1,649 resources related to Counterfeiting
- Topics related to Counterfeiting
- IEEE Organizations related to Counterfeiting
- Conferences related to Counterfeiting
- Periodicals related to Counterfeiting
- Most published Xplore authors for Counterfeiting
The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted full papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions,will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.
The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.
The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.
With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSocCISTC(Communications & Information Security Technical Community), and IEEE ComSocONTC(Optical Networking Technical Community), the ICACT(International Conference onAdvanced Communications Technology) Conference has been providing an open forum forscholars, researchers, and engineers to the extensive exchange of information on newlyemerging technologies, standards, services, and applications in the area of the advancedcommunications technology. The conference official language is English. All the presentedpapers have been published in the Conference Proceedings, and posted on the ICACT Websiteand IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Awardlist has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papersare subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issue by GIRI
The conference focuses on networking, sensing and control three areas, but also opens to some emerging subjects in information technology, such as data science and machine learning.
The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.
Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Component parts, hybrid microelectronics, materials, packaging techniques, and manufacturing technology.
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
2008 2nd International Conference on Anti-counterfeiting, Security and Identification, 2008
Anti-counterfeiting is a global problem. Brand owners suffer from huge losses due to counterfeits every year, and turn to advanced solutions to gain back control over their brands. An anti-counterfeiting system normally encodes a digital identifier in a physical identifier in essence. The physical identifier then is attached with the product. If the physical identifier is cloneable or reusable, the ...
2010 International Conference on Machine Learning and Cybernetics, 2010
Anti-collision in RFID will occur when multiple tags or readers transmit data simultaneously, and these data will affect each other and cannot be recognized. While anti-counterfeiting in RFID occurs when a duplicated tag is used in the goods, and the reader will not be able to discover that it is a fake tag. Anti-collision and anti-counterfeiting mechanisms are usually operated ...
2018 IEEE 18th International Conference on Communication Technology (ICCT), 2018
Micro-character is a widely used method in the field of anti-counterfeiting. This method puts forward a high demand for the graphic information processing and printing reproducing technology, so it is used in securities and bills. According to the feature of carrier image and the requirement of printing technology, this method hides the halftone-micro-character information in the carrier image to realize ...
2018 23rd International Scientific-Professional Conference on Information Technology (IT), 2018
Counterfeit wine presents a significant issue for winemakers since it affects producer's reputation, profit and most importantly it can be harmful for the consumers. This paper describes a brand protection and anti-counterfeiting solution for wine industry based on smart tags and Cloud enabled technologies. The main idea behind smart tags is to utilize quick response codes and functional inks supported ...
2009 11th International Conference on Advanced Communication Technology, 2009
One of the main properties of digital watermarking methods is their security against attacks. In this paper, a novel attack against an adaptive semi- fragile image watermarking is proposed. In this attack, watermarking key and watermark are estimated by using several watermarked images. In order to improve the watermarking scheme against the proposed attack, the entropy of image blocks is ...
Anti-counterfeiting is a global problem. Brand owners suffer from huge losses due to counterfeits every year, and turn to advanced solutions to gain back control over their brands. An anti-counterfeiting system normally encodes a digital identifier in a physical identifier in essence. The physical identifier then is attached with the product. If the physical identifier is cloneable or reusable, the counterfeit products could easily cheat the anti- counterfeiting system. This paper continues our work on the anti- counterfeiting system applying phosphor physical uncloneable function (PUF). An offline anti-counterfeiting system is proposed in this paper prevailing over the previously proposed online system as it does not require any online database. Furthermore, a prototype software running on the commodity mobile phone of consumers for verification is designed.
Anti-collision in RFID will occur when multiple tags or readers transmit data simultaneously, and these data will affect each other and cannot be recognized. While anti-counterfeiting in RFID occurs when a duplicated tag is used in the goods, and the reader will not be able to discover that it is a fake tag. Anti-collision and anti-counterfeiting mechanisms are usually operated separately in the past, but they may have to perform at the same time in some cases. For example, when RFID-based exhibition tickets are used for entrance purpose both mechanisms will be needed simultaneously. To counter forgery attack, it is important that we have to meet not only anti-collision but also anti-counterfeiting requirement. Therefore, in this paper, we propose a suitable communication protocol of RFID tag with the function of anticollision and anti-counterfeiting called A Combined Active RFID Tag Collision Resolution Protocol Against Counterfeiting (CRPAC). In our proposed scheme, when the anti-collision mechanism is in progress, the anti- counterfeiting scheme is working along with it. Eventually, the new scheme effectively reduces the workload of RFID system and significantly decreases collision probability of the active tags.
Micro-character is a widely used method in the field of anti-counterfeiting. This method puts forward a high demand for the graphic information processing and printing reproducing technology, so it is used in securities and bills. According to the feature of carrier image and the requirement of printing technology, this method hides the halftone-micro-character information in the carrier image to realize the effect of anti-counterfeiting and information hiding, and achieves the effect of artistic performance. The hidden effect of information is a key factor reflecting the level of this technology, in particular, the structural characteristics of square Chinese characters put forward higher requirements for the realization of this method. By matching the features of carrier image with the templates, using the calibration result of the templates and the unit image to select the best matching template, and use this template to fill the unit image to achieve the effect of anti- counterfeiting and information hiding, and achieve the artistic performance.
Counterfeit wine presents a significant issue for winemakers since it affects producer's reputation, profit and most importantly it can be harmful for the consumers. This paper describes a brand protection and anti-counterfeiting solution for wine industry based on smart tags and Cloud enabled technologies. The main idea behind smart tags is to utilize quick response codes and functional inks supported by the Cloud system and two-way communication between the winemaker and end-user. The proposed system is expected to make wine counterfeiting hard and unprofitable.
One of the main properties of digital watermarking methods is their security against attacks. In this paper, a novel attack against an adaptive semi- fragile image watermarking is proposed. In this attack, watermarking key and watermark are estimated by using several watermarked images. In order to improve the watermarking scheme against the proposed attack, the entropy of image blocks is utilized. Using entropy is compatible with Human Visual System (HVS); therefore it is suitable to determine the weight of watermark in image blocks. Since entropy is a sensitive feature, it is used to improve the watermarking method performance against the proposed attack. It is shown that this modification does not affect the fidelity of the watermarked images.
In order to solve the application problems of EPC Network, the anti- counterfeiting system with anti-counterfeiting model and rules are used in this paper. By research on the supply chains in the logistics field, we set up models to represent the real supply chain and we also work out some rules based on the model to achieve the anti-counterfeiting function. A basic model is shown as an example to represent one supply chain model of a product. The system using model and rules shows the right anti-counterfeiting results in several test situations and also the system should be run under some conditions. The supply chain model and related rules in the system can cover most anti-counterfeiting cases and thus the applications of EPC Network can be easily achieved.
By the developing of information technology, anti-counterfeiting technology developed from non-digital way to digital way. In this paper, a convenient anti-counterfeiting system including identity authentication, anti-counterfeit query and electronic payment is put forward by using digital signature and encryption technology. In purchaser subsystem, mobile terminal with J2ME supported query the anti-counterfeiting information by short message service (SMS). System network topology and communication protocols of SMS message format have discussed in the following parts of this paper.
In this paper, we proposed the development and implementation of novel paper- based UHF RFID designs for anti-counterfeiting and security. Miniaturization and global-band antenna configurations and utilization of inkjet printing techniques in/on organic substrates, such as paper, that will enable the low cost and large-scale implementation of RFID-enabled semi-autonomous sensors for "cognitive-intelligence" applications, are also discussed for a variety of security-related areas, featuring a great potential for low-cost large-scale solutions.
Integrated circuit counterfeiting is a significant and growing problem for electronics manufacturers, system integrators, and end users. The widespread prevalence of counterfeit ICs in the manufacturing supply chain raises significant security and reliability concerns. To combat IC counterfeiting, a secure chip odometer was designed to provide ICs with both a secure gauge of use/age and an authentication of provenance enabling simple, secure, robust differentiation between genuine and counterfeit parts. The secure chip odometers employ chained one-shot binary aging elements (BAEs) that use intentional accelerated device aging to measure use and age of the chip. A prototype secure odometer was taped out on a 1.2mm × 1.7mm testchip in a 65nm bulk CMOS process as a proof-of-concept.
Counterfeiting is now a global problem that accounts for close to 9% of all worldwide trade, according to the International Anti-Counterfeiting Association (IACA). Unfortunately counterfeiting is no longer restricted to clothes, designer watches, and stereos. The high technology industry has been hugely impacted by this activity. The reason is simple, economics, and availability. Counterfeiters, many of whom are agents of organized crime, wage campaigns that do little more than steal the intellectual property of large technology firms. Fortune 500 technology companies currently employ teams that do little less than conceive ways to protect the companies IP and secure their products - but most importantly secure their brand. Many of these programs entail the use of covert, or invisible, technologies to mark authentic product. How serious is this issue, important enough to have some of the worlds top CEOs spend an entire day at the World Economic Forum discussing how to combat the counterfeiting issue. In today's world, many companies are turning to new "Covert" technologies to mark their products. Tools such as chemically altered dyes and inks are employed to invisibly label authentic products, and to foil the efforts of counterfeiting criminals.
This standard establishes criteria for design analysis for qualification, quality, and reliability of rechargeable lithium ion and lithium ion polymer batteries for cellular telephone applications. Also included in the standard are: battery pack electrical and mechanical construction, packaging technologies, and pack and cell level charge and discharge controls and overall system considerations.