{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:28:51Z","timestamp":1760149731889,"version":"build-2065373602"},"reference-count":23,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Lembaga Pengelola Dana Pendidikan (LPDP)\/ the Indonesia Endowment Fund for Education Riset Inovatif Produktif (RISPRO)","award":["PRJ-8\/LPDP\/LPDP.4\/2022"],"award-info":[{"award-number":["PRJ-8\/LPDP\/LPDP.4\/2022"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Counterfeit products have become a pervasive problem in the global marketplace, necessitating effective strategies to protect both consumers and brands. This study examines the role of cybersecurity in addressing counterfeiting issues, specifically focusing on a multi-level grayscale watermark-based authentication system. The system comprises a generator responsible for creating a secure 2D code, and an authenticator designed to extract watermark information and verify product authenticity. To authenticate the secure 2D code, we propose various features, including the analysis of the spatial domain, frequency domain, and grayscale watermark distribution. Furthermore, we emphasize the importance of selecting appropriate interpolation methods to enhance counterfeit detection. Our proposed approach demonstrates remarkable performance, achieving precision, recall, and specificities surpassing 84.8%, 83.33%, and 84.5%, respectively, across different datasets.<\/jats:p>","DOI":"10.3390\/computers12090183","type":"journal-article","created":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T09:57:56Z","timestamp":1694685476000},"page":"183","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing Counterfeit Detection with Multi-Features on Secure 2D Grayscale Codes"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3337-7392","authenticated-orcid":false,"given":"Bimo Sunarfri","family":"Hantono","sequence":"first","affiliation":[{"name":"Department of Electrical and Information Engineering, Universitas Gadjah Mada, Yogyakarta 55281, Indonesia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8558-898X","authenticated-orcid":false,"given":"Syukron Abu Ishaq","family":"Alfarozi","sequence":"additional","affiliation":[{"name":"Department of Electrical and Information Engineering, Universitas Gadjah Mada, Yogyakarta 55281, Indonesia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6158-8483","authenticated-orcid":false,"given":"Azkario Rizky","family":"Pratama","sequence":"additional","affiliation":[{"name":"Department of Electrical and Information Engineering, Universitas Gadjah Mada, Yogyakarta 55281, Indonesia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3082-5778","authenticated-orcid":false,"given":"Ahmad Ataka Awwalur","family":"Rizqi","sequence":"additional","affiliation":[{"name":"Department of Electrical and Information Engineering, Universitas Gadjah Mada, Yogyakarta 55281, Indonesia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0207-261X","authenticated-orcid":false,"given":"I Wayan","family":"Mustika","sequence":"additional","affiliation":[{"name":"Department of Electrical and Information Engineering, Universitas Gadjah Mada, Yogyakarta 55281, Indonesia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5832-5559","authenticated-orcid":false,"given":"Mardhani","family":"Riasetiawan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Electronics, Universitas Gadjah Mada, Yogyakarta 55281, Indonesia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1172-4528","authenticated-orcid":false,"given":"Anna Maria Sri","family":"Asih","sequence":"additional","affiliation":[{"name":"Department of Mechanical and Industrial Engineering, Universitas Gadjah Mada, Yogyakarta 55281, Indonesia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2023,9,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"100361","DOI":"10.1016\/j.mtchem.2020.100361","article-title":"Luminophoric organic molecules for anticounterfeit printing ink applications: An up-to-date review","volume":"18","author":"Muthamma","year":"2020","journal-title":"Mater. Today Chem."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"18011","DOI":"10.1038\/s41598-017-18147-7","article-title":"Design, fabrication and characterization of computer generated holograms for anti-counterfeiting applications using OAM beams as light decoders","volume":"7","author":"Ruffato","year":"2017","journal-title":"Sci. Rep."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"13013","DOI":"10.1021\/acs.chemrev.1c00294","article-title":"Metasurface-driven optically variable devices","volume":"121","author":"Jung","year":"2021","journal-title":"Chem. Rev."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1117\/12.528055","article-title":"Digital authentication with copy-detection patterns","volume":"Volume 5310","year":"2004","journal-title":"Optical Security and Counterfeit Deterrence Techniques V"},{"doi-asserted-by":"crossref","unstructured":"Khermaza, E., Tkachenko, I., and Picard, J. (2021, January 7\u201310). Can copy detection patterns be copied? evaluating the performance of attacks and highlighting the role of the detector. Proceedings of the 2021 IEEE International Workshop on Information Forensics and Security (WIFS), Montpellier, France.","key":"ref_5","DOI":"10.1109\/WIFS53200.2021.9648384"},{"unstructured":"Moretto, T. (2018). Secure 2D Barcodes Based on Visual Cryptography. [Master\u2019s Thesis, Universit\u00e0 Ca\u2019Foscari Venezia]. Available online: http:\/\/dspace.unive.it\/bitstream\/handle\/10579\/13391\/844996-1224864.pdf.","key":"ref_6"},{"doi-asserted-by":"crossref","unstructured":"Pan, H., Chen, Y.C., Yang, L., Xue, G., You, C.W., and Ji, X. (2019, January 21\u201325). mqrcode: Secure qr code using nonlinearity of spatial frequency in light. Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, Los Cabos, Mexico.","key":"ref_7","DOI":"10.1145\/3300061.3345428"},{"key":"ref_8","first-page":"19","article-title":"A new method for ciphering a message using QR code","volume":"6","author":"Thamer","year":"2016","journal-title":"Comput. Sci. Eng"},{"doi-asserted-by":"crossref","unstructured":"Krombholz, K., Fr\u00fchwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., and Weippl, E. (2014, January 22\u201327). QR code security: A survey of attacks and challenges for usable security. Proceedings of the Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Greece.","key":"ref_9","DOI":"10.1007\/978-3-319-07620-1_8"},{"doi-asserted-by":"crossref","unstructured":"Picard, J., Landry, P., and Bolay, M. (2021, January 24\u201327). Counterfeit Detection with QR Codes. Proceedings of the 21st ACM Symposium on Document Engineering, New York, NY, USA.","key":"ref_10","DOI":"10.1145\/3469096.3474924"},{"key":"ref_11","first-page":"44","article-title":"CNN-Based Model for Copy Detection Pattern Estimation and Authentication","volume":"12","author":"Alfarozi","year":"2023","journal-title":"J. Nas. Tek. Elektro Dan Teknol. Inf."},{"doi-asserted-by":"crossref","unstructured":"Shi, D., Wang, Q., and Liang, C. (2008, January 27\u201330). Digital Watermarking Algorithm for Print-and-Scan Process Used for Printed Matter Anti-counterfeit. Proceedings of the 2008 Congress on Image and Signal Processing, Sanya, China.","key":"ref_12","DOI":"10.1109\/CISP.2008.662"},{"doi-asserted-by":"crossref","unstructured":"Zhang, P., Zhang, W., and Yu, N. (2019, January 24\u201326). Copy detection pattern-based authentication for printed documents with multi-dimensional features. Proceedings of the 2019 7th International Conference on Information, Communication and Networks, ICICN 2019, Macau, China.","key":"ref_13","DOI":"10.1109\/ICICN.2019.8834939"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1102","DOI":"10.1049\/iet-ipr.2012.0297","article-title":"Copy detection pattern-based document protection for variable media","volume":"6","author":"Dirik","year":"2012","journal-title":"IET Image Process."},{"doi-asserted-by":"crossref","unstructured":"Chaban, R., Taran, O., Tutt, J., Holotyak, T., Bonev, S., and Voloshynovskiy, S. (2021, January 7\u201310). Machine learning attack on copy detection patterns: Are 1 \u00d7 1 patterns cloneable?. Proceedings of the 2021 IEEE International Workshop on Information Forensics and Security, WIFS 2021, Montpellier, France.","key":"ref_15","DOI":"10.1109\/WIFS53200.2021.9648387"},{"doi-asserted-by":"crossref","unstructured":"Taran, O., Bonev, S., and Voloshynovskiy, S. (2019, January 12\u201317). Clonability of Anti-counterfeiting Printable Graphical Codes: A Machine Learning Approach. Proceedings of the ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing, Brighton, UK.","key":"ref_16","DOI":"10.1109\/ICASSP.2019.8682967"},{"unstructured":"Kingma, D.P., and Ba, J. (2014). Adam: A method for stochastic optimization. arXiv.","key":"ref_17"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1186\/s13635-023-00140-5","article-title":"Mobile authentication of copy detection patterns","volume":"2023","author":"Taran","year":"2023","journal-title":"EURASIP J. Inf. Secur."},{"doi-asserted-by":"crossref","unstructured":"Hartley, R., and Zisserman, A. (2003). Multiple View Geometry in Computer Vision, Cambridge University Press.","key":"ref_19","DOI":"10.1017\/CBO9780511811685"},{"doi-asserted-by":"crossref","unstructured":"Schulze, C., Schreyer, M., Stahl, A., and Breuel, T. (2009, January 26\u201328). Using DCT features for printing technique and copy detection. Proceedings of the Advances in Digital Forensics V: Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA.","key":"ref_20","DOI":"10.1007\/978-3-642-04155-6_7"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"3094","DOI":"10.1109\/JSTARS.2020.2999961","article-title":"Texture-Aware Deblurring for Remote Sensing Images Using L0-Based Deblurring and L2- Based Fusion","volume":"13","author":"Lim","year":"2020","journal-title":"IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens."},{"unstructured":"Briechle, K., and Hanebeck, U.D. (2001, January 19). Template matching using fast normalized cross correlation. Proceedings of the Optical Pattern Recognition XII, Orlando, FL, USA.","key":"ref_22"},{"doi-asserted-by":"crossref","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.H., and Friedman, J.H. (2009). The Elements of Statistical Learning: Data Mining, Inference, and Prediction, Springer.","key":"ref_23","DOI":"10.1007\/978-0-387-84858-7"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/12\/9\/183\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:50:34Z","timestamp":1760129434000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/12\/9\/183"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,14]]},"references-count":23,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2023,9]]}},"alternative-id":["computers12090183"],"URL":"https:\/\/doi.org\/10.3390\/computers12090183","relation":{},"ISSN":["2073-431X"],"issn-type":[{"type":"electronic","value":"2073-431X"}],"subject":[],"published":{"date-parts":[[2023,9,14]]}}}