{"title":"Experimental Investigation of Protection Method for Detection of Cloning Attack on Paper Certificates","authors":"D. Flaksman","doi":"10.31854/1813-324x-2023-9-5-121-129","DOIUrl":null,"url":null,"abstract":"A method of paper certificate protection against a cloning attack is investigated, that was proposed recently theoretically in a paper of the same author. This method is based on the use of digital watermarks. In order to extend watermark approach to a protection against cloning attacks, it has been suggested to execute estimation of the noise power which appear during the image scanning and printing. Algorithms of embedding and extraction of watermarks out of the images are presented along with a method of detecting of the cloning attack after scanning and printing by an attacker. Numerical results of the experiments for the error probabilities of a cloning missing and a false alarm are also presented and are in agreement with theoretical results obtained before.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"41 11-12","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of Telecommunication Universities","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31854/1813-324x-2023-9-5-121-129","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A method of paper certificate protection against a cloning attack is investigated, that was proposed recently theoretically in a paper of the same author. This method is based on the use of digital watermarks. In order to extend watermark approach to a protection against cloning attacks, it has been suggested to execute estimation of the noise power which appear during the image scanning and printing. Algorithms of embedding and extraction of watermarks out of the images are presented along with a method of detecting of the cloning attack after scanning and printing by an attacker. Numerical results of the experiments for the error probabilities of a cloning missing and a false alarm are also presented and are in agreement with theoretical results obtained before.