Skip to main content

Counterfeit Detection by Smartphone Using Double-Encoded Two-Dimensional Code

  • Conference paper
  • First Online:
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 612))

Abstract

We propose a counterfeit detection system that uses a double-coding procedure to encode two-dimensional code. The system uses ordinary black ink, which absorbs infrared rays, and special black ink, which transmits infrared rays. Because special black is copied as ordinary black when replicated by a copying machine, the double-encoded data is lost, thereby enabling the item identified by the code to be identified as a counterfeit. The double-coded two-dimensional code is decoded by comparing the images obtained under white light and infrared radiation. If the data to be double-coded is encrypted, the counterfeiter cannot forge the double-coded two-dimensional code. Duplication can also be detected by using the data to be double-coded as encrypted data of the serial number.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. ISO/IEC 16022:2006 Information technology – automatic identification and data capture techniques – data matrix bar code symbology specification

    Google Scholar 

  2. ISO/IEC 18004:2006 Information technology – automatic identification and data capture techniques – QR code 2005 bar code symbology specification

    Google Scholar 

  3. Hara, M.: Method for producing two-dimensional code reader for reading the two-dimensional code. US patent application 20090323959, Denso Wave Inc., Patent and Trademark Office (2009)

    Google Scholar 

  4. Vongpradhip, S., Rungraungsilp, S.: QR code using invisible watermarking in frequency domain. In: 9th International Conference on ICT and Knowledge Engineering, pp. 47–52 (2012)

    Google Scholar 

  5. Hsu, F., Wu, M., Wang, S.: Dual-watermarking by QR-code applications in image processing. In: UIC-ATC 2012 Proceedings of the 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, pp. 638–643 (2012)

    Google Scholar 

  6. Teraura, N., Sakurai, K.: Evaluation of the identity and compatibility of multi-valued cells in two-dimensional codes using smartphones. In: 2014 IEEE International Conference on Service-Oriented Computing and Applications, pp. 252–259 (2014)

    Google Scholar 

  7. Teraura, N., Sakurai, K.: Proposal of multi-value cell structure high density two-dimensional codes and evaluation of readability using smartphones. In: Proceedings of 7th IFIP International Conference on New TechnologieMobility and Security, 1162546-D (2015)

    Google Scholar 

  8. http://www.gs1.org/docs/barcodes/GS1_DataMatrix_Guideline.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nobuyuki Teraura .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Teraura, N. (2018). Counterfeit Detection by Smartphone Using Double-Encoded Two-Dimensional Code. In: Barolli, L., Enokido, T. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2017. Advances in Intelligent Systems and Computing, vol 612. Springer, Cham. https://doi.org/10.1007/978-3-319-61542-4_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-61542-4_43

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-61541-7

  • Online ISBN: 978-3-319-61542-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics