Document authentication using graphical codes: reliable performance analysis and channel optimization

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Document authentication using graphical codes: reliable performance analysis and channel optimization

This paper proposes to investigate the impact of the channel model for authentication systems based on codes that are corrupted by a physically unclonable noise such as the one emitted by a printing process. The core of such a system for the receiver, is to perform a statistical test in order to recognize and accept an original code corrupted by noise and reject any illegal copy or a counterfei...

متن کامل

Document Authentication Using 2D Codes: Maximizing the Decoding Performance Using Statistical Inference

Authentication of printed documents using high resolution 2D codes relies on the fact that the printing process is considered as a Physical Unclonable Function used to guaranty the security of the authentication system. The 2D code is corrupted by the printing process in a non-invertible way by inducing decoding errors, and the gap between the bit error rate generated after the rst and second p...

متن کامل

Fountain codes: performance analysis and optimization

OF DOCTORAL DISSERTATION HELSINKI UNIVERSITY OF TECHNOLOGY P. O. BOX 1000, FI-02015 TKK http://www.tkk.fi Author Tuomas Tirronen Name of the dissertation Manuscript submitted 7.10.2009 Manuscript revised 17.12.2009 Date of the defence 4.3.2010 Article dissertation (summary + original articles) Monograph

متن کامل

Graphical Authentication Using Region Based Graphical Password

Password authentication is failing as an authentication since it increases the user burden to remember the passwords. Graphical authentication is proposed as a alternative for textual passwords since it may be easy for users to remember.In this paper we propose a new image region selection based graphical password scheme. We are going to present a new technique for authentication which is based...

متن کامل

Multi-message Authentication over Noisy Channel with Secure Channel Codes

In this paper, we investigate multi-message authentication to combat adversaries with infinite computational capacity. An authentication framework over a wiretap channel (W1,W2) is proposed to achieve information-theoretic security with the same key. The proposed framework bridges the two research areas in physical (PHY) layer security: secure transmission and message authentication. Specifical...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: EURASIP Journal on Information Security

سال: 2014

ISSN: 1687-417X

DOI: 10.1186/1687-417x-2014-9