Document authentication using graphical codes: reliable performance analysis and channel optimization
نویسندگان
چکیده
منابع مشابه
Document authentication using graphical codes: reliable performance analysis and channel optimization
This paper proposes to investigate the impact of the channel model for authentication systems based on codes that are corrupted by a physically unclonable noise such as the one emitted by a printing process. The core of such a system for the receiver, is to perform a statistical test in order to recognize and accept an original code corrupted by noise and reject any illegal copy or a counterfei...
متن کاملDocument Authentication Using 2D Codes: Maximizing the Decoding Performance Using Statistical Inference
Authentication of printed documents using high resolution 2D codes relies on the fact that the printing process is considered as a Physical Unclonable Function used to guaranty the security of the authentication system. The 2D code is corrupted by the printing process in a non-invertible way by inducing decoding errors, and the gap between the bit error rate generated after the rst and second p...
متن کاملFountain codes: performance analysis and optimization
OF DOCTORAL DISSERTATION HELSINKI UNIVERSITY OF TECHNOLOGY P. O. BOX 1000, FI-02015 TKK http://www.tkk.fi Author Tuomas Tirronen Name of the dissertation Manuscript submitted 7.10.2009 Manuscript revised 17.12.2009 Date of the defence 4.3.2010 Article dissertation (summary + original articles) Monograph
متن کاملGraphical Authentication Using Region Based Graphical Password
Password authentication is failing as an authentication since it increases the user burden to remember the passwords. Graphical authentication is proposed as a alternative for textual passwords since it may be easy for users to remember.In this paper we propose a new image region selection based graphical password scheme. We are going to present a new technique for authentication which is based...
متن کاملMulti-message Authentication over Noisy Channel with Secure Channel Codes
In this paper, we investigate multi-message authentication to combat adversaries with infinite computational capacity. An authentication framework over a wiretap channel (W1,W2) is proposed to achieve information-theoretic security with the same key. The proposed framework bridges the two research areas in physical (PHY) layer security: secure transmission and message authentication. Specifical...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EURASIP Journal on Information Security
سال: 2014
ISSN: 1687-417X
DOI: 10.1186/1687-417x-2014-9