skip to main content
10.1145/3469096.3474924acmconferencesArticle/Chapter ViewAbstractPublication PagesdocengConference Proceedingsconference-collections
short-paper

Counterfeit detection with QR codes

Published:16 August 2021Publication History

ABSTRACT

Serialized QR Codes applied to product packaging have received considerable interest as a potential solution to the problem of industrial counterfeiting. Compared to traditional security solutions (e.g. taggants, holograms, security inks), they are indeed simpler to integrate in existing production workflow, easier to verify, and more cost-effective at scale. In addition, they allow to convey a product digital identity and history, and are used to connect brand owners with consumers. However, by itself a QR Code offers no protection at all against copy by cloning. Various schemes have been proposed to add a copy-sensitive layer to QR Codes, but most techniques in the state of the art have not been applied to real production environments, where QR Codes are printed at mass scale and products are scanned in a non-controlled environment, typically by consumers with their smartphones. This paper presents a system based on integrating copy detection patterns into QR Codes, which has been deployed for a number of years on the market.

References

  1. The Economic Impacts of Counterfeiting and Piracy. International Chamber of Commerce, 2016Google ScholarGoogle Scholar
  2. Illicit Trade Report 3029. World Customs Organization, 2019Google ScholarGoogle Scholar
  3. https://www.denso-wave.com/en/system/qr/fundamental/qrcode/sqrc/index.htmlGoogle ScholarGoogle Scholar
  4. J. Picard, "Digital authentication with copy-detection patterns", Optical Security and Counterfeit Deterrence Techniques V. SPIE. 5310: 176.Google ScholarGoogle Scholar
  5. A.T. Phan Ho, B.A Mai Hoang, W. Sawaya, P. Bas. "Document authentication using graphical codes: reliable performance analysis and channel optimization". EURASIP Journal on Information Security. 2014 (1): 9Google ScholarGoogle ScholarCross RefCross Ref
  6. H. P. Nguyen, F. Retraint, F. Morain-Nicolier and A. Delahaies, "A Watermarking Technique to Secure Printed Matrix Barcode---Application for Anti-Counterfeit Packaging," in IEEE Access, vol. 7, pp. 131839--131850, 2019 Google ScholarGoogle ScholarCross RefCross Ref
  7. I. Tkachenko, W. Puech, C. Destruel, O. Strauss, J.-M. Gaudin, and C. Guichard, "Two-level QR code for private message sharing and document authentication," IEEE Trans. Inf. Forensics Security, vol. 11, no. 3, pp. 571--583, Mar. 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Picard, J. Zhao. Visible authentication patterns for printed documents. US patent 7,809,152, 2002Google ScholarGoogle Scholar
  9. S. Chambers, M. Wilds. Bar code authentication. European patent EP2036005A2, 2008Google ScholarGoogle Scholar
  10. A. Biro, G. Kristo. Security element and method to inspect authenticity of a print. European patent EP2815567B1, 2013Google ScholarGoogle Scholar
  11. J. Picard, Justin, N. Khatri, 100% Inline Verification of Secure Graphics at High Resolution; Digital Document Security Conference, Reconnaissance International, 2019Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    DocEng '21: Proceedings of the 21st ACM Symposium on Document Engineering
    August 2021
    178 pages
    ISBN:9781450385961
    DOI:10.1145/3469096

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 16 August 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • short-paper

    Acceptance Rates

    Overall Acceptance Rate178of537submissions,33%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader