1998
DOI: 10.1016/s0030-4018(97)00546-4
|View full text |Cite
|
Sign up to set email alerts
|

Optical detection of random features for high security applications

Abstract: Abstract-Optical detection of random features in combination with digital signatures based on public key codes in order to recognise counterfeit objects will be discussed. Without applying expensive production techniques objects are protected against counterfeiting. Verification is done offline by optical means without a central authority. The method is applied for protecting banknotes. Experimental results for this application are presented. The method is also applicable for identity verification of a credit-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2002
2002
2022
2022

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 11 publications
0
16
0
Order By: Relevance
“…Haist and Tiziani [36] proposed a method to fingerprint German banknotes by using a CCD digital camera to take a snapshot of a banknote based on transmissive light. Then, the snapshot is saved as a JPEG image (2.86 KB), which, along with a digital signature, is printed on the banknote as a string of 3250 ASCII characters on an area of 5 cm 2 .…”
Section: Related Workmentioning
confidence: 99%
“…Haist and Tiziani [36] proposed a method to fingerprint German banknotes by using a CCD digital camera to take a snapshot of a banknote based on transmissive light. Then, the snapshot is saved as a JPEG image (2.86 KB), which, along with a digital signature, is printed on the banknote as a string of 3250 ASCII characters on an area of 5 cm 2 .…”
Section: Related Workmentioning
confidence: 99%
“…Authentication can be performed for example by recording the random patterns of the fiber of a paper [3], but such a system is practically heavy to deploy since each product needs to be linked to its highdefinition capture stored in a database. Another solution is to rely on the degradation induced by the interaction between the product and a physical process such as printing, marking, embossing, carving, etc.…”
Section: Addressed Problem and Related Workmentioning
confidence: 99%
“…• In the main channel, i.e., when O N = Y N , error probabilities are equivalent to (2) and (3). http://jis.eurasipjournals.com/content/2014/1/9…”
Section: Binary Thresholdingmentioning
confidence: 99%
“…Authentication can be performed for example by recording the random patterns of the fiber of a paper [6], but such a system is practically heavy to deploy since each product needs to be linked to its high definition capture stored in a database. Another solution is to rely on the degradation induced by the interaction between the product and a physical process such as printing, marking, embossing, carving ... Because of both the defaults of the physical process and the stochastic nature of the mater, this interaction can be considered as a Physically Unclonable Function (PUF) [12] that cannot be reproduced by the forger and can consequently be used to perform authentication.…”
Section: Introductionmentioning
confidence: 99%