Skip to main content
Fig. 1 | EURASIP Journal on Information Security

Fig. 1

From: Mobile authentication of copy detection patterns

Fig. 1

General scheme of the CDP life cycle starts from the generation of the digital templates by the defender and their following printing. The produced codes go to the public domain. An attacker has an access to the publicly available printed codes and can produce different type of fakes that are then also distributed in the public domain. A verifier should digitize the printed codes from the public domain and validate them via some classifier. As it is shown by the dashed line, the validation might be produced with or without taking the digital templates into account. For the defender-verifier pair, the main goal is to minimize the probability of error. In contrast, the attacker aims at maximizing the probability of error

Back to article page