Picture for Joakim Tutt

Joakim Tutt

Provable Performance Guarantees of Copy Detection Patterns

Add code
Sep 26, 2024
Figure 1 for Provable Performance Guarantees of Copy Detection Patterns
Figure 2 for Provable Performance Guarantees of Copy Detection Patterns
Figure 3 for Provable Performance Guarantees of Copy Detection Patterns
Figure 4 for Provable Performance Guarantees of Copy Detection Patterns
Viaarxiv icon

Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns

Add code
Dec 14, 2022
Viaarxiv icon

Digital twins of physical printing-imaging channel

Add code
Oct 28, 2022
Viaarxiv icon

Printing variability of copy detection patterns

Add code
Oct 11, 2022
Figure 1 for Printing variability of copy detection patterns
Figure 2 for Printing variability of copy detection patterns
Figure 3 for Printing variability of copy detection patterns
Figure 4 for Printing variability of copy detection patterns
Viaarxiv icon

Anomaly localization for copy detection patterns through print estimations

Add code
Sep 29, 2022
Figure 1 for Anomaly localization for copy detection patterns through print estimations
Figure 2 for Anomaly localization for copy detection patterns through print estimations
Figure 3 for Anomaly localization for copy detection patterns through print estimations
Figure 4 for Anomaly localization for copy detection patterns through print estimations
Viaarxiv icon

Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach

Add code
Jun 25, 2022
Figure 1 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Figure 2 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Figure 3 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Figure 4 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Viaarxiv icon

Mobile authentication of copy detection patterns

Add code
Mar 04, 2022
Figure 1 for Mobile authentication of copy detection patterns
Figure 2 for Mobile authentication of copy detection patterns
Figure 3 for Mobile authentication of copy detection patterns
Figure 4 for Mobile authentication of copy detection patterns
Viaarxiv icon

Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?

Add code
Oct 06, 2021
Figure 1 for Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?
Figure 2 for Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?
Figure 3 for Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?
Figure 4 for Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?
Viaarxiv icon