Skip to main content

Open-Set Product Authentication Based on Deep Texture Verification

  • Conference paper
  • First Online:
Image and Graphics (ICIG 2021)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 12888))

Included in the following conference series:

Abstract

The authenticity of consumer products has a significant impact on the economic and social issues of countries around the world. Due to the recent advancements in machine learning, there emerges some authentication techniques, in a close-set setting, based on texture features extracted from the product surfaces. However, the existing techniques have suffered from the problem of low accuracies or inability to deal with unknown classes in open-set authentication. In this work, we build an anti-counterfeiting system that works for consumer products in an open-set scenario. Different from other anti-counterfeiting methods, this work considers the problem of product authentication as a simple texture verification process. It allows the authentication being conducted under both close-set and open-set scenarios by a distance comparison operation with some customized metrics in the embedding space. We evaluate our system with two state-of-the-art texture databases. Experimental results show that the proposed system achieves 89.91% open-set authentication accuracy for a feature of 256 dimensions in the Outex texture database.

This work was supported in part by Guangdong Basic and Applied Basic Research Foundation (Grant 2020A1515010563, 2019B151502001), National Science Foundation of China (Grant 62072313), and Shenzhen R&D Program (Grant JCYJ20180305124550725, 20200813110043002, JCYJ20200109105008228).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Global Brand Counterfeiting Report, 2018. Research and Market Technical Report No. 4438394, December 2017

    Google Scholar 

  2. Burghouts, G.J., Geusebroek, J.M.: Material-specific adaptation of color invariant features. Pattern Recogn. Lett. 30(3), 306–313 (2009)

    Article  Google Scholar 

  3. Chen, C., Zhou, B., Mow, W.H.: RA code: a robust and aesthetic code for resolution-constrained applications. IEEE Trans. Circ. Syst. Video Technol. 28(11), 3300–3312 (2018)

    Article  Google Scholar 

  4. He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 770–778 (2016)

    Google Scholar 

  5. Kim, S., Kim, D., Cho, M., Kwak, S.: Proxy anchor loss for deep metric learning. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 3238–3247 (2020)

    Google Scholar 

  6. Li, X., Yu, L., Fu, C.W., Fang, M., Heng, P.A.: Revisiting metric learning for few-shot image classification. Neurocomputing 406, 49–58 (2020)

    Article  Google Scholar 

  7. Movshovitz-Attias, Y., Toshev, A., Leung, T.K., Ioffe, S., Singh, S.: No fuss distance metric learning using proxies. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 360–368 (2017)

    Google Scholar 

  8. Norouzi, M., et al.: Zero-shot learning by convex combination of semantic embeddings. arXiv preprint arXiv:1312.5650 (2013)

  9. Oh Song, H., Xiang, Y., Jegelka, S., Savarese, S.: Deep metric learning via lifted structured feature embedding. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 4004–4012 (2016)

    Google Scholar 

  10. Ojala, T., Maenpaa, T., Pietikainen, M., Viertola, J., Kyllonen, J., Huovinen, S.: Outex: new framework for empirical evaluation of texture analysis algorithms. In: Object Recognition Supported by User Interaction for Service Robots, vol. 1, pp. 701–706. IEEE (2002)

    Google Scholar 

  11. Ojala, T., Pietikainen, M., Maenpaa, T.: Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Anal. Mach. Intell. 24(7), 971–987 (2002)

    Article  Google Scholar 

  12. Pukelsheim, F.: The three sigma rule. Am. Stat. 48(2), 88–91 (1994)

    MathSciNet  Google Scholar 

  13. Qian, Q., Shang, L., Sun, B., Hu, J., Li, H., Jin, R.: SoftTriple loss: deep metric learning without triplet sampling. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 6450–6458 (2019)

    Google Scholar 

  14. Sanakoyeu, A., Tschernezki, V., Buchler, U., Ommer, B.: Divide and conquer the embedding space for metric learning. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 471–480 (2019)

    Google Scholar 

  15. Schraml, R., Debiasi, L., Kauba, C., Uhl, A.: On the feasibility of classification-based product package authentication. In: IEEE Workshop on International Forensics and Security (WIFS), pp. 1–6 (2017)

    Google Scholar 

  16. Sharma, A., Srinivasan, V., Kanchan, V., Subramanian, L.: The fake vs real goods problem: microscopy and machine learning to the rescue. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 2011–2019 (2017)

    Google Scholar 

  17. Sun, Y., Wang, X., Tang, X.: Hybrid deep learning for face verification. IEEE Trans. Pattern Anal. Mach. Intell. 38(10), 1997–2009 (2015)

    Article  Google Scholar 

  18. Tan, X., Triggs, B.: Enhanced local texture feature sets for face recognition under difficult lighting conditions. IEEE Trans. Image Process. 19(6), 1635–1650 (2010)

    Article  MathSciNet  Google Scholar 

  19. Wang, X., Ye, Y., Gupta, A.: Zero-shot recognition via semantic embeddings and knowledge graphs. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6857–6866 (2018)

    Google Scholar 

  20. Wong, C.W., Wu, M.: Counterfeit detection based on unclonable feature of paper using mobile camera. IEEE Trans. Inf. Forensics Secur. 12(8), 1885–1899 (2017)

    Article  Google Scholar 

  21. Wu, C.Y., Manmatha, R., Smola, A.J., Krahenbuhl, P.: Sampling matters in deep embedding learning. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 2840–2848 (2017)

    Google Scholar 

  22. Zhai, A., Wu, H.Y.: Classification is a strong baseline for deep metric learning. In: Proceedings of the British Machine Vision Conference (BMVC) (2019)

    Google Scholar 

  23. Zhang, L., Chen, C., Mow, W.H.: Accurate modeling and efficient estimation of the print-capture channel with application in barcoding. IEEE Trans. Image Process. 28(1), 464–478 (2018)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changsheng Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cai, S., Zhao, L., Chen, C. (2021). Open-Set Product Authentication Based on Deep Texture Verification. In: Peng, Y., Hu, SM., Gabbouj, M., Zhou, K., Elad, M., Xu, K. (eds) Image and Graphics. ICIG 2021. Lecture Notes in Computer Science(), vol 12888. Springer, Cham. https://doi.org/10.1007/978-3-030-87355-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-87355-4_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-87354-7

  • Online ISBN: 978-3-030-87355-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics