Inspection and authentication of color security deterrents with multiple imaging devices

نویسندگان

  • Jason S. Aronoff
  • Steven J. Simske
چکیده

© Inspection and authentication of color security deterrents with multiple imaging devices Jason S. Aronoff, Steven J. Simske HP Laboratories HPL-2010-8 Payload density, grayscale pre-compensation, authentication The use of 2D color barcodes is quickly becoming commonplace on printed packaging and labels. The color barcode allows for a higher data density in comparison to its 1D or 2D black and white counterparts. However, with the introduction of color, a new set of imaging problems is introduced in reading the color symbol. Color requires the use of higher quality image capture devices as well as the associated bandwidth when the captured image is analyzed or sent to a central repository for authentication. In this paper we introduce a novel approach to color manipulation which enables two modalities of reading; color and grayscale. This approach adjusts the printed color set such that it is visually distinct in grayscale while still retaining a reasonable resemblance to the original colors. We examine the robustness of this approach using the color tile deterrent and printing and authenticating samples using several printers and a range of deterrent sizes. In cases where symbol size negatively impacts read accuracy we propose an alternate approach which allows for improved reading while still retaining a reasonable payload density. When properly deployed, our approach can complement any color barcode technology by allowing for dual authentication. External Posting Date: January 21, 2010 [Fulltext] Approved for External Publication Internal Posting Date: January 21, 2010 [Fulltext] Published and presented at Optical Document Security 2010, San Francisco. January 20-22, 2010 Copyright Optical Document Security 2010. Inspection and authentication of color security deterrents with multiple imaging devices Jason S. Aronoff and Steven J. Simske Hewlett Packard Labs, 3404 E. Harmony Road, Fort Collins, CO, USA 80528

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010