dHash-based Anti-Counterfeiting Scheme: Against Tag Re-application Attacks on Batik Tulis

Genta Nazwar Tarempa, Amril Syalim

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

Batik Tulis is a cultural heritage that has historical and economic value. Batik Tulis has its own uniqueness, where Batik Tulis is different from each other even though it has the same motif and is made by the same producer, because Batik Tulis is made manually (handmade) using a tool called "canting". This uniqueness makes Batik Tulis has a fairly high economic value. However, this uniqueness is often exploited by irresponsible parties, by counterfeiting Batik Tulis. In order to address this issue, we developed an anti-counterfeiting scheme that focuses on previously developed tag re-application attacks detection. This approach utilizes of NFC tags, public key cryptography and Perceptual Hash Function (PHF), i.e., difference hash (dHash). dHash provides the relationship between the product and the data stored by the NFC tag. The scheme we have developed is proven to be able to detect tag re-application attack scenarios that the previous scheme could not detect.

Original languageEnglish
Title of host publication2021 International Seminar on Machine Learning, Optimization, and Data Science, ISMODE 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages63-68
Number of pages6
ISBN (Electronic)9781665405447
DOIs
Publication statusPublished - 29 Mar 2022
Event2021 International Seminar on Machine Learning, Optimization, and Data Science, ISMODE 2021 - Jakarta, Indonesia
Duration: 29 Jan 2022 → …

Publication series

Name2021 International Seminar on Machine Learning, Optimization, and Data Science, ISMODE 2021

Conference

Conference2021 International Seminar on Machine Learning, Optimization, and Data Science, ISMODE 2021
Country/TerritoryIndonesia
CityJakarta
Period29/01/22 → …

Keywords

  • Anti-counterfeiting
  • Batik
  • Difference hash
  • Hash
  • Nfc

Fingerprint

Dive into the research topics of 'dHash-based Anti-Counterfeiting Scheme: Against Tag Re-application Attacks on Batik Tulis'. Together they form a unique fingerprint.

Cite this