International audienceIn this paper, we compare two methods that can be used by the anti-counterfeiting industry to protect physical objects, which are either based on an object's natural randomness or on artificial randomness embedded on the object. We show that the considered verification architectures rely either on a comparison between an enrolled fingerprint and an extracted one or between a tag and a fingerprint. We compare these setups from detection-theoretic perspectives for both types of architectures. Authentication performance using false and miss error probabilities of the two systems are analysed and then compared using two practical setups. We highlight the advantages and limitations of each architecture. These theoretical re...
Abstract: In this paper, we address the problem of physical object authentication based on surface m...
In this chapter we discuss authentication techniques involving data such as biometrics, which are as...
In this paper, we study the robustness of state-of-theart automatic fingerprint verification systems...
In this paper, we compare two methods that can be used by the anti-counterfeiting industry to protec...
In this paper, we consider an item authentication using unclonable forensic features of item surface...
Biometry is a wide-used and pervasive approach to verify people identity, based on the presence of s...
Given the recent explosion of interest in human authentication, verification based on tokenised pseu...
In this paper, we consider a forensic multimodal authentication framework based on binary hypothesis...
In this thesis, I investigate the nature and properties of several indelible physical randomness phe...
Physical objects typically have, at the surface, a structure that is visible at the microscopic leve...
Abstract—In physical signature authentication schemes, a candidate sig-nature presented for authenti...
International audienceIndustrial companies lose large sums of money because of counterfeits and they...
Abstract. In this paper, we overview a set of desiderata for building anti-counterfeiting technologi...
We consider the problem of content identification and authentication based on digital content finger...
Physical Unclonable Functions or PUFs have gained importance since they appeared about a decade ago....
Abstract: In this paper, we address the problem of physical object authentication based on surface m...
In this chapter we discuss authentication techniques involving data such as biometrics, which are as...
In this paper, we study the robustness of state-of-theart automatic fingerprint verification systems...
In this paper, we compare two methods that can be used by the anti-counterfeiting industry to protec...
In this paper, we consider an item authentication using unclonable forensic features of item surface...
Biometry is a wide-used and pervasive approach to verify people identity, based on the presence of s...
Given the recent explosion of interest in human authentication, verification based on tokenised pseu...
In this paper, we consider a forensic multimodal authentication framework based on binary hypothesis...
In this thesis, I investigate the nature and properties of several indelible physical randomness phe...
Physical objects typically have, at the surface, a structure that is visible at the microscopic leve...
Abstract—In physical signature authentication schemes, a candidate sig-nature presented for authenti...
International audienceIndustrial companies lose large sums of money because of counterfeits and they...
Abstract. In this paper, we overview a set of desiderata for building anti-counterfeiting technologi...
We consider the problem of content identification and authentication based on digital content finger...
Physical Unclonable Functions or PUFs have gained importance since they appeared about a decade ago....
Abstract: In this paper, we address the problem of physical object authentication based on surface m...
In this chapter we discuss authentication techniques involving data such as biometrics, which are as...
In this paper, we study the robustness of state-of-theart automatic fingerprint verification systems...