Alternative product authentication system using visual cryptography
DOI:
https://doi.org/10.5433/1679-0375.2020v41n2p117Keywords:
Systems, Safety, Authentication, Visual Cryptography, MasksAbstract
Fraud and counterfeiting have caused various inconveniences to manufacturers and the product consumer market. To avoid counterfeiting and, therefore, bring a higher level of trust and security in commercial transactions, several authentication techniques for physical products have been proposed. Among the techniques commonly employed, the most popular are QR codes (Quick Response Code), Holographic Seals, and RFID (Radio Frequency Identification) tags. This paper aims to propose an alternative product authentication system that applies the visual cryptography technique (NAOR; SHAMIR, 1995). This system employs two masks that, when overlaid, allow visual authentication by the user, without the need for any computational processing. The use of this authentication system for the need in question has not yet been reported in the literature.Downloads
References
BJELKHAGEN, H. I. Holography & philately: postage stamps with holograms. [Holywell]: Hansholo Consulting Ltd, 2017.
CBP - CUSTOMS AND BORDER PROTECTION OFFICE OF TRADE. Intellectual property rights: fiscal Year 2018 Seizure Statistics. United States: Homeland Security, 2018. Available in: https://www.cbp.gov/sites/default/files/assets/documents/2019-Aug/IPR_Annual-Report-FY-2018.pdf. Access in: 13 dec. 2019.
CICARELI, RODRIGO DOS SANTOS. Um sistema de autenticação de produtos que emprega a criptografia visual. Course Conclusion Paper (Graduation in electrical engineering) – Universidade Federal de São Carlos, 2020.
CHANDRASEKHARA, V.; JAGADISHA. Secure banking application using Visual Cryptography against fake website authenticity theft. International Journal of Advanced Computer Engineering and Communication Technology, Bhubaneswar, v. 2, n. 2, p. 1-5, 2013.
DOTTER BRASIL. Selos holográficos. Americana, 2020. Available in: https://dotter.com.br/selos-holograficos. Access in: 20 may 2020.
FEIJÓ, E. A. Proteção dos direitos autorais de imagem estática usando criptografia visual e marca d`água. São Paulo: Instituto de Matemática e Estatística da Universidade de São Paulo, 2016.
JANONES, U. O. Um novo olhar sobre os pedais de efeito. 2018. Course Conclusion Paper (Graduating in music) - Universidade Federal de Uberlandia, Uberlandia, 2018.
KARAGIANNAKI, A.; PRATAMARI, K. Leveraging RFID-enabled traceability for the food industry: a case study. Blackwell Publishing Ltd. 2011.
LIU, F.; WU, C. K.; LIN, X. J. The alignment problem of visual cryptography schemes. Switzerland: Springer, 2008.
MACHIZAUD, J.; CHAVEL, P.; FOURNEL, T. Fourier-based automatic alignment for improved visual cryptography schemes. Optics Express, Massachusetts, v. 19, n. 23, p. 22709 – 22722, 2011.
NAOR, M.; SHAMIR, A. Visual cryptography. Advances in Cryptology - EUROCRYPT’94, Switzerland, p. 1-12, 1995.
PENG, K.; SANABRIA, H.; WU, D.; ZHU, C. 6857: computer and network security. Massachusetts: Massachusetts Institute of Technology, 2018.
PRIMI. Selo holográfico. São Paulo, 2019. Available in: https://www.primi.com.br/selo-holografico/. Access in: 16 set. 2019.
PROSOUND. Detido: equipamento de áudio profissional falsificado apreendido na China. Prosoundnetwork, EUA, 23 dec. 2019. Available in: https://www.prosoundnetwork.com/business/busted-counterfeit-pro-audio-gear-seized-in-china. Access in: 18 nov. 2019.
RAJGURU, P.; DHOMSE, J.; PY, P. Securing online transaction using visual cryptography. Journal of Telecommunications System & Management, Brussels, v. 7, n. 1, p. 1-3, 2018.
SIMÕES, E. D. Desenvolvimento de sistema para leitura de código de barras com ”feedback” para aquisição e segurança de produtos em supermercados. 2015. Course Conclusion Paper (Graduating in automation control engineering) - Universidade Tecnológica Federal do Paraná, Curitiba, 2015.
SRIKANTH, B.; PADMAJA, G.; KHASIM, S.; LAKSHMI, P. V. S.; HARITHA, A. Secured bank authentication using image processing and visual cryptography. International Journal of Computer Science and Information Technologies, [S. l.], v. 5, n. 2, p. 2432-2437, 2014.
YAN, B., XIANG, Y., HUA, G. Basic visual cryptography algorithms. In: YAN, B., XIANG, Y., HUA, G. Improving image quality in visual cryptography. Berlin: Springer; Singapore: Springer Singapore, 2020. chap. 2.
ŽIŽEK, S. The parallax view. Cambridge: The MIT Press, 2006.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Semina Ciências Exatas e Tecnológicas
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The Copyright Declaration for articles published in this journal is the author’s right. Since manuscripts are published in an open access Journal, they are free to use, with their own attributions, in educational and non-commercial applications. The Journal has the right to make, in the original document, changes regarding linguistic norms, orthography, and grammar, with the purpose of ensuring the standard norms of the language and the credibility of the Journal. It will, however, respect the writing style of the authors. When necessary, conceptual changes, corrections, or suggestions will be forwarded to the authors. In such cases, the manuscript shall be subjected to a new evaluation after revision. Responsibility for the opinions expressed in the manuscripts lies entirely with the authors.
This journal is licensed with a license Creative Commons Attribution-NonCommercial 4.0 International.