Forensic Authentication of Data Bearing Halftones

Stephen Pollard, Robert Ulichney, Matthew Gaubatz, Steven Simske

2013

Abstract

This paper introduces a practical system for combining overt, covert and forensic information in a single, small printed feature. The overt “carrier” feature need not be a dedicated security mark such as a 2D or color barcode, but can instead be integrated into a desirable object such as a logo as part of the aesthetically-desired layout using steganographic halftones (Stegatones). High-resolution imaging in combination with highly accurate and robust image registration is used to recover, simultaneously, a unique identity suitable for associating a unique print with an on-line database and a unique forensic signature that is both tamper and copy sensitive.

References

  1. Adams, G., 2010, Handheld Dyson Relay Lens for AntiCounterfeiting, IEEE IST.
  2. Bouguet, J-Y., 1999, Pyramid Implementation of Lucas Kanade Feature Tracker: Description of the algorithm, OpenCV Documents, Intel Corporation, Microprocessor Research Lab.
  3. Daugman, J. G., 1993, High confidence visual recognition of persons by a test of visual phase information, IEEE PAMI, 15(11).
  4. Daugman, J., 2006, Probing the uniqueness and randomness of IrisCodes: results from 200 billion comparisons, Proc. IEEE, 94(11).
  5. Daugman, J., 2007, New methods in iris recognition, IEEE SMC, 37(5).
  6. Lucas, B., Kanade, T., 1981, An iterative image registration technique with an application to stereo vision, IJCAI.
  7. Pollard, S., Simske, S., Adams G., 2010, Model based print signature profile extraction for forensic analysis of individual text glyphs, IEEE WIFS.
  8. Pollard, S., Simske, S., Adams G, 2012, Print Biometrics: Recovering Forensic Signatures from Halftone Images, IAPR ICPR.
  9. Pizzanelli, D., 2009, The Future of Anti-Counterfeiting, Brand Protection and Security Packaging V, Pira International, Leatherhead, UK.
  10. Ulichney, R., Gaubatz, M., Simske, S., 2010 Encoding information in clustered-dot halftones, IS&T NIP26.
Download


Paper Citation


in Harvard Style

Pollard S., Ulichney R., Gaubatz M. and Simske S. (2013). Forensic Authentication of Data Bearing Halftones . In Proceedings of the International Conference on Computer Vision Theory and Applications - Volume 2: VISAPP, (VISIGRAPP 2013) ISBN 978-989-8565-48-8, pages 109-113. DOI: 10.5220/0004296201090113


in Bibtex Style

@conference{visapp13,
author={Stephen Pollard and Robert Ulichney and Matthew Gaubatz and Steven Simske},
title={Forensic Authentication of Data Bearing Halftones},
booktitle={Proceedings of the International Conference on Computer Vision Theory and Applications - Volume 2: VISAPP, (VISIGRAPP 2013)},
year={2013},
pages={109-113},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004296201090113},
isbn={978-989-8565-48-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Computer Vision Theory and Applications - Volume 2: VISAPP, (VISIGRAPP 2013)
TI - Forensic Authentication of Data Bearing Halftones
SN - 978-989-8565-48-8
AU - Pollard S.
AU - Ulichney R.
AU - Gaubatz M.
AU - Simske S.
PY - 2013
SP - 109
EP - 113
DO - 10.5220/0004296201090113