Abstract
The authenticity of consumer products has a significant impact on the economic and social issues of countries around the world. Due to the recent advancements in machine learning, there emerges some authentication techniques, in a close-set setting, based on texture features extracted from the product surfaces. However, the existing techniques have suffered from the problem of low accuracies or inability to deal with unknown classes in open-set authentication. In this work, we build an anti-counterfeiting system that works for consumer products in an open-set scenario. Different from other anti-counterfeiting methods, this work considers the problem of product authentication as a simple texture verification process. It allows the authentication being conducted under both close-set and open-set scenarios by a distance comparison operation with some customized metrics in the embedding space. We evaluate our system with two state-of-the-art texture databases. Experimental results show that the proposed system achieves 89.91% open-set authentication accuracy for a feature of 256 dimensions in the Outex texture database.
This work was supported in part by Guangdong Basic and Applied Basic Research Foundation (Grant 2020A1515010563, 2019B151502001), National Science Foundation of China (Grant 62072313), and Shenzhen R&D Program (Grant JCYJ20180305124550725, 20200813110043002, JCYJ20200109105008228).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Global Brand Counterfeiting Report, 2018. Research and Market Technical Report No. 4438394, December 2017
Burghouts, G.J., Geusebroek, J.M.: Material-specific adaptation of color invariant features. Pattern Recogn. Lett. 30(3), 306–313 (2009)
Chen, C., Zhou, B., Mow, W.H.: RA code: a robust and aesthetic code for resolution-constrained applications. IEEE Trans. Circ. Syst. Video Technol. 28(11), 3300–3312 (2018)
He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 770–778 (2016)
Kim, S., Kim, D., Cho, M., Kwak, S.: Proxy anchor loss for deep metric learning. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 3238–3247 (2020)
Li, X., Yu, L., Fu, C.W., Fang, M., Heng, P.A.: Revisiting metric learning for few-shot image classification. Neurocomputing 406, 49–58 (2020)
Movshovitz-Attias, Y., Toshev, A., Leung, T.K., Ioffe, S., Singh, S.: No fuss distance metric learning using proxies. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 360–368 (2017)
Norouzi, M., et al.: Zero-shot learning by convex combination of semantic embeddings. arXiv preprint arXiv:1312.5650 (2013)
Oh Song, H., Xiang, Y., Jegelka, S., Savarese, S.: Deep metric learning via lifted structured feature embedding. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 4004–4012 (2016)
Ojala, T., Maenpaa, T., Pietikainen, M., Viertola, J., Kyllonen, J., Huovinen, S.: Outex: new framework for empirical evaluation of texture analysis algorithms. In: Object Recognition Supported by User Interaction for Service Robots, vol. 1, pp. 701–706. IEEE (2002)
Ojala, T., Pietikainen, M., Maenpaa, T.: Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Anal. Mach. Intell. 24(7), 971–987 (2002)
Pukelsheim, F.: The three sigma rule. Am. Stat. 48(2), 88–91 (1994)
Qian, Q., Shang, L., Sun, B., Hu, J., Li, H., Jin, R.: SoftTriple loss: deep metric learning without triplet sampling. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 6450–6458 (2019)
Sanakoyeu, A., Tschernezki, V., Buchler, U., Ommer, B.: Divide and conquer the embedding space for metric learning. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 471–480 (2019)
Schraml, R., Debiasi, L., Kauba, C., Uhl, A.: On the feasibility of classification-based product package authentication. In: IEEE Workshop on International Forensics and Security (WIFS), pp. 1–6 (2017)
Sharma, A., Srinivasan, V., Kanchan, V., Subramanian, L.: The fake vs real goods problem: microscopy and machine learning to the rescue. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 2011–2019 (2017)
Sun, Y., Wang, X., Tang, X.: Hybrid deep learning for face verification. IEEE Trans. Pattern Anal. Mach. Intell. 38(10), 1997–2009 (2015)
Tan, X., Triggs, B.: Enhanced local texture feature sets for face recognition under difficult lighting conditions. IEEE Trans. Image Process. 19(6), 1635–1650 (2010)
Wang, X., Ye, Y., Gupta, A.: Zero-shot recognition via semantic embeddings and knowledge graphs. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6857–6866 (2018)
Wong, C.W., Wu, M.: Counterfeit detection based on unclonable feature of paper using mobile camera. IEEE Trans. Inf. Forensics Secur. 12(8), 1885–1899 (2017)
Wu, C.Y., Manmatha, R., Smola, A.J., Krahenbuhl, P.: Sampling matters in deep embedding learning. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 2840–2848 (2017)
Zhai, A., Wu, H.Y.: Classification is a strong baseline for deep metric learning. In: Proceedings of the British Machine Vision Conference (BMVC) (2019)
Zhang, L., Chen, C., Mow, W.H.: Accurate modeling and efficient estimation of the print-capture channel with application in barcoding. IEEE Trans. Image Process. 28(1), 464–478 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Cai, S., Zhao, L., Chen, C. (2021). Open-Set Product Authentication Based on Deep Texture Verification. In: Peng, Y., Hu, SM., Gabbouj, M., Zhou, K., Elad, M., Xu, K. (eds) Image and Graphics. ICIG 2021. Lecture Notes in Computer Science(), vol 12888. Springer, Cham. https://doi.org/10.1007/978-3-030-87355-4_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-87355-4_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-87354-7
Online ISBN: 978-3-030-87355-4
eBook Packages: Computer ScienceComputer Science (R0)