Abstract
Intrinsic, non-invasive product authentication is the preferred way of detecting counterfeit products as it does not generate additional costs during the production process. Previous works achieved promising results for smartphone-based product authentication. However, while promising, the methods fail when enrollment and authentication are performed on different devices (cross-device). This work investigates the underlying reasons for the limitations in the practical application of cross-device intrinsic surface structure-based product authentication. In particular by utilising micro-texture classification approaches applied on images of zircon oxide blocks (dental implants) captured using a commodity smartphone device. The main result is that the device-specific artefacts (image sensor as well as image processing-specific ones) are so strong that they obfuscate the material microstructure. To be more precise, the device’s intrinsic signal makes device identification easier to perform than the material authentication.
This research was partially funded by the Salzburg State Government within the Science and Innovation Strategy Salzburg 2025 (WISS 2025) under the project AIIV-Salzburg (Artificial Intelligence in Industrial Vision), project no 20102-F2100737-FPR.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bayram, S., Sencar, H., Memon, N., Avcibas, I.: Source camera identification based on CFA interpolation. In: IEEE International Conference on Image Processing 2005, vol. 3, pp. III–69 (2005). https://doi.org/10.1109/ICIP.2005.1530330
Beekhof, F.P., Voloshynovskiy, S., Diephuis, M., Farhadzadeh, F.: Physical object authentication with correlated camera noise. In: Saake, G., Henrich, A., Lehner, W., Neumann, T., Köppen, V. (eds.) Datenbanksysteme für Business, Technologie und Web (BTW) 2013 - Workshopband, pp. 65–74. Gesellschaft für Informatik e.V, Bonn (2013)
Cai, S., Zhao, L., Chen, C.: Open-set product authentication based on deep texture verification. In: Peng, Y., Hu, S.M., Gabbouj, M., Zhou, K., Elad, M., Xu, K. (eds.) Image and Graphics, vol. 12888, pp. 114–125. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-87355-4_10
Choi, K.S., Lam, E.Y., Wong, K.K.Y.: Automatic source camera identification using the intrinsic lens radial distortion. Opt. Express 14(24), 11551–11565 (2006). https://doi.org/10.1364/OE.14.011551
Cimpoi, M., Maji, S., Kokkinos, I., Mohamed, S., Vedaldi, A.: Describing textures in the wild. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, pp. 3606–3613 (2014). https://doi.org/10.1109/CVPR.2014.461
Dabov, K., Foi, A., Katkovnik, V., Egiazarian, K.: Image denoising by sparse 3-d transform-domain collaborative filtering. IEEE Trans. Image Process. 16(8), 2080–2095 (2007). https://doi.org/10.1109/TIP.2007.901238
Das, A., Galdi, C., Han, H., Ramachandra, R., Dugelay, J.L., Dantcheva, A.: Recent advances in biometric technology for mobile devices. In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–11 (2018). https://doi.org/10.1109/BTAS.2018.8698587
Diephuis, M., Voloshynovskiy, S., Holotyak, T.: Sketchprint: physical object micro-structure identification using mobile phones. In: 2015 23rd European Signal Processing Conference (EUSIPCO), pp. 834–838 (2015).https://doi.org/10.1109/EUSIPCO.2015.7362500
Diephuis, M., Voloshynovskiy, S., Holotyak, T., Stendardo, N., Keel, B.: A framework for fast and secure packaging identification on mobile phones. In: Alattar, A.M., Memon, N.D., Heitzenrater, C.D. (eds.) Media Watermarking, Security, and Forensics 2014, vol. 9028, p. 90280T. International Society for Optics and Photonics, SPIE (2014). https://doi.org/10.1117/12.2039638
Jain, S., Gruteser, M.: Recognizing textures with mobile cameras for pedestrian safety applications. IEEE Trans. Mob. Comput. 18(8), 1911–1923 (2019). https://doi.org/10.1109/TMC.2018.2868659
JD, R.B., et al.: Forgery:‘fingerprinting’ documents and packaging. Nat. Brief Commun. 436, 475 (2005)
Kauba, C., Debiasi, L., Schraml, R., Uhl, A.: Towards drug counterfeit detection using package paperboard classification. In: Chen, E., Gong, Y., Tie, Y. (eds.) Advances in Multimedia Information Processing – Proceedings of the 17th Pacific-Rim Conference on Multimedia (PCM 2016), LNCS, Xi’an, China, vol. 9917, pp. 136–146. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-319-48896-7_14
Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vision 60(2), 91–110 (2004). https://doi.org/10.1023/B:VISI.0000029664.99615.94
Lukas, J., Fridrich, J.J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205–214 (2006)
Mehta, R., Egiazarian, K.: Texture classification using dense micro-block difference (DMD). In: Cremers, D., Reid, I., Saito, H., Yang, MH. (eds.) ACCV 2014, LNCS, vol. 9004, pp. 643–658. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-319-16808-1_43
Muhammad, G.: Multi-scale local texture descriptor for image forgery detection. In: 2013 IEEE International Conference on Industrial Technology (ICIT), pp. 1146–1151 (2013)
Ojala, T., Pietikäinen, M., Mäenpää, T.: Multiresolution Gray-Scale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Anal. Mach. Intell. 24(7), 971–987 (2002)
Ojansivu, V., Rahtu, E., Heikkila, J.: Rotation invariant local phase quantization for blur insensitive texture analysis. In: 2008 19th International Conference on Pattern Recognition, pp. 1–4 (2008).https://doi.org/10.1109/ICPR.2008.4761377
Perronnin, F., Sánchez, J., Mensink, T.: Improving the Fisher kernel for large-scale image classification. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) Computer Vision - ECCV 2010, vol. 6314, pp. 143–156. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15561-1_11
Schraml, R., Debiasi, L., Kauba, C., Uhl, A.: On the feasibility of classification-based product package authentication. In: IEEE Workshop on Information Forensics and Security (WIFS 2017), Rennes, FR, p. 6 (2017). https://doi.org/10.1109/WIFS.2017.8267659
Schraml, R., Debiasi, L., Uhl, A.: Real or fake: mobile device drug packaging authentication. In: Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, IH &MMSec 2018, pp. 121–126. Association for Computing Machinery, New York (2018). https://doi.org/10.1145/3206004.3206016
Schuiki, J., Kauba, C., Hofbauer, H., Uhl, A.: Cross-sensor micro-texture material classification and smartphone acquisition do not go well together. In: Proceedings of the 11th International Workshop on Biometrics and Forensics (IWBF 2023), Barcelona, Spain, pp. 1–6 (2023)
Sun, B., Tan, S.R.X., Ren, Z., Chan, M.C., Han, J.: On utilizing smartphone cameras to detect counterfeit liquid food products. In: Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services, MobiSys 2022, pp. 551–552. Association for Computing Machinery, New York (2022). https://doi.org/10.1145/3498361.3538779
Sun, Y., Liao, X., Liu, J.: An efficient paper anti-counterfeiting method based on microstructure orientation estimation. In: ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2525–2529 (2021). https://doi.org/10.1109/ICASSP39728.2021.9415114
Tang, X.J., Tay, Y.H., Siam, N.A., Lim, S.C.: Mywood-id: automated macroscopic wood identification system using smartphone and macro-lens. In: Proceedings of the 2018 International Conference on Computational Intelligence and Intelligent Systems, CIIS 2018, pp. 37–43. Association for Computing Machinery, New York (2018). https://doi.org/10.1145/3293475.3293493
Taran, O., Tutt, J., Holotyak, T., Chaban, R., Bonev, S., Voloshynovskiy, S.: Mobile authentication of copy detection patterns: how critical is to know fakes? In: 2021 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6 (2021). https://doi.org/10.1109/WIFS53200.2021.9648398
Taran, O., Tutt, J., Holotyak, T., Chaban, R., Bonev, S., Voloshynovskiy, S.: Mobile authentication of copy detection patterns (2022). https://doi.org/10.48550/ARXIV.2203.02397. https://arxiv.org/abs/2203.02397
Voloshynovskiy, S., Diephuis, M., Beekhof, F., Koval, O., Keel, B.: Towards reproducible results in authentication based on physical non-cloneable functions: the forensic authentication microstructure optical set (famos). In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 43–48 (2012). https://doi.org/10.1109/WIFS.2012.6412623
Voloshynovskiy, S., Diephuis, M., Holotyak, T.: Mobile visual object identification: from sift-bof-ransac to sketchprint. In: Media Watermarking, Security, and Forensics 2015, vol. 9409, pp. 235–249. SPIE (2015)
Yan, Y., Zou, Z., Xie, H., Gao, Y., Zheng, L.: An IoT-based anti-counterfeiting system using visual features on QR code. IEEE Internet Things J. 8(8), 6789–6799 (2021). https://doi.org/10.1109/JIOT.2020.3035697
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Schuiki, J., Kauba, C., Hofbauer, H., Uhl, A. (2024). Limiting Factors in Smartphone-Based Cross-Sensor Microstructure Material Classification. In: Ma, B., Li, J., Li, Q. (eds) Digital Forensics and Watermarking. IWDW 2023. Lecture Notes in Computer Science, vol 14511. Springer, Singapore. https://doi.org/10.1007/978-981-97-2585-4_3
Download citation
DOI: https://doi.org/10.1007/978-981-97-2585-4_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-2584-7
Online ISBN: 978-981-97-2585-4
eBook Packages: Computer ScienceComputer Science (R0)