Digital Watermarking System for Hard Cover Objects Against Cloning Attacks
We consider an application of digital watermark system technique (WM) for hard carriers (paper or plastic cover objects in addition). Algorithms of watermark embedding and extraction are proposed and the corresponding error probabilities of the extracted bits both for informed and blind decoders are...
Guardado en:
Autores principales: | , , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
FRUCT
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/78200d0b5352425298eae7fac98825b9 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:78200d0b5352425298eae7fac98825b9 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:78200d0b5352425298eae7fac98825b92021-11-20T15:59:33ZDigital Watermarking System for Hard Cover Objects Against Cloning Attacks2305-72542343-073710.23919/FRUCT53335.2021.9599967https://doaj.org/article/78200d0b5352425298eae7fac98825b92021-10-01T00:00:00Zhttps://www.fruct.org/publications/fruct30/files/Kor.pdfhttps://doaj.org/toc/2305-7254https://doaj.org/toc/2343-0737We consider an application of digital watermark system technique (WM) for hard carriers (paper or plastic cover objects in addition). Algorithms of watermark embedding and extraction are proposed and the corresponding error probabilities of the extracted bits both for informed and blind decoders are presented. The spread spectrum signals used for embedding of WM are optimized on their parameters. Similar experimental results are presented for data matrices carriers depending on paper sizes of data matrix copies. A protection against so-called cloning attack is elaborated where certificates are copied by attack scanner or photo camera and next printed and fixed as forges. The formulas for a missing the cloning attack and false alarm probabilities are proved. A full-scale experiment with a real scanner and printer confirms that the reliability of cloning attack detection can be provided under appropriate selection of WM system parameters.Valery KorzhikVladimir StarostinVictor YakovlevDmitriy FlaksmanIvan BukshinBoris IzotovFRUCTarticledigital watermarkingremoval attackcloning attackscan and print noisesspread spectrum signalsTelecommunicationTK5101-6720ENProceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 30, Iss 1, Pp 79-85 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
digital watermarking removal attack cloning attack scan and print noises spread spectrum signals Telecommunication TK5101-6720 |
spellingShingle |
digital watermarking removal attack cloning attack scan and print noises spread spectrum signals Telecommunication TK5101-6720 Valery Korzhik Vladimir Starostin Victor Yakovlev Dmitriy Flaksman Ivan Bukshin Boris Izotov Digital Watermarking System for Hard Cover Objects Against Cloning Attacks |
description |
We consider an application of digital watermark system technique (WM) for hard carriers (paper or plastic cover objects in addition). Algorithms of watermark embedding and extraction are proposed and the corresponding error probabilities of the extracted bits both for informed and blind decoders are presented. The spread spectrum signals used for embedding of WM are optimized on their parameters. Similar experimental results are presented for data matrices carriers depending on paper sizes of data matrix copies. A protection against so-called cloning attack is elaborated where certificates are copied by attack scanner or photo camera and next printed and fixed as forges. The formulas for a missing the cloning attack and false alarm probabilities are proved. A full-scale experiment with a real scanner and printer confirms that the reliability of cloning attack detection can be provided under appropriate selection of WM system parameters. |
format |
article |
author |
Valery Korzhik Vladimir Starostin Victor Yakovlev Dmitriy Flaksman Ivan Bukshin Boris Izotov |
author_facet |
Valery Korzhik Vladimir Starostin Victor Yakovlev Dmitriy Flaksman Ivan Bukshin Boris Izotov |
author_sort |
Valery Korzhik |
title |
Digital Watermarking System for Hard Cover Objects Against Cloning Attacks |
title_short |
Digital Watermarking System for Hard Cover Objects Against Cloning Attacks |
title_full |
Digital Watermarking System for Hard Cover Objects Against Cloning Attacks |
title_fullStr |
Digital Watermarking System for Hard Cover Objects Against Cloning Attacks |
title_full_unstemmed |
Digital Watermarking System for Hard Cover Objects Against Cloning Attacks |
title_sort |
digital watermarking system for hard cover objects against cloning attacks |
publisher |
FRUCT |
publishDate |
2021 |
url |
https://doaj.org/article/78200d0b5352425298eae7fac98825b9 |
work_keys_str_mv |
AT valerykorzhik digitalwatermarkingsystemforhardcoverobjectsagainstcloningattacks AT vladimirstarostin digitalwatermarkingsystemforhardcoverobjectsagainstcloningattacks AT victoryakovlev digitalwatermarkingsystemforhardcoverobjectsagainstcloningattacks AT dmitriyflaksman digitalwatermarkingsystemforhardcoverobjectsagainstcloningattacks AT ivanbukshin digitalwatermarkingsystemforhardcoverobjectsagainstcloningattacks AT borisizotov digitalwatermarkingsystemforhardcoverobjectsagainstcloningattacks |
_version_ |
1718419432598929408 |