Stochastic Digital Twin for Copy Detection Patterns (2309.16866v1)
Abstract: Copy detection patterns (CDP) present an efficient technique for product protection against counterfeiting. However, the complexity of studying CDP production variability often results in time-consuming and costly procedures, limiting CDP scalability. Recent advancements in computer modelling, notably the concept of a "digital twin" for printing-imaging channels, allow for enhanced scalability and the optimization of authentication systems. Yet, the development of an accurate digital twin is far from trivial. This paper extends previous research which modelled a printing-imaging channel using a machine learning-based digital twin for CDP. This model, built upon an information-theoretic framework known as "Turbo", demonstrated superior performance over traditional generative models such as CycleGAN and pix2pix. However, the emerging field of Denoising Diffusion Probabilistic Models (DDPM) presents a potential advancement in generative models due to its ability to stochastically model the inherent randomness of the printing-imaging process, and its impressive performance in image-to-image translation tasks. This study aims at comparing the capabilities of the Turbo framework and DDPM on the same CDP datasets, with the goal of establishing the real-world benefits of DDPM models for digital twin applications in CDP security. Furthermore, the paper seeks to evaluate the generative potential of the studied models in the context of mobile phone data acquisition. Despite the increased complexity of DDPM methods when compared to traditional approaches, our study highlights their advantages and explores their potential for future applications.
- J. Picard, “Digital authentication with copy-detection patterns,” in Optical Security and Counterfeit Deterrence Techniques V, vol. 5310. SPIE, 2004, pp. 176–183.
- J. Picard, P. Landry, and M. Bolay, “Counterfeit detection with qr codes,” in Proceedings of the 21st ACM Symposium on Document Engineering, 2021, pp. 1–4.
- R. Yadav, I. Tkachenko, A. Trémeau, and T. Fournel, “Copy sensitive graphical code estimation: Physical vs numerical resolution,” in 2019 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2019, pp. 1–6.
- A. P. Ho, B. M. Hoang, W. Sawaya, and P. Bas, “Authentication using graphical codes: Optimisation of the print and scan channels,” in 2014 22nd European Signal Processing Conference (EUSIPCO). IEEE, 2014, pp. 800–804.
- Y. Belousov, B. Pulfer, R. Chaban, J. Tutt, O. Taran, T. Holotyak, and S. Voloshynovskiy, “Digital twins of physical printing-imaging channel,” in IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, December 2022.
- J. Ho, A. Jain, and P. Abbeel, “Denoising diffusion probabilistic models,” Advances in Neural Information Processing Systems, vol. 33, pp. 6840–6851, 2020.
- P. Dhariwal and A. Nichol, “Diffusion models beat gans on image synthesis,” Advances in neural information processing systems, vol. 34, pp. 8780–8794, 2021.
- P. Isola, J.-Y. Zhu, T. Zhou, and A. A. Efros, “Image-to-image translation with conditional adversarial networks,” CVPR, 2017.
- J.-Y. Zhu, T. Park, P. Isola, and A. A. Efros, “Unpaired image-to-image translation using cycle-consistent adversarial networks,” in Proceedings of the IEEE international conference on computer vision, 2017, pp. 2223–2232.
- C. Luo, “Understanding diffusion models: A unified perspective,” arXiv preprint arXiv:2208.11970, 2022.
- C. Saharia, W. Chan, H. Chang, C. Lee, J. Ho, T. Salimans, D. Fleet, and M. Norouzi, “Palette: Image-to-image diffusion models,” in ACM SIGGRAPH 2022 Conference Proceedings, 2022, pp. 1–10.
- R. Chaban, O. Taran, J. Tutt, T. Holotyak, S. Bonev, and S. Voloshynovskiy, “Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?” in 2021 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2021, pp. 1–6.
- R. Chaban, O. Taran, J. Tutt, Y. Belousov, B. Pulfer, T. Holotyak, and S. Voloshynovskiy, “Printing variability of copy detection patterns,” in IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, December 2022.
- J. Tutt, O. Taran, R. Chaban, B. Pulfer, Y. Belousov, T. Holotyak, and S. Voloshynovskiy, “Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns,” in IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, 12 2022.