Copy detection pattern explained

A copy detection pattern (CDP)[1] or graphical code[2] [3] is a small random or pseudo-random digital image which is printed on documents, labels or products for counterfeit detection. Authentication is made by scanning the printed CDP using an image scanner or mobile phone camera.[4] It is possible to store additional product-specific data into the CDP that will be decoded during the scanning process.[5] A CDP can also be inserted into a 2D barcode to facilitate smartphone authentication and to connect with traceability data.[6]

Principle

The detection of counterfeits using a CDP relies on an "information loss principle",[7] which states that every time a digital image is printed or scanned, some information about the original digital image is lost. A CDP is a maximum entropy image that attempts to take advantage of this information loss. Since producing a counterfeit CDP requires an additional scanning and printing processes, it will have less information than an original CDP. By measuring the information in the scanned CDP, the detector can determine whether the CDP is an original print or a copy.

CDPs aim to address limitations of optical security features such as security holograms. They are motivated by the need for security features that can be originated, managed and transferred digitally, and that are machine readable. Contrarily to many traditional security printing techniques, CDPs do not rely on Security by Obscurity,[8] as the algorithm for generating CDPs can be public as long as the key used to generate it or the digital CDP is not revealed.[9]

CDPs have also been described as a type of optical physical unclonable function. While they have been cited as a "powerful tool to detect copies",[10] it is noted however that CDPs "require an extensive knowledge of printing technologies"[11] because the printing process introduces variation that is foundational to copy detection.

Security assessment

The theoretical and practical assessment of the security level of CDPs, in other words the detector's ability to detect counterfeit attempts, is an ongoing area of research:

Applications

CDPs are used for different physical item authentication applications:

Related techniques

The EURion constellation and digital watermarks are inserted into banknotes to be detected by scanners, photocopiers and image processing software. However the objective of these techniques is not to detect whether a given banknote is a counterfeit, but to deter amateur counterfeiters from reproducing banknotes by blocking the device or software used to make the counterfeit.[24]

Digital watermarks may be used as well to differentiate original prints from counterfeits.[25] [26] A digital watermark may also be inserted into a 2D barcode.[27] The fundamental difference between digital watermarks and CDPs is that a digital watermark must be embedded into an existing image while respecting a fidelity constraint, while the CDP does not have such constraint.[28]

External links

Notes and References

  1. Picard. Justin. 2004-06-03. Van Renesse. Rudolf L. Digital authentication with copy-detection patterns. Optical Security and Counterfeit Deterrence Techniques V. SPIE. 5310. 176. 2004SPIE.5310..176P. 10.1117/12.528055. 58492104.
  2. Phan Ho. Anh Thu. Mai Hoang. Bao An. Sawaya. Wadih. Bas. Patrick. 2014-06-05. Document authentication using graphical codes: reliable performance analysis and channel optimization. EURASIP Journal on Information Security. en. 2014. 1. 9. 10.1186/1687-417X-2014-9. 1687-417X. free. 20.500.12210/25915. free.
  3. Tkachenko. Iuliia. Puech. William. Destruel. Christophe. Strauss. Olivier. Gaudin. Jean-Marc. Guichard. Christian. 2016-03-01. Two-Level QR Code for Private Message Sharing and Document Authentication. IEEE Transactions on Information Forensics and Security. 11. 3. 571–583. 10.1109/TIFS.2015.2506546. 9465424. 1556-6021.
  4. Book: Technology and Security: Countering Criminal Infiltrations in the Legitimate Supply Chain. United Nations Interregional Crime and Justice Research Institute. 2021.
  5. Book: Abele, Eberhard.. Schutz vor Produktpiraterie : ein Handbuch für den Maschinen- und Anlagenbau. 2011. Springer. Ksuke, Philipp., Lang, Horst.. 978-3-642-19280-7. Berlin. Protection against product piracy: A handbook for the mechanical and plant engineering industry. 726826809.
  6. Book: EUIPO Anti-Counterfeiting Technology Guide. European Observatory on Infringements of Intellectual Property Rights. 2021.
  7. Web site: Pagina iniziale dell'Ufficio Italiano Brevetti e Marchi - Copy Detection Patterns – CDP. Home page of the Italian Patent and Trademark Office -Copy Detection Patterns – CDP. live. https://web.archive.org/web/20210129053102/https://uibm.mise.gov.it/index.php/it/225-lotta-alla-contraffazione/2036477-copy-detection-patterns-cdp . 2021-01-29 . 2021-01-22. uibm.mise.gov.it.
  8. Picard. Justin. Vielhauer. Claus. Thorwirth. Niels. Ping W. Wong. Edward J. Delp Iii. 2004-06-22. Towards fraud-proof ID documents using multiple data hiding technologies and biometrics. Security, Steganography, and Watermarking of Multimedia Contents VI. 5306. 416. SPIE. 10.1117/12.525446. 2004SPIE.5306..416P. 15931951.
  9. Picard. Justin. 2008. Copy Detectable Images: From Theory to Practice. Conference on Optical Security and Counterfeit Deterrence 2008. 1. 372–381. Reconnaissance International.
  10. Copy detection pattern-based document protection for variable media . November 2012 . Dirik . Ahmet Emir . Haas . Bertrand . IET Image Processing . 6 . 8 . 1102–1113 . 10.1049/iet-ipr.2012.0297 . 1751-9667 . 12 August 2020.
  11. Book: Vision and challenges for realising the Internet of things. 2010. EUR-OP. Sundmaeker, Harald., Guillemin, Patrick., Friess, Peter., Woelfflé, Sylvie., European Commission. Directorate-General for the Information Society and Media.. 978-92-79-15088-3. Luxembourg. 847355368.
  12. Picard. Justin. 2008. On the Security of Copy Detectable Images. NIP & Digital Fabrication Conference, 2008 International Conference on Digital Printing Technologies.
  13. Dirik. A. E.. Haas. B.. 2012-11-01. Copy detection pattern-based document protection for variable media. IET Image Processing. en. 6. 8. 1102–1113. 10.1049/iet-ipr.2012.0297. 1751-9667.
  14. Baras. Cleo. Cayre. François. 2012-08-01. 2D bar-codes for authentication: A security approach. 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO). 1760–1766.
  15. Book: Voloshynovskiy. Slava. Holotyak. Taras. Bas. Patrick. 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) . Physical object authentication: Detection-theoretic comparison of natural and artificial randomness . 2016-03-01. http://sip.unige.ch/articles/2016/2016.ICASSP.Final.PUF.pdf. IEEE. 2029–2033. 10.1109/icassp.2016.7472033. 978-1-4799-9988-0. 10331654.
  16. Taran. Olga. Bonev. Slavi. Voloshynovskiy. Slava. 2019-03-18. Clonability of anti-counterfeiting printable graphical codes: a machine learning approach. cs.CR. 1903.07359.
  17. Book: Yadav. Rohit. Tkachenko. Iuliia. Trémeau. Alain. Fournel. Thierry. Proceedings of the ACM Workshop on Information Hiding and Multimedia Security . Estimation of Copy-sensitive Codes Using a Neural Approach . 2019. 77–82. New York, New York, USA. ACM Press. 10.1145/3335203.3335718. 978-1-4503-6821-6. 195848782. https://hal.archives-ouvertes.fr/hal-02330988/file/IH_MMSec_2019_final.pdf.
  18. Picard, Justin; Khatri, Nick; 100% Inline Verification of Secure Graphics at High Resolution; 2019-05-15; Digital Document Security; Reconnaissance International
  19. Book: Zhang. Pei. Zhang. Weiming. Yu. Nenghai. 2019 7th International Conference on Information, Communication and Networks (ICICN) . Copy Detection Pattern-Based Authentication for Printed Documents with Multi-Dimensional Features . April 2019. 150–157. IEEE. 10.1109/icicn.2019.8834939. 978-1-7281-0425-6. 202561547.
  20. Web site: FIFA World Cup Case Study - Code Corporation. Yumpu.com. yumpu.com. en. 2020-04-19.
  21. Web site: Pattern makes 2D barcodes copy-proof. 2009-07-15. www.securingindustry.com. 2020-04-19.
  22. Web site: Combatting counterfeiting using QR codes. Carron.
  23. Web site: Digital and Analog Technologies for Product Authentication and Tamper Evidence. 2019-03-28. Packaging Europe. en-gb. 2020-04-23.
  24. Web site: Software Detection of Currency // Dr Steven J. Murdoch. murdoch.is. 2020-04-23.
  25. Mahmoud. Khaled W.. Blackledge. Jonathon M.. Datta. Sekharjit. Flint. James A.. Ping W.. Wong. Edward J.. Delp Iii. 2004-06-22. Print protection using high-frequency fractal noise. Security, Steganography, and Watermarking of Multimedia Contents VI. 5306. 446. SPIE. 10.1117/12.526677. 2004SPIE.5306..446M. 46155853.
  26. Book: Zhou. Jifeng. Pang. Mingyong. 2010 2nd IEEE International Conference on Network Infrastructure and Digital Content . Digital watermark for printed materials . September 2010. 758–762. IEEE. 10.1109/icnidc.2010.5657884. 978-1-4244-6851-5. 16587568.
  27. Nguyen. Hoai Phuong. Retraint. Florent. Morain-Nicolier. Frédéric. Delahaies. Angès. 2019. A Watermarking Technique to Secure Printed Matrix Barcode—Application for Anti-Counterfeit Packaging. IEEE Access. 7. 131839–131850. 10.1109/ACCESS.2019.2937465. 2019IEEEA...7m1839N . 2169-3536. free.
  28. Book: 2005. Barni. Mauro. Cox. Ingemar. Kalker. Ton. Kim. Hyoung-Joong. Digital Watermarking. 3710. en-gb. 10.1007/11551492. 978-3-540-28768-1. 0302-9743 . Lecture Notes in Computer Science .