Part of the book series:Lecture Notes in Computer Science ((LNSC,volume 9241))
Included in the following conference series:
1037Accesses
Abstract
The authentication system is an effective measure in avoiding counterfeit products. In order to enhance the security and to reduce the cost, artifact-metrics authentication is expected to replace the existing cryptography-based authentication system since it utilizes the intrinsic individual differences of products. In this paper, we propose a new artifact-metric-based individual authentication system that authenticates bottles of wine. The proposed system takes the light pattern of a light emitting diode transmitted through a bottle of wine as an image, and uses it as a fingerprint. Based on experimental results, we show that the system distinguishes different bottles of wine correctly, and that the authentication is sufficiently tolerant to dirt and flaws on the surface of the bottle.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 5719
- Price includes VAT (Japan)
- Softcover Book
- JPY 7149
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
The drinks business: FAKE WINE NOW ACCOUNTS FOR 20% OF MARKET.http://www.thedrinksbusiness.com/. Accessed 2 Mar 2015
Matsumoto, H., Matsumoto, T.: Artifact-metric Systems. In: Workshop Record of ISEC, vol. 100, no. 323, pp. 7–14 (2000)
Fukuda, Y., Matsumoto, T.: An artifact-metric system which extracts values unique to individual paper. In: Workshop Record of ISEC, vol. 110, no. 113, pp. 41–46 (2010). (In Japanese)
Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Sci. AAAS297(5589), 2026–2030 (2002)
Tuyls, P., Škorić, B.: Strong authentication with physical unclonable functions. In: Petković, M., Jonker, W. (eds.) Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications, pp. 133–148. Springer, Heidelberg (2007)
Škorić, B., Tuyls, P., Ophey, W.: Robust key extraction from physical uncloneable functions. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 407–422. Springer, Heidelberg (2005)
Yagasaki, R., Sakiyama, K.: A study of artifact-metrics based on the transmitted light through wine bottles. In: Proceedings of the IEICE General Conference, A-7-9, p. 143 (2015). (In Japanese)
Ito, K., Nakajima, H., Kobayashi, K., Aoki, T., Higuchi, T.: A fingerprint matching algorithm using phase-only correlation. IEICE Trans. Fundam.E87A, 682–691 (2004)
Jain, A.K.: Fundamentals of Digital Image Processing. Prentice Hall Information and System Science Series. Prentice Hall, Englewood Cliffs (1989)
Brigham, E.O.: The Fast Fourier Transform. Prentice Hall, Englewood Cliffs (1974)
Author information
Authors and Affiliations
Department of Informatics, The University of Electro-Communications, Tokyo, Japan
Reina Yagasaki & Kazuo Sakiyama
- Reina Yagasaki
Search author on:PubMed Google Scholar
- Kazuo Sakiyama
Search author on:PubMed Google Scholar
Corresponding author
Correspondence toReina Yagasaki.
Editor information
Editors and Affiliations
Tokyo Institute of Technology, Tokyo, Japan
Keisuke Tanaka
Internet Initiative Japan Inc., Tokyo, Japan
Yuji Suga
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Yagasaki, R., Sakiyama, K. (2015). Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper). In: Tanaka, K., Suga, Y. (eds) Advances in Information and Computer Security. IWSEC 2015. Lecture Notes in Computer Science(), vol 9241. Springer, Cham. https://doi.org/10.1007/978-3-319-22425-1_20
Download citation
Published:
Publisher Name:Springer, Cham
Print ISBN:978-3-319-22424-4
Online ISBN:978-3-319-22425-1
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative