2016
DOI: 10.1007/s11036-016-0721-9
|View full text |Cite
|
Sign up to set email alerts
|

An NFC Anti-Counterfeiting Framework for ID Verification and Image Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…NFC, such as past smart cards for e-tickets, allows mobile payments and supports financial systems. NFC-enabled devices can act as electronic IDs and key cards (Lee et al, 2016).…”
Section: Literature Reviewmentioning
confidence: 99%
“…NFC, such as past smart cards for e-tickets, allows mobile payments and supports financial systems. NFC-enabled devices can act as electronic IDs and key cards (Lee et al, 2016).…”
Section: Literature Reviewmentioning
confidence: 99%
“…RFID-based solutions in [5], [6], [7], [8] and NFC-based solutions in [9], [10], [11], [12] both require dedicated applications or authentication servers to integrate with these tags involved so as to perform writing, reading and validating features on the data stored in these tags with the product identifier (PID) and its metadata also stored in database system of applications for the purpose of validation at later stage to respond to any potential counterfeiting attack at different supply chain nodes. [13], [14] utilized simple barcode technology such as QR code to retrieve the product identifiers by scanning the products and querying corresponding records throughout the dedicated backend database systems to retrieve metadata of specific PIDs so as to prove the authenticity with the PIDs validated and detailed product data retrieved.…”
Section: Related Work Of Anti-counterfeiting and Traceability Systemsmentioning
confidence: 99%
“…They have special materials or unique formulations that not only cost a lot but also lose security once their information is leaked. Electronic identification anti-counterfeiting [ 13 ] commonly includes radio frequency, magnetic recording, integrated circuit cards, etc. These techniques work in conjunction with data management systems but they are not as generalizable as relying on specialized devices and are limited in application scenarios and scope.…”
Section: Introductionmentioning
confidence: 99%