International audienceCopy sensitive graphical codes are used as anti-counterfeiting solution in packaging and document protection. Their security is funded on a design hard-to-predict after print and scan. In practice there exist different designs. Here random codes printed at the printer resolution are considered. We suggest an estimation of such codes by using neural networks, an in-trend approach which has however not been studied yet in the present context. In this paper, we test a state-of-the-art architecture efficient in the binarization of handwritten characters. The results show that such an approach can be successfully used by an attacker to provide a valid counterfeited code so fool an authentication system.Les codes graphiques ...
International audienceThe authentication of printed documents is an important problem these days. Nu...
Six algorithms that design secrecy keys are used for digital image encryption. The privacy keys gene...
International audienceIn this paper, we investigate the authentication problem of real-world goods o...
International audienceCopy sensitive graphical codes are used as anti-counterfeiting solution in pac...
This paper addresses a problem of anti-counterfeiting of physical objects and aims at investigating ...
International audienceRecent papers point out the vulnerability of Copy Sensitive Graphical Codes (C...
Counterfeiting and piracy are among the main problems for modern society. Many traditional anti-coun...
International audienceGraphical codes resemble very much the well-known QR-codes, although they are ...
The popularity of printing devices has multiplied the diffusion of printed documents, raising concer...
International audienceThe difficulties of the signature authentication problem is linked to the high...
Nous étudions dans cette thèse l'influence d'un système d'authentification utilisant des codes graph...
Due to the development and availability of printing and scanning devices, the number of forged/count...
International audienceCounterfeited packaging products (Pharmaceuticals) can create severe health ha...
International audienceThe falsification of hardcopy documents is a common problem these days. Numero...
Impersonation and piracy of intellectual properties remain an indispensable problem across the globe...
International audienceThe authentication of printed documents is an important problem these days. Nu...
Six algorithms that design secrecy keys are used for digital image encryption. The privacy keys gene...
International audienceIn this paper, we investigate the authentication problem of real-world goods o...
International audienceCopy sensitive graphical codes are used as anti-counterfeiting solution in pac...
This paper addresses a problem of anti-counterfeiting of physical objects and aims at investigating ...
International audienceRecent papers point out the vulnerability of Copy Sensitive Graphical Codes (C...
Counterfeiting and piracy are among the main problems for modern society. Many traditional anti-coun...
International audienceGraphical codes resemble very much the well-known QR-codes, although they are ...
The popularity of printing devices has multiplied the diffusion of printed documents, raising concer...
International audienceThe difficulties of the signature authentication problem is linked to the high...
Nous étudions dans cette thèse l'influence d'un système d'authentification utilisant des codes graph...
Due to the development and availability of printing and scanning devices, the number of forged/count...
International audienceCounterfeited packaging products (Pharmaceuticals) can create severe health ha...
International audienceThe falsification of hardcopy documents is a common problem these days. Numero...
Impersonation and piracy of intellectual properties remain an indispensable problem across the globe...
International audienceThe authentication of printed documents is an important problem these days. Nu...
Six algorithms that design secrecy keys are used for digital image encryption. The privacy keys gene...
International audienceIn this paper, we investigate the authentication problem of real-world goods o...