Browse > Article
http://dx.doi.org/10.9723/jksiis.2018.23.4.001

A Code Authentication System of Counterfeit Printed Image Using Multiple Comparison Measures  

Choi, Do-young (한밭대학교 멀티미디어공학과)
Kim, Jin-soo (한밭대대학교 정보통신공학과)
Publication Information
Journal of Korea Society of Industrial Information Systems / v.23, no.4, 2018 , pp. 1-12 More about this Journal
Abstract
Currently, a large amount of printed matter associated with code authentication method are diffused widely, however, they have been reproduced with great precision and distributed successively in illegal ways. In this paper, we propose an efficient code authentication method which classifies authentic or counterfeit with smart-phone, effectively. The proposed method stores original image code in the server side and then extracts multiple comparison measures describing the original image. Based on these multiple measures, a code authentication algorithm is designed in such a way that counterfeit printed images may be effectively classified and then the recognition rate may be highly improved. Through real experiments, it is shown that the proposed method can improve the recognition rate greatly and lower the mis-recognition rate, compared with single measure method.
Keywords
Counterfeit Print; Authentication; Multiple Measures; QR Code;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Islam, N., Islam, Z. and Noor, N., "A Survey on Optical Character Recognition," Journal of Information and Communication Technology -JICT, Vol. 10, Issue 2, pp. 1-4, 2016.
2 Smith, J. R. and Chang, S. F., "VisualSEEk: A Fully Automated Content-based Image Query System," MULTIMEDIA'96 Proceedings of the fourth ACM international conference on Multimedia, pp. 87-98, 1996.
3 Park, H., An, Y., Jang, I., Lee, H., and Lee, S., "An Image Recognition Algorithm Using Comparative Operations," Journal of the Korean Society Of Computer and Information 4, pp. 31-34, 2011.
4 Park, J., and Park, J., "Technological Tendency for 2D Image Code and Its Recognition on Mobile Phone," Journal of the Korea Institute Of Communication Sciences, pp. 663-673, 2011.
5 Jung, J., Yang, H., Kim, S., Lee, G., and Kim, S., "Wine Label Recognition System using Image Similarity," Journal of the Korea Contents Society, pp. 125-137, 2011.
6 Thiebaud, S., Vigouroux, J. R., and Sacre, J., "Method to Display Images with Metameric Jamming to Prevent Illegal Copy," U.S. Patent 8,177,370, 2013.
7 Horn, C., Yang, M., and Kruger, J., Product "Counterfeit Detection Without Security Labels" International Journal of Cyber-Security and Digital Forensics, pp. 88-102, 2013.
8 Chandler, D. M., "Seven Challenges in Image Quality Assessment: Past, Present, and Future Research," in ISRN Signal Processing, Vol. 2013, 2013.
9 Moon, B. H., "Implementation of Password Detection System using Imaging Processing," Journal of the Korea Industrial Information Systems Research, Vol. 22, No. 6, pp.17-22, 2017.   DOI
10 Ryu, J. S., and Kim, J. S., "Performance Comparison of BCS-SPL Techniques Against a Variety of Restoring Block Sizes," Journal of the Korea Industrial Information System Society, Vol. 21, No. 1, pp. 21-28, 2016.
11 Kim, J., and Lee, B., "Wave Information Retrieval Algorithm Based on Iterative Refinement," Journal of the Korea Industrial Information System Society, Vol. 21, No. 1, pp. 7-15, 2016.
12 Kim, J., “The Decoding Approaches of Genetic Algorithm for Job Shop Scheduling Problem,” The Journal of Information Systems, Vol. 25, No. 2, pp. 105-117, 2016.
13 Han, H., Chung, N., and Koo, C., "Utilizing Smart Technologies to Enhance Tourists' Experiences at the Exhibition : A Case of Near Field Communication," The Journal of Internet Electronic Commerce Research, Vol. 16, No. 5, pp. 1-19, 2016.   DOI