Nowadays, 2D barcodes have been widely used for advertisement, mobile payment, and product authentication. However, in applications related to product authentication, an authentic 2D barcode can be illegally copied and attached to a counterfeited product in such a way to bypass the authentication scheme. In this paper, we employ a proprietary 2D barcode pattern and use multimedia forensics methods to analyse the scanning and printing artefacts resulting from the copy (re-broadcasting) attack. A diverse and complementary feature set is proposed to quantify the barcode texture distortions introduced during the illegal copying process. The proposed features are composed of global and local descriptors, which characterize the multi-scale textur...
Any researcher's goal is to improve detection accuracy with a limited feature vector dimension. Ther...
Multimedia contents play an important role in our society. They serve as a means of communication an...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...
Nowadays, 2D barcodes have been widely used for advertisement, mobile payment, and product authentic...
Nowadays, 2D barcodes have been widely used for advertisement, mobile payment, and product authentic...
Abstract — Due to the availability of easy-to-use and powerful image editing tools, the authenticati...
Due to the maturing of digital image processing techniques, there are many tools that can forge an i...
Two dimensional (2D) barcode can carry much more information than the traditional 1D barcode. Nowada...
2D barcodes offer many benefits compared to 1D barcodes, such as high information density and robust...
International audienceIn this paper, we investigate the authentication problem of real-world goods o...
International audienceThe falsification of hardcopy documents is a common problem these days. Numero...
A barcode is a graphical image that stores data in special patterns of vertical spaced lines (linea...
This paper addresses a problem of anti-counterfeiting of physical objects and aims at investigating ...
Copy-move forgery is one of the most common type of tampering in digital images. Copy-moves are part...
Two new attacks on multiview videos in the view space is investigated, which is also applicable to s...
Any researcher's goal is to improve detection accuracy with a limited feature vector dimension. Ther...
Multimedia contents play an important role in our society. They serve as a means of communication an...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...
Nowadays, 2D barcodes have been widely used for advertisement, mobile payment, and product authentic...
Nowadays, 2D barcodes have been widely used for advertisement, mobile payment, and product authentic...
Abstract — Due to the availability of easy-to-use and powerful image editing tools, the authenticati...
Due to the maturing of digital image processing techniques, there are many tools that can forge an i...
Two dimensional (2D) barcode can carry much more information than the traditional 1D barcode. Nowada...
2D barcodes offer many benefits compared to 1D barcodes, such as high information density and robust...
International audienceIn this paper, we investigate the authentication problem of real-world goods o...
International audienceThe falsification of hardcopy documents is a common problem these days. Numero...
A barcode is a graphical image that stores data in special patterns of vertical spaced lines (linea...
This paper addresses a problem of anti-counterfeiting of physical objects and aims at investigating ...
Copy-move forgery is one of the most common type of tampering in digital images. Copy-moves are part...
Two new attacks on multiview videos in the view space is investigated, which is also applicable to s...
Any researcher's goal is to improve detection accuracy with a limited feature vector dimension. Ther...
Multimedia contents play an important role in our society. They serve as a means of communication an...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...