Static laser surface authentication with low-cost microscope: Tolerances on spatial and angular disturbance
- 80 Downloads
This paper provides a detailed analysis of spatial and angular robustness of static laser surface authentication system. We shot a beam of laser onto a surface of a paper, captured the reflected speckle pattern, introduced spatial and angular disturbance to the paper separately and perform the authentication process. By analyzing the cross correlation values between speckle patterns before and after the disturbance, we show how receiver operating characteristic (ROC) analysis can be utilized to calculate the robustness of the system. Defining the accuracy ≥ 95 % as robustness, the estimated spatial and angular tolerances of our system are 0.154 ±0.008 mm and 3.59 ±0.18 degrees respectively.
KeywordsLaser surface authentication Paper recognition Paper security Receiver operating characteristic Speckle Laser speckle Speckle application Tolerance analysis
We would like to thank J. Pangaribuan as the head of physics laboratory of University of Pelita Harapan and Y. Subono as the laboratory technician for their permission and technical assistance in using the laser source and providing storage for experimental apparatus.
- 2.S. Simske, M. Sturgill, P. Everest, G. Guillory, Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on pp. 16–20 (2009)Google Scholar
- 3.A.K. Mikkilineni, O. Arslan, P.J. Chiang, R.M. Kumontoy, J.P. Allebach, G.T.C. Chiu, E.J. Delp, IS&Ts NIP21: International Conference on Digital Printing Technologies pp. 223–226 (2005)Google Scholar
- 4.B. Zhu, J. Wu, M.S. Kankanhalli, Proceedings 10th ACM Conference on Computer and Communications Security pp. 145-154 (2003)Google Scholar
- 5.T. Pham, S. Perry, P. Fletcher, Digital Image Computing: Techniques and Applications, 439–446 (2009)Google Scholar
- 6.W. Clarkson, T. Weyrich, A. Finkelstein, N. Heninger, J. Halderman, E. Felten, Security and Privacy, 2009 30th IEEE Symposium on pp. 301–314 (2009)Google Scholar
- 9.A. Sharma, L. Subramanian, E.A. Brewer, in Proceedings of the 18th ACM conference on Computer and communications security, CCS ’11, (2011), pp. 99–110Google Scholar
- 10.W. Samsul, H. Uranus, M. D. Birowosuto, in Proceedings Second International Conference on Advances in Computing, Control and Telecommunication Technologies IEEE Computer Society, 2010, (2010), pp. 37–40Google Scholar
- 14.F. Van Beijnum, E. Van Putten, K.L. Van der Molen, A.P. Mosk. arXiv:physics/0610089 (2006)
- 15.E. Mtois, N. Salzman, P. Yarin, J.R. Smith, Third Workshop on Automatic Identification, (2002)Google Scholar
- 19.J.C. Dainty (ed.), Laser Speckle and Related Phenomena, 2nd, Vol. 9 (Springer-Verlag, 1984)Google Scholar
- 20.S. Tuffry. Data Mining and Statistics for Decision Making (Wiley, Ltd., 2011)Google Scholar