Authentication of Physical Objects with Dot-Based 2D Code
Counterfeit goods and documents are a global problem, which needs more and more sophisticated methods of resolving it. Existing techniques using watermarking or embedding symbols on objects are not suitable for all use cases. To address those special needs, we created complete system allowing authentication of paper documents and physical objects with flat surface. Objects are marked using orientation independent and resistant to camera noise 2D graphic codes, named DotAuth. Based on the identifier stored in 2D code, the system is able to perform basic authentication and allows to conduct more sophisticated analysis methods, e.g., relying on augmented reality and physical properties of the object. In this paper, we present the complete architecture, algorithms and applications of the proposed system. Results of the features comparison of the proposed solution and other products are presented as well, pointing to the existence of many advantages that increase usability and efficiency in the means of protecting physical objects.Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 528
 Lindblom, B.S., Gervais, R.: Scientific Examination of Questioned Documents. pp. 238–241. Taylor and Francis, Boca Raton, FL (2006).
 Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2009). A secure and improved self-embedding algorithm to combat digital document forgery. Signal Processing, 89(12), 2324-2332.
 Elkasrawi, S., & Shafait, F. (2014, April). Printer identification using supervised learning for document forgery detection. In 2014 11th IAPR International Workshop on Document Analysis Systems (pp. 146-150). IEEE.
 Van Beusekom, J., Shafait, F., & Breuel, T. M. (2013). Text-line examination for document forgery detection. International Journal on Document Analysis and Recognition (IJDAR), 16(2), 189-207.
 Huang, S., & Wu, J. K. (2007). Optical watermarking for printed document authentication. IEEE Transactions on Information Forensics and Security, 2(2), 164-173.
 Warasart, M., & Kuacharoen, P. (2012, May). Paper-based document authentication using digital signature and QR code. In 4th International Conference on Computer Engineering and Tecnology (ICCET 2012).
 Jumio homepage, https://www.jumio.com/trusted-identity/netverify/document-verification/, last accesed 02/05/2020
 Soon, T. J. (2008). QR code. Synthesis Journal, 2008, pp. 59-78.
 Image retrieved at 02/17/2020 from https://www.freelancer.com/contest/Label-for-toy-1403253-byentry-23008342.