot https://en.wikipedia.org/w/index.php?title=Copy_detection_pattern&diff=1197476086&oldid=prev BD2412: /* Security assessment */clean up spacing around commas and other punctuation fixes, replaced: ,R → , R 2024-01-20T17:43:45Z <p><span class="autocomment">Security assessment: </span>clean up spacing around commas and other punctuation fixes, replaced: ,R → , R</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 17:43, 20 January 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 20:</td> <td colspan="2" class="diff-lineno">Line 20:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* In,&lt;ref&gt;{{Cite book|last1=Voloshynovskiy|first1=Slava|last2=Holotyak|first2=Taras|last3=Bas|first3=Patrick|title=2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) |chapter=Physical object authentication: Detection-theoretic comparison of natural and artificial randomness |date=2016-03-01|chapter-url=http://sip.unige.ch/articles/2016/2016.ICASSP.Final.PUF.pdf|publisher=IEEE|pages=2029–2033|doi=10.1109/icassp.2016.7472033|isbn=978-1-4799-9988-0|s2cid=10331654|url=https://hal.archives-ouvertes.fr/hal-01283068/file/2016.ICASSP.Randomness9.pdf }}&lt;/ref&gt; a theoretical comparison is made between the performance of CDPs and natural randomness.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* In,&lt;ref&gt;{{Cite book|last1=Voloshynovskiy|first1=Slava|last2=Holotyak|first2=Taras|last3=Bas|first3=Patrick|title=2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) |chapter=Physical object authentication: Detection-theoretic comparison of natural and artificial randomness |date=2016-03-01|chapter-url=http://sip.unige.ch/articles/2016/2016.ICASSP.Final.PUF.pdf|publisher=IEEE|pages=2029–2033|doi=10.1109/icassp.2016.7472033|isbn=978-1-4799-9988-0|s2cid=10331654|url=https://hal.archives-ouvertes.fr/hal-01283068/file/2016.ICASSP.Randomness9.pdf }}&lt;/ref&gt; a theoretical comparison is made between the performance of CDPs and natural randomness.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* In &lt;ref&gt;{{cite arXiv|last1=Taran|first1=Olga|last2=Bonev|first2=Slavi|last3=Voloshynovskiy|first3=Slava|date=2019-03-18|title=Clonability of anti-counterfeiting printable graphical codes: a machine learning approach|class=cs.CR|eprint=1903.07359}}&lt;/ref&gt; and,&lt;ref&gt;{{Cite book|last1=Yadav|first1=Rohit|last2=Tkachenko|first2=Iuliia|last3=Trémeau|first3=Alain|last4=Fournel|first4=Thierry|title=Proceedings of the ACM Workshop on Information Hiding and Multimedia Security |chapter=Estimation of Copy-sensitive Codes Using a Neural Approach |date=2019|pages=77–82|location=New York, New York, USA|publisher=ACM Press|doi=10.1145/3335203.3335718|isbn=978-1-4503-6821-6|s2cid=195848782|chapter-url=https://hal.archives-ouvertes.fr/hal-02330988/file/IH_MMSec_2019_final.pdf}}&lt;/ref&gt; deep learning methods are used to recover portions of the digital CDP, and it is shown that these can be used to launch clonability attacks.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* In &lt;ref&gt;{{cite arXiv|last1=Taran|first1=Olga|last2=Bonev|first2=Slavi|last3=Voloshynovskiy|first3=Slava|date=2019-03-18|title=Clonability of anti-counterfeiting printable graphical codes: a machine learning approach|class=cs.CR|eprint=1903.07359}}&lt;/ref&gt; and,&lt;ref&gt;{{Cite book|last1=Yadav|first1=Rohit|last2=Tkachenko|first2=Iuliia|last3=Trémeau|first3=Alain|last4=Fournel|first4=Thierry|title=Proceedings of the ACM Workshop on Information Hiding and Multimedia Security |chapter=Estimation of Copy-sensitive Codes Using a Neural Approach |date=2019|pages=77–82|location=New York, New York, USA|publisher=ACM Press|doi=10.1145/3335203.3335718|isbn=978-1-4503-6821-6|s2cid=195848782|chapter-url=https://hal.archives-ouvertes.fr/hal-02330988/file/IH_MMSec_2019_final.pdf}}&lt;/ref&gt; deep learning methods are used to recover portions of the digital CDP, and it is shown that these can be used to launch clonability attacks.</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>*In,&lt;ref&gt;Picard, Justin; Khatri, Nick; 100% Inline Verification of Secure Graphics at High Resolution; 2019-05-15; ''Digital Document Security'';<del style="font-weight: bold; text-decoration: none;">,</del>Reconnaissance International&lt;/ref&gt; quality control challenges are reviewed, and an inline verification system of secure graphics is proposed for high security printing applications.</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>*In,&lt;ref&gt;Picard, Justin; Khatri, Nick; 100% Inline Verification of Secure Graphics at High Resolution; 2019-05-15; ''Digital Document Security'';<ins style="font-weight: bold; text-decoration: none;"> </ins>Reconnaissance International&lt;/ref&gt; quality control challenges are reviewed, and an inline verification system of secure graphics is proposed for high security printing applications.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*In,&lt;ref&gt;{{Cite book|last1=Zhang|first1=Pei|last2=Zhang|first2=Weiming|last3=Yu|first3=Nenghai|title=2019 7th International Conference on Information, Communication and Networks (ICICN) |chapter=Copy Detection Pattern-Based Authentication for Printed Documents with Multi-Dimensional Features |date=April 2019|pages=150–157|publisher=IEEE|doi=10.1109/icicn.2019.8834939|isbn=978-1-7281-0425-6|s2cid=202561547}}&lt;/ref&gt; different attack methods based on restoration of the scanned CDP are tested. and show that a classifier based on support vector domain description outperforms other classification methods.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*In,&lt;ref&gt;{{Cite book|last1=Zhang|first1=Pei|last2=Zhang|first2=Weiming|last3=Yu|first3=Nenghai|title=2019 7th International Conference on Information, Communication and Networks (ICICN) |chapter=Copy Detection Pattern-Based Authentication for Printed Documents with Multi-Dimensional Features |date=April 2019|pages=150–157|publisher=IEEE|doi=10.1109/icicn.2019.8834939|isbn=978-1-7281-0425-6|s2cid=202561547}}&lt;/ref&gt; different attack methods based on restoration of the scanned CDP are tested. and show that a classifier based on support vector domain description outperforms other classification methods.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> </table> BD2412 https://en.wikipedia.org/w/index.php?title=Copy_detection_pattern&diff=1193527051&oldid=prev OAbot: Open access bot: hdl updated in citation with #oabot. 2024-01-04T07:49:14Z <p><a href="/wiki/Wikipedia:OABOT" class="mw-redirect" title="Wikipedia:OABOT">Open access bot</a>: hdl updated in citation with #oabot.</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 07:49, 4 January 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 1:</td> <td colspan="2" class="diff-lineno">Line 1:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>{{Short description|Counterfeit detection}}</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>{{Short description|Counterfeit detection}}</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>{{COI|date=June 2020}}</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>{{COI|date=June 2020}}</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>A '''copy detection pattern (CDP)'''&lt;ref name=":0"&gt;{{Cite journal|last=Picard|first=Justin|date=2004-06-03|editor1-last=Van Renesse|editor1-first=Rudolf L|title=Digital authentication with copy-detection patterns|url=https://www.researchgate.net/publication/253088312|journal=Optical Security and Counterfeit Deterrence Techniques V|publisher=SPIE|volume=5310|pages=176|bibcode=2004SPIE.5310..176P|doi=10.1117/12.528055|s2cid=58492104}}&lt;/ref&gt; or '''graphical code'''&lt;ref name=":2"&gt;{{Cite journal|last1=Phan Ho|first1=Anh Thu|last2=Mai Hoang|first2=Bao An|last3=Sawaya|first3=Wadih|last4=Bas|first4=Patrick|date=2014-06-05|title=Document authentication using graphical codes: reliable performance analysis and channel optimization|url=https://www.researchgate.net/publication/270463004|journal=EURASIP Journal on Information Security|language=en|volume=2014|issue=1|pages=9|doi=10.1186/1687-417X-2014-9|issn=1687-417X|doi-access=free}}&lt;/ref&gt;&lt;ref&gt;{{Cite journal|last1=Tkachenko|first1=Iuliia|last2=Puech|first2=William|last3=Destruel|first3=Christophe|last4=Strauss|first4=Olivier|last5=Gaudin|first5=Jean-Marc|last6=Guichard|first6=Christian|date=2016-03-01|title=Two-Level QR Code for Private Message Sharing and Document Authentication|journal=IEEE Transactions on Information Forensics and Security|volume=11|issue=3|pages=571–583|doi=10.1109/TIFS.2015.2506546|s2cid=9465424|issn=1556-6021}}&lt;/ref&gt; is a small [[Randomness|random]] or [[Pseudorandomness|pseudo-random]] [[digital image]] which is printed on documents, labels or products for [[counterfeit]] detection. [[Authentication]] is made by scanning the printed CDP using an [[image scanner]] or [[mobile phone camera]].&lt;ref&gt;{{Cite book|url=http://www.unicri.it/sites/default/files/2021-07/Technology%20and%20Security%20Countering%20Criminal%20Infiltrations%20in%20the%20Legitimate%20Supply%20Chain_1.pdf|title=Technology and Security: Countering Criminal Infiltrations in the Legitimate Supply Chain|publisher=[[United Nations Interregional Crime and Justice Research Institute]]|year=2021}}&lt;/ref&gt; It is possible to store additional product-specific data into the CDP that will be decoded during the scanning process.&lt;ref&gt;{{Cite book|last=Abele, Eberhard.|url=https://www.worldcat.org/oclc/726826809|title=Schutz vor Produktpiraterie : ein Handbuch für den Maschinen- und Anlagenbau|date=2011|publisher=Springer|others=Ksuke, Philipp., Lang, Horst.|isbn=978-3-642-19280-7|location=Berlin|pages=|trans-title=Protection against product piracy: A handbook for the mechanical and plant engineering industry|oclc=726826809}}&lt;/ref&gt; A CDP can also be inserted into a [[2D barcode]] to facilitate smartphone authentication and to connect with traceability data.&lt;ref&gt;{{Cite book|url=https://euipo.europa.eu/ohimportal/en/web/observatory/news/-/action/view/8550135|title=EUIPO Anti-Counterfeiting Technology Guide|publisher=European Observatory on Infringements of Intellectual Property Rights|year=2021}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>A '''copy detection pattern (CDP)'''&lt;ref name=":0"&gt;{{Cite journal|last=Picard|first=Justin|date=2004-06-03|editor1-last=Van Renesse|editor1-first=Rudolf L|title=Digital authentication with copy-detection patterns|url=https://www.researchgate.net/publication/253088312|journal=Optical Security and Counterfeit Deterrence Techniques V|publisher=SPIE|volume=5310|pages=176|bibcode=2004SPIE.5310..176P|doi=10.1117/12.528055|s2cid=58492104}}&lt;/ref&gt; or '''graphical code'''&lt;ref name=":2"&gt;{{Cite journal|last1=Phan Ho|first1=Anh Thu|last2=Mai Hoang|first2=Bao An|last3=Sawaya|first3=Wadih|last4=Bas|first4=Patrick|date=2014-06-05|title=Document authentication using graphical codes: reliable performance analysis and channel optimization|url=https://www.researchgate.net/publication/270463004|journal=EURASIP Journal on Information Security|language=en|volume=2014|issue=1|pages=9|doi=10.1186/1687-417X-2014-9|issn=1687-417X|doi<ins style="font-weight: bold; text-decoration: none;">-access=free|hdl=20.500.12210/25915|hdl</ins>-access=free}}&lt;/ref&gt;&lt;ref&gt;{{Cite journal|last1=Tkachenko|first1=Iuliia|last2=Puech|first2=William|last3=Destruel|first3=Christophe|last4=Strauss|first4=Olivier|last5=Gaudin|first5=Jean-Marc|last6=Guichard|first6=Christian|date=2016-03-01|title=Two-Level QR Code for Private Message Sharing and Document Authentication|journal=IEEE Transactions on Information Forensics and Security|volume=11|issue=3|pages=571–583|doi=10.1109/TIFS.2015.2506546|s2cid=9465424|issn=1556-6021}}&lt;/ref&gt; is a small [[Randomness|random]] or [[Pseudorandomness|pseudo-random]] [[digital image]] which is printed on documents, labels or products for [[counterfeit]] detection. [[Authentication]] is made by scanning the printed CDP using an [[image scanner]] or [[mobile phone camera]].&lt;ref&gt;{{Cite book|url=http://www.unicri.it/sites/default/files/2021-07/Technology%20and%20Security%20Countering%20Criminal%20Infiltrations%20in%20the%20Legitimate%20Supply%20Chain_1.pdf|title=Technology and Security: Countering Criminal Infiltrations in the Legitimate Supply Chain|publisher=[[United Nations Interregional Crime and Justice Research Institute]]|year=2021}}&lt;/ref&gt; It is possible to store additional product-specific data into the CDP that will be decoded during the scanning process.&lt;ref&gt;{{Cite book|last=Abele, Eberhard.|url=https://www.worldcat.org/oclc/726826809|title=Schutz vor Produktpiraterie : ein Handbuch für den Maschinen- und Anlagenbau|date=2011|publisher=Springer|others=Ksuke, Philipp., Lang, Horst.|isbn=978-3-642-19280-7|location=Berlin|pages=|trans-title=Protection against product piracy: A handbook for the mechanical and plant engineering industry|oclc=726826809}}&lt;/ref&gt; A CDP can also be inserted into a [[2D barcode]] to facilitate smartphone authentication and to connect with traceability data.&lt;ref&gt;{{Cite book|url=https://euipo.europa.eu/ohimportal/en/web/observatory/news/-/action/view/8550135|title=EUIPO Anti-Counterfeiting Technology Guide|publisher=European Observatory on Infringements of Intellectual Property Rights|year=2021}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Principle ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Principle ==</div></td> </tr> </table> OAbot https://en.wikipedia.org/w/index.php?title=Copy_detection_pattern&diff=1185319247&oldid=prev Citation bot: Add: bibcode. | Use this bot. Report bugs. | Suggested by Headbomb | Linked from Wikipedia:WikiProject_Academic_Journals/Journals_cited_by_Wikipedia/Sandbox | #UCB_webform_linked 695/1109 2023-11-15T23:43:12Z <p>Add: bibcode. | <a href="/wiki/Wikipedia:UCB" class="mw-redirect" title="Wikipedia:UCB">Use this bot</a>. <a href="/wiki/Wikipedia:DBUG" class="mw-redirect" title="Wikipedia:DBUG">Report bugs</a>. | Suggested by Headbomb | Linked from Wikipedia:WikiProject_Academic_Journals/Journals_cited_by_Wikipedia/Sandbox | #UCB_webform_linked 695/1109</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 23:43, 15 November 2023</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 35:</td> <td colspan="2" class="diff-lineno">Line 35:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>[[EURion constellation|The EURion constellation]] and [[digital watermarks]] are inserted into banknotes to be detected by scanners, photocopiers and image processing software. However the objective of these techniques is not to detect whether a given banknote is a counterfeit, but to deter amateur counterfeiters from reproducing banknotes by blocking the device or software used to make the counterfeit.&lt;ref&gt;{{Cite web|url=https://murdoch.is/projects/currency/|title=Software Detection of Currency // Dr Steven J. Murdoch|website=murdoch.is|access-date=2020-04-23}}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>[[EURion constellation|The EURion constellation]] and [[digital watermarks]] are inserted into banknotes to be detected by scanners, photocopiers and image processing software. However the objective of these techniques is not to detect whether a given banknote is a counterfeit, but to deter amateur counterfeiters from reproducing banknotes by blocking the device or software used to make the counterfeit.&lt;ref&gt;{{Cite web|url=https://murdoch.is/projects/currency/|title=Software Detection of Currency // Dr Steven J. Murdoch|website=murdoch.is|access-date=2020-04-23}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Digital watermarks may be used as well to differentiate original prints from counterfeits.&lt;ref&gt;{{Cite journal|last1=Mahmoud|first1=Khaled W.|last2=Blackledge|first2=Jonathon M.|last3=Datta|first3=Sekharjit|last4=Flint|first4=James A.|editor2-first=Ping W.|editor2-last=Wong|editor1-first=Edward J.|editor1-last=Delp Iii|date=2004-06-22|title=Print protection using high-frequency fractal noise|journal=Security, Steganography, and Watermarking of Multimedia Contents VI|volume=5306|pages=446|publisher=SPIE|doi=10.1117/12.526677|bibcode=2004SPIE.5306..446M|s2cid=46155853}}&lt;/ref&gt;&lt;ref&gt;{{Cite book|last1=Zhou|first1=Jifeng|last2=Pang|first2=Mingyong|title=2010 2nd IEEE International Conference on Network Infrastructure and Digital Content |chapter=Digital watermark for printed materials |date=September 2010|pages=758–762|publisher=IEEE|doi=10.1109/icnidc.2010.5657884|isbn=978-1-4244-6851-5|s2cid=16587568}}&lt;/ref&gt; A digital watermark may also be inserted into a 2D barcode.&lt;ref&gt;{{Cite journal|last1=Nguyen|first1=Hoai Phuong|last2=Retraint|first2=Florent|last3=Morain-Nicolier|first3=Frédéric|last4=Delahaies|first4=Angès|date=2019|title=A Watermarking Technique to Secure Printed Matrix Barcode—Application for Anti-Counterfeit Packaging|journal=IEEE Access|volume=7|pages=131839–131850|doi=10.1109/ACCESS.2019.2937465|issn=2169-3536|doi-access=free}}&lt;/ref&gt; The fundamental difference between digital watermarks and CDPs is that a digital watermark must be embedded into an existing image while respecting a fidelity constraint, while the CDP does not have such constraint.&lt;ref&gt;{{Cite book|date=2005|editor-last=Barni|editor-first=Mauro|editor2-last=Cox|editor2-first=Ingemar|editor3-last=Kalker|editor3-first=Ton|editor4-last=Kim|editor4-first=Hyoung-Joong|title=Digital Watermarking|volume=3710|language=en-gb|doi=10.1007/11551492|isbn=978-3-540-28768-1|issn=0302-9743 |series=Lecture Notes in Computer Science }}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Digital watermarks may be used as well to differentiate original prints from counterfeits.&lt;ref&gt;{{Cite journal|last1=Mahmoud|first1=Khaled W.|last2=Blackledge|first2=Jonathon M.|last3=Datta|first3=Sekharjit|last4=Flint|first4=James A.|editor2-first=Ping W.|editor2-last=Wong|editor1-first=Edward J.|editor1-last=Delp Iii|date=2004-06-22|title=Print protection using high-frequency fractal noise|journal=Security, Steganography, and Watermarking of Multimedia Contents VI|volume=5306|pages=446|publisher=SPIE|doi=10.1117/12.526677|bibcode=2004SPIE.5306..446M|s2cid=46155853}}&lt;/ref&gt;&lt;ref&gt;{{Cite book|last1=Zhou|first1=Jifeng|last2=Pang|first2=Mingyong|title=2010 2nd IEEE International Conference on Network Infrastructure and Digital Content |chapter=Digital watermark for printed materials |date=September 2010|pages=758–762|publisher=IEEE|doi=10.1109/icnidc.2010.5657884|isbn=978-1-4244-6851-5|s2cid=16587568}}&lt;/ref&gt; A digital watermark may also be inserted into a 2D barcode.&lt;ref&gt;{{Cite journal|last1=Nguyen|first1=Hoai Phuong|last2=Retraint|first2=Florent|last3=Morain-Nicolier|first3=Frédéric|last4=Delahaies|first4=Angès|date=2019|title=A Watermarking Technique to Secure Printed Matrix Barcode—Application for Anti-Counterfeit Packaging|journal=IEEE Access|volume=7|pages=131839–131850|doi=10.1109/ACCESS.2019.2937465<ins style="font-weight: bold; text-decoration: none;">|bibcode=2019IEEEA...7m1839N </ins>|issn=2169-3536|doi-access=free}}&lt;/ref&gt; The fundamental difference between digital watermarks and CDPs is that a digital watermark must be embedded into an existing image while respecting a fidelity constraint, while the CDP does not have such constraint.&lt;ref&gt;{{Cite book|date=2005|editor-last=Barni|editor-first=Mauro|editor2-last=Cox|editor2-first=Ingemar|editor3-last=Kalker|editor3-first=Ton|editor4-last=Kim|editor4-first=Hyoung-Joong|title=Digital Watermarking|volume=3710|language=en-gb|doi=10.1007/11551492|isbn=978-3-540-28768-1|issn=0302-9743 |series=Lecture Notes in Computer Science }}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== References ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== References ==</div></td> </tr> </table> Citation bot https://en.wikipedia.org/w/index.php?title=Copy_detection_pattern&diff=1171668118&oldid=prev Citation bot: Alter: template type. Add: series. Removed parameters. | Use this bot. Report bugs. | Suggested by Headbomb | #UCB_toolbar 2023-08-22T15:03:54Z <p>Alter: template type. Add: series. Removed parameters. | <a href="/wiki/Wikipedia:UCB" class="mw-redirect" title="Wikipedia:UCB">Use this bot</a>. <a href="/wiki/Wikipedia:DBUG" class="mw-redirect" title="Wikipedia:DBUG">Report bugs</a>. | Suggested by Headbomb | #UCB_toolbar</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 15:03, 22 August 2023</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 35:</td> <td colspan="2" class="diff-lineno">Line 35:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>[[EURion constellation|The EURion constellation]] and [[digital watermarks]] are inserted into banknotes to be detected by scanners, photocopiers and image processing software. However the objective of these techniques is not to detect whether a given banknote is a counterfeit, but to deter amateur counterfeiters from reproducing banknotes by blocking the device or software used to make the counterfeit.&lt;ref&gt;{{Cite web|url=https://murdoch.is/projects/currency/|title=Software Detection of Currency // Dr Steven J. Murdoch|website=murdoch.is|access-date=2020-04-23}}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>[[EURion constellation|The EURion constellation]] and [[digital watermarks]] are inserted into banknotes to be detected by scanners, photocopiers and image processing software. However the objective of these techniques is not to detect whether a given banknote is a counterfeit, but to deter amateur counterfeiters from reproducing banknotes by blocking the device or software used to make the counterfeit.&lt;ref&gt;{{Cite web|url=https://murdoch.is/projects/currency/|title=Software Detection of Currency // Dr Steven J. Murdoch|website=murdoch.is|access-date=2020-04-23}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Digital watermarks may be used as well to differentiate original prints from counterfeits.&lt;ref&gt;{{Cite journal|last1=Mahmoud|first1=Khaled W.|last2=Blackledge|first2=Jonathon M.|last3=Datta|first3=Sekharjit|last4=Flint|first4=James A.|editor2-first=Ping W.|editor2-last=Wong|editor1-first=Edward J.|editor1-last=Delp Iii|date=2004-06-22|title=Print protection using high-frequency fractal noise|journal=Security, Steganography, and Watermarking of Multimedia Contents VI|volume=5306|pages=446|publisher=SPIE|doi=10.1117/12.526677|bibcode=2004SPIE.5306..446M|s2cid=46155853}}&lt;/ref&gt;&lt;ref&gt;{{Cite book|last1=Zhou|first1=Jifeng|last2=Pang|first2=Mingyong|title=2010 2nd IEEE International Conference on Network Infrastructure and Digital Content |chapter=Digital watermark for printed materials |date=September 2010|pages=758–762|publisher=IEEE|doi=10.1109/icnidc.2010.5657884|isbn=978-1-4244-6851-5|s2cid=16587568}}&lt;/ref&gt; A digital watermark may also be inserted into a 2D barcode.&lt;ref&gt;{{Cite journal|last1=Nguyen|first1=Hoai Phuong|last2=Retraint|first2=Florent|last3=Morain-Nicolier|first3=Frédéric|last4=Delahaies|first4=Angès|date=2019|title=A Watermarking Technique to Secure Printed Matrix Barcode—Application for Anti-Counterfeit Packaging|journal=IEEE Access|volume=7|pages=131839–131850|doi=10.1109/ACCESS.2019.2937465|issn=2169-3536|doi-access=free}}&lt;/ref&gt; The fundamental difference between digital watermarks and CDPs is that a digital watermark must be embedded into an existing image while respecting a fidelity constraint, while the CDP does not have such constraint.&lt;ref&gt;{{Cite <del style="font-weight: bold; text-decoration: none;">journal</del>|date=2005|editor-last=Barni|editor-first=Mauro|editor2-last=Cox|editor2-first=Ingemar|editor3-last=Kalker|editor3-first=Ton|editor4-last=Kim|editor4-first=Hyoung-Joong|title=Digital Watermarking<del style="font-weight: bold; text-decoration: none;">|journal=Lecture Notes in Computer Science</del>|volume=3710|language=en-gb|doi=10.1007/11551492|isbn=978-3-540-28768-1|issn=0302-9743}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Digital watermarks may be used as well to differentiate original prints from counterfeits.&lt;ref&gt;{{Cite journal|last1=Mahmoud|first1=Khaled W.|last2=Blackledge|first2=Jonathon M.|last3=Datta|first3=Sekharjit|last4=Flint|first4=James A.|editor2-first=Ping W.|editor2-last=Wong|editor1-first=Edward J.|editor1-last=Delp Iii|date=2004-06-22|title=Print protection using high-frequency fractal noise|journal=Security, Steganography, and Watermarking of Multimedia Contents VI|volume=5306|pages=446|publisher=SPIE|doi=10.1117/12.526677|bibcode=2004SPIE.5306..446M|s2cid=46155853}}&lt;/ref&gt;&lt;ref&gt;{{Cite book|last1=Zhou|first1=Jifeng|last2=Pang|first2=Mingyong|title=2010 2nd IEEE International Conference on Network Infrastructure and Digital Content |chapter=Digital watermark for printed materials |date=September 2010|pages=758–762|publisher=IEEE|doi=10.1109/icnidc.2010.5657884|isbn=978-1-4244-6851-5|s2cid=16587568}}&lt;/ref&gt; A digital watermark may also be inserted into a 2D barcode.&lt;ref&gt;{{Cite journal|last1=Nguyen|first1=Hoai Phuong|last2=Retraint|first2=Florent|last3=Morain-Nicolier|first3=Frédéric|last4=Delahaies|first4=Angès|date=2019|title=A Watermarking Technique to Secure Printed Matrix Barcode—Application for Anti-Counterfeit Packaging|journal=IEEE Access|volume=7|pages=131839–131850|doi=10.1109/ACCESS.2019.2937465|issn=2169-3536|doi-access=free}}&lt;/ref&gt; The fundamental difference between digital watermarks and CDPs is that a digital watermark must be embedded into an existing image while respecting a fidelity constraint, while the CDP does not have such constraint.&lt;ref&gt;{{Cite <ins style="font-weight: bold; text-decoration: none;">book</ins>|date=2005|editor-last=Barni|editor-first=Mauro|editor2-last=Cox|editor2-first=Ingemar|editor3-last=Kalker|editor3-first=Ton|editor4-last=Kim|editor4-first=Hyoung-Joong|title=Digital Watermarking|volume=3710|language=en-gb|doi=10.1007/11551492|isbn=978-3-540-28768-1|issn=0302-9743<ins style="font-weight: bold; text-decoration: none;"> |series=Lecture Notes in Computer Science </ins>}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== References ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== References ==</div></td> </tr> </table> Citation bot https://en.wikipedia.org/w/index.php?title=Copy_detection_pattern&diff=1169013816&oldid=prev Citation bot: Alter: title, template type. Add: chapter-url, chapter. Removed or converted URL. Removed parameters. Some additions/deletions were parameter name changes. | Use this bot. Report bugs. | Suggested by Headbomb | Linked from Wikipedia:WikiProject_Academic_Journals/Journals_cited_by_Wikipedia/Sandbox3 | #UCB_webform_linked 424/2306 2023-08-06T14:03:19Z <p>Alter: title, template type. Add: chapter-url, chapter. Removed or converted URL. Removed parameters. Some additions/deletions were parameter name changes. | <a href="/wiki/Wikipedia:UCB" class="mw-redirect" title="Wikipedia:UCB">Use this bot</a>. <a href="/wiki/Wikipedia:DBUG" class="mw-redirect" title="Wikipedia:DBUG">Report bugs</a>. | Suggested by Headbomb | Linked from Wikipedia:WikiProject_Academic_Journals/Journals_cited_by_Wikipedia/Sandbox3 | #UCB_webform_linked 424/2306</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 14:03, 6 August 2023</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 19:</td> <td colspan="2" class="diff-lineno">Line 19:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*In,&lt;ref&gt;{{Cite journal|last1=Baras|first1=Cleo|last2=Cayre|first2=François|date=2012-08-01|title=2D bar-codes for authentication: A security approach|url=https://ieeexplore.ieee.org/document/6334191|journal=2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO)|pages=1760–1766}}&lt;/ref&gt; the impact of multiple printed observations of the same CDP is studied, and it is shown that the noise due to the printing process can be reduced but not completely removed, due to deterministic printing artefacts.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*In,&lt;ref&gt;{{Cite journal|last1=Baras|first1=Cleo|last2=Cayre|first2=François|date=2012-08-01|title=2D bar-codes for authentication: A security approach|url=https://ieeexplore.ieee.org/document/6334191|journal=2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO)|pages=1760–1766}}&lt;/ref&gt; the impact of multiple printed observations of the same CDP is studied, and it is shown that the noise due to the printing process can be reduced but not completely removed, due to deterministic printing artefacts.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* In,&lt;ref&gt;{{Cite book|last1=Voloshynovskiy|first1=Slava|last2=Holotyak|first2=Taras|last3=Bas|first3=Patrick|title=2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) |chapter=Physical object authentication: Detection-theoretic comparison of natural and artificial randomness |date=2016-03-01|chapter-url=http://sip.unige.ch/articles/2016/2016.ICASSP.Final.PUF.pdf|publisher=IEEE|pages=2029–2033|doi=10.1109/icassp.2016.7472033|isbn=978-1-4799-9988-0|s2cid=10331654|url=https://hal.archives-ouvertes.fr/hal-01283068/file/2016.ICASSP.Randomness9.pdf }}&lt;/ref&gt; a theoretical comparison is made between the performance of CDPs and natural randomness.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* In,&lt;ref&gt;{{Cite book|last1=Voloshynovskiy|first1=Slava|last2=Holotyak|first2=Taras|last3=Bas|first3=Patrick|title=2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) |chapter=Physical object authentication: Detection-theoretic comparison of natural and artificial randomness |date=2016-03-01|chapter-url=http://sip.unige.ch/articles/2016/2016.ICASSP.Final.PUF.pdf|publisher=IEEE|pages=2029–2033|doi=10.1109/icassp.2016.7472033|isbn=978-1-4799-9988-0|s2cid=10331654|url=https://hal.archives-ouvertes.fr/hal-01283068/file/2016.ICASSP.Randomness9.pdf }}&lt;/ref&gt; a theoretical comparison is made between the performance of CDPs and natural randomness.</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>* In &lt;ref&gt;{{cite arXiv|last1=Taran|first1=Olga|last2=Bonev|first2=Slavi|last3=Voloshynovskiy|first3=Slava|date=2019-03-18|title=Clonability of anti-counterfeiting printable graphical codes: a machine learning approach|class=cs.CR|eprint=1903.07359}}&lt;/ref&gt; and,&lt;ref&gt;{{Cite <del style="font-weight: bold; text-decoration: none;">journal</del>|last1=Yadav|first1=Rohit|last2=Tkachenko|first2=Iuliia|last3=Trémeau|first3=Alain|last4=Fournel|first4=Thierry<del style="font-weight: bold; text-decoration: none;">|date=2019</del>|title<del style="font-weight: bold; text-decoration: none;">=Estimation of Copy-sensitive Codes Using a Neural Approach|journal</del>=Proceedings of the ACM Workshop on Information Hiding and Multimedia Security - <del style="font-weight: bold; text-decoration: none;">IH&amp;MMSec'19</del>|pages=77–82|location=New York, New York, USA|publisher=ACM Press|doi=10.1145/3335203.3335718|isbn=978-1-4503-6821-6|s2cid=195848782|url=https://hal.archives-ouvertes.fr/hal-02330988/file/IH_MMSec_2019_final.pdf}}&lt;/ref&gt; deep learning methods are used to recover portions of the digital CDP, and it is shown that these can be used to launch clonability attacks.</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>* In &lt;ref&gt;{{cite arXiv|last1=Taran|first1=Olga|last2=Bonev|first2=Slavi|last3=Voloshynovskiy|first3=Slava|date=2019-03-18|title=Clonability of anti-counterfeiting printable graphical codes: a machine learning approach|class=cs.CR|eprint=1903.07359}}&lt;/ref&gt; and,&lt;ref&gt;{{Cite <ins style="font-weight: bold; text-decoration: none;">book</ins>|last1=Yadav|first1=Rohit|last2=Tkachenko|first2=Iuliia|last3=Trémeau|first3=Alain|last4=Fournel|first4=Thierry|title=Proceedings of the ACM Workshop on Information Hiding and Multimedia Security <ins style="font-weight: bold; text-decoration: none;">|chapter=Estimation of Copy</ins>-<ins style="font-weight: bold; text-decoration: none;">sensitive Codes Using a Neural Approach</ins> <ins style="font-weight: bold; text-decoration: none;">|date=2019</ins>|pages=77–82|location=New York, New York, USA|publisher=ACM Press|doi=10.1145/3335203.3335718|isbn=978-1-4503-6821-6|s2cid=195848782|<ins style="font-weight: bold; text-decoration: none;">chapter-</ins>url=https://hal.archives-ouvertes.fr/hal-02330988/file/IH_MMSec_2019_final.pdf}}&lt;/ref&gt; deep learning methods are used to recover portions of the digital CDP, and it is shown that these can be used to launch clonability attacks.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*In,&lt;ref&gt;Picard, Justin; Khatri, Nick; 100% Inline Verification of Secure Graphics at High Resolution; 2019-05-15; ''Digital Document Security'';,Reconnaissance International&lt;/ref&gt; quality control challenges are reviewed, and an inline verification system of secure graphics is proposed for high security printing applications.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*In,&lt;ref&gt;Picard, Justin; Khatri, Nick; 100% Inline Verification of Secure Graphics at High Resolution; 2019-05-15; ''Digital Document Security'';,Reconnaissance International&lt;/ref&gt; quality control challenges are reviewed, and an inline verification system of secure graphics is proposed for high security printing applications.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*In,&lt;ref&gt;{{Cite book|last1=Zhang|first1=Pei|last2=Zhang|first2=Weiming|last3=Yu|first3=Nenghai|title=2019 7th International Conference on Information, Communication and Networks (ICICN) |chapter=Copy Detection Pattern-Based Authentication for Printed Documents with Multi-Dimensional Features |date=April 2019|pages=150–157|publisher=IEEE|doi=10.1109/icicn.2019.8834939|isbn=978-1-7281-0425-6|s2cid=202561547}}&lt;/ref&gt; different attack methods based on restoration of the scanned CDP are tested. and show that a classifier based on support vector domain description outperforms other classification methods.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*In,&lt;ref&gt;{{Cite book|last1=Zhang|first1=Pei|last2=Zhang|first2=Weiming|last3=Yu|first3=Nenghai|title=2019 7th International Conference on Information, Communication and Networks (ICICN) |chapter=Copy Detection Pattern-Based Authentication for Printed Documents with Multi-Dimensional Features |date=April 2019|pages=150–157|publisher=IEEE|doi=10.1109/icicn.2019.8834939|isbn=978-1-7281-0425-6|s2cid=202561547}}&lt;/ref&gt; different attack methods based on restoration of the scanned CDP are tested. and show that a classifier based on support vector domain description outperforms other classification methods.</div></td> </tr> </table> Citation bot