SlideShare a Scribd company logo
1 of 15
IS&T NIP26 Conference, 23 September, 2010
Impact of Scrambling on
Barcode Entropy
Marie Vans, Steven Simske, Margaret Sturgill, & Jason Aronoff
HP Laboratories, Fort Collins, CO, USA
23 September 2010
IS&T NIP26 Conference, 23 September, 2010
2
Outline
– Introduction
– Entropy Measures
– Scrambling Techniques
– Tests
– Results
– Conclusions
IS&T NIP26 Conference, 23 September, 2010
3
Introduction
– Barcodes not just for ringing up sales anymore:
• Connecting to websites
• Consumer capture of content
– 1D vs. 2D/3D Barcodes
• Older 1D barcode standards being replaced and/or augmented with 2D
or 3D barcodes
• High-density barcodes used for additional data carrying or referencing
– ECC
• Added for robustness to certain types of distortion and damage
• Nature of ECC derived from assumptions more relevant to 1D
barcodes/general information theory.
• Use of ECC can be questioned
• Opens door to using barcodes as information carriers outside of the
current barcode standards.
– Previous Work
• effect of the print-scan (PS) cycle, or “copying” cycle
• localized damage such as water damage and/or puncturing
• blurring S.J. Simske, M. Sturgill, and J.S. Aronoff, “Effect of
Copying and Restoration on Color Barcode Payload
Density,” Proc. ACM DocEng, vol. 9, pp. 127-130, 2009.
IS&T NIP26 Conference, 23 September, 2010
4
Some Background
– An attempt to highlight differential effects of encryption methods on
entropy by applying scrambling techniques to randomly generated strings
with and without Error Correcting Codes (ECC)
– Major Pieces:
• Entropy
−Increasing entropy reduces the likelihood of a fraudulent agent being able to
“guess” correct barcodes
• Scrambling
−Four ways to mix-up the barcode data
• ECC
−Reed-Solomon Error Correcting Codes
IS&T NIP26 Conference, 23 September, 2010
5
Entropy Measures
Entropy as a measure for the
effect of ECC and
scrambling on 2D barcodes.
Here, entropy represents
signal randomness: how the
bits are distributed in a
signal.
∑=







 −+
=
N
i
XE
XE
xXEXE
e
1
1 )(*
)(
)()(
log
Expected Values
0
0.1
0.2
0.3
0.4
0.5
0.6
1 2 3 4 5 6 7 8 9 10 11 12
Run Lengths
Expected
Expected Values
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
Max Entropy Low Entropy Minimum Entropy
Entropy
Normalized Entropy
IS&T NIP26 Conference, 23 September, 2010
6
Entropy Measures - continued
Entropy based on Hamming
Distance. N refers to the
maximum Hamming
Distance (HD) between two
bytes and x refers to the
normalized i HD of the actual
strings. This HD is calculated
on a moving window along a
string in a forward direction.
1
0.1*
0.1
0.11
log
1
2
2
−







 −+
=
∑=
N
x
e
N
i
Equation 2 - Hamming Distance Entropy
0
0.5
1
1.5
2
2.5
Max Entropy Low Entropy Minimum Entropy
Entropy
Hamming Distance
(HD) Entropy
IS&T NIP26 Conference, 23 September, 2010
7
Scrambling Techniques
XOR:
•A randomly generated string of same size as entire string (message +
ECC bits) and XOR’d with input string.
Structural scramble:
•Divide string matrix into equal sized structures (squares, rectangles,
etc.). Swap bits within each structure so new structure is a mirror image
of the original.
Even Check Bits:
•Add check bit at end of each row & column so that total number of black
modules is even.
Odd Check Bits:
•Add check bit at end of each row & column so that total number of black
modules is odd.
IS&T NIP26 Conference, 23 September, 2010
8
Hypothesis
– “Challenging” entropy of string set with another random string :
• Should result in different responses if string not as entropic as challenge
string
– When random number is challenged, should be no difference in the
entropy between the two randomly generated strings.
– If string contains ECC, could be detectable difference in entropy
between string with ECC and randomly generated challenge string.
Random Signal
Random Signal ECCRandom Signal
Random Signal
Challenge
A B
IS&T NIP26 Conference, 23 September, 2010
9
Experimental Set-up
•28,000 individual barcodes generated using:
• 500 randomly generated strings
• Average length - 310 bits
• Symbol sizes of 12x12 up to 26x26
• Module sizes from 12 to 18 pixels
•Each test has an associated scrambling algorithm and entropy measure.
•Each test run twice
• Using maximum number of ECC bits allowable for size
• Using randomly generated data where the ECC bits would normally be inserted.
• A total of 672,000 barcodes were tested with half containing ECC bits and half
completely random without ECC.
IS&T NIP26 Conference, 23 September, 2010
10
Results
– Result is the percent change of entropy between the input and output strings
• Mean output/mean input
• E.g. A result near 1.0 means there was very little change
– Non ECC change was very small
• scrambling a fully random string should result in another random string
– ECC entropy change increased
• scrambling a string containing non-random bits should result in a more random string
– Measured using Normalized Entropy with all scrambling techniques
Normalized Entropy - ECC vs NonECC
0.88
0.9
0.92
0.94
0.96
0.98
1
1.02
1.04
12 x 12 14 x 14 16 x 16 18 x 18 20 x 20 22 x 22 24 x 24 26 x 26
Symbol Size
Average%ChgOut/In
ECC
NonECC
IS&T NIP26 Conference, 23 September, 2010
11
Results
– Population statistics – Normalized Entropy
• Normalized Entropy (e1) means for ECC and non-ECC using the XOR scrambling
algorithm
• No way to distinguish between ECC and non-ECC strings by looking at difference in input
or output means only.
Normalized Entropy - Input & Output Means for ECC & NonECC
0.1
0.12
0.14
0.16
0.18
0.2
0.22
0.24
0.26
0.28
12 x 12 14 x 14 16 x 16 18 x 18 20 x 20 22 x 22 24 x 24 26 x 26
Symbol Size
MeanEntropy
Mean Input Entropy - ECC
Mean Input Entropy - NoECC
Mean Output Entropy - ECC
Mean Output Entropy - NoECC
IS&T NIP26 Conference, 23 September, 2010
12
Results
– Change in entropy after
scrambling results in higher
entropy (less randomness) for
both the ECC and the non-ECC
strings.
– For most symbol sizes, e2 output
values are lower than input values
– ECC strings start out with more
structure than the non-ECC string
and become more random after
scrambling.
– Change in entropy after
scrambling non-ECC strings is
detectable
HamDistWind Entropy Measure - ECC vs. NonECC
0.84
0.86
0.88
0.9
0.92
0.94
0.96
0.98
1
1.02
12 x 12 14 x 14 16 x 16 18 x 18 20 x 20 22 x 22 24 x 24 26 x 26
Symbol Size
Average%ChgOut/InEntropyMeasure
HamDistWind w ith ECC
HamDistWind NoECC
XOR-HamDistwind
0.6
0.65
0.7
0.75
0.8
0.85
0.9
0.95
1
1.05
12x12 14x14 16x16 18x18 20x20 22x22 24x24 26x26
Symbol Size
Average%ChangeOut/In ECC Data
NonECC
Data
IS&T NIP26 Conference, 23 September, 2010
13
Results
– Example shows standard error for
output means using the XOR
scrambling algorithm
• Other scrambling algorithms show similar
results
– Half the error bar shown to show the
magnitude
– The two populations overlap and
cannot be distinguished with any
reasonable level of statistical
confidence
– Population statistics show that
detecting difference between ECC and
non-ECC signals using population
means is not easy using these
methods
HanDistWind Entropy -- StdErr Output
ECC vs. NonECC
0
0.005
0.01
0.015
0.02
0.025
0.03
12 x
12
14 x
14
16 x
16
18 x
18
20 x
20
22 x
22
24 x
24
26 x
26
Symbol Size
StdErrOutput-HamDistWind
ECC
Data
Non-ECC
Data
XOR--HamDistWind Entropy -- Output Mean
ECC vs. NonECC
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
0.16
0 2 4 6 8 10
Symbol Size
MeanInput-HamDistWind
ECC Data
Non-ECC
Data
Figure 13: XOR Scrambling - Output Mean
IS&T NIP26 Conference, 23 September, 2010
14
Conclusions
– Three entropy-based methods for determining the degree of
randomness in a signal
– Affect of scrambling on the outcome of these methods
– Data Matrix standard does not take this type of security into account
• ECC within the signal has structure and is therefore vulnerable to attacks
– Our entropy measures and the appropriate “attack” can detect the
difference between a truly random signal and a signal that contains
structure
– Uses:
• Discover if ECC has been used & potential vulnerabilities of the security data
• Methods can be implemented to determine whether data is encrypted
• Possible to interrogate the entropy of the comprised signal and compare it to the
original entropy values.
15 IS&T NIP26 Conference, 23 September, 2010
Q&A

More Related Content

Viewers also liked

Five Kingdoms of Life
Five Kingdoms of LifeFive Kingdoms of Life
Five Kingdoms of LifeSturdavent1
 
Analysis and Compression of Reflectance Data Using An Evolved Spectral Correl...
Analysis and Compression of Reflectance Data Using An Evolved Spectral Correl...Analysis and Compression of Reflectance Data Using An Evolved Spectral Correl...
Analysis and Compression of Reflectance Data Using An Evolved Spectral Correl...Peter Morovic
 
Ravi new cfs project
Ravi new cfs projectRavi new cfs project
Ravi new cfs projectRavi Lamba
 
Max Entropy
Max EntropyMax Entropy
Max Entropyjianingy
 
ENTROPY STABLE ENO SCHEMES
ENTROPY STABLE ENO SCHEMESENTROPY STABLE ENO SCHEMES
ENTROPY STABLE ENO SCHEMESHamed Zakerzadeh
 
Entropy Variation Analysis Based on Monitoring
Entropy Variation Analysis Based on MonitoringEntropy Variation Analysis Based on Monitoring
Entropy Variation Analysis Based on MonitoringR.PRABHU R.RAJENDRAN
 
Kernel Entropy Component Analysis in Remote Sensing Data Clustering.pdf
Kernel Entropy Component Analysis in Remote Sensing Data Clustering.pdfKernel Entropy Component Analysis in Remote Sensing Data Clustering.pdf
Kernel Entropy Component Analysis in Remote Sensing Data Clustering.pdfgrssieee
 
Two parameter entropy of uncertain variable
Two parameter entropy of uncertain variableTwo parameter entropy of uncertain variable
Two parameter entropy of uncertain variableSurender Singh
 
Entropy-driven cutoff phenomena
Entropy-driven cutoff phenomenaEntropy-driven cutoff phenomena
Entropy-driven cutoff phenomenaCarlo Lancia
 
Entropy : statistical approach
Entropy : statistical approachEntropy : statistical approach
Entropy : statistical approachKhemendra shukla
 
Entropy and systemic risk measures
Entropy and systemic risk measuresEntropy and systemic risk measures
Entropy and systemic risk measuresSYRTO Project
 
Managing Entropy - Clarity '13 - Keith Goode
Managing Entropy - Clarity '13 - Keith GoodeManaging Entropy - Clarity '13 - Keith Goode
Managing Entropy - Clarity '13 - Keith GoodeKeith Goode
 

Viewers also liked (14)

Five Kingdoms of Life
Five Kingdoms of LifeFive Kingdoms of Life
Five Kingdoms of Life
 
Analysis and Compression of Reflectance Data Using An Evolved Spectral Correl...
Analysis and Compression of Reflectance Data Using An Evolved Spectral Correl...Analysis and Compression of Reflectance Data Using An Evolved Spectral Correl...
Analysis and Compression of Reflectance Data Using An Evolved Spectral Correl...
 
Ravi new cfs project
Ravi new cfs projectRavi new cfs project
Ravi new cfs project
 
Max Entropy
Max EntropyMax Entropy
Max Entropy
 
Entropy by lexain
Entropy by lexainEntropy by lexain
Entropy by lexain
 
ENTROPY STABLE ENO SCHEMES
ENTROPY STABLE ENO SCHEMESENTROPY STABLE ENO SCHEMES
ENTROPY STABLE ENO SCHEMES
 
Entropy Variation Analysis Based on Monitoring
Entropy Variation Analysis Based on MonitoringEntropy Variation Analysis Based on Monitoring
Entropy Variation Analysis Based on Monitoring
 
Kernel Entropy Component Analysis in Remote Sensing Data Clustering.pdf
Kernel Entropy Component Analysis in Remote Sensing Data Clustering.pdfKernel Entropy Component Analysis in Remote Sensing Data Clustering.pdf
Kernel Entropy Component Analysis in Remote Sensing Data Clustering.pdf
 
Two parameter entropy of uncertain variable
Two parameter entropy of uncertain variableTwo parameter entropy of uncertain variable
Two parameter entropy of uncertain variable
 
Entropy-driven cutoff phenomena
Entropy-driven cutoff phenomenaEntropy-driven cutoff phenomena
Entropy-driven cutoff phenomena
 
Entropy : statistical approach
Entropy : statistical approachEntropy : statistical approach
Entropy : statistical approach
 
Entropy and systemic risk measures
Entropy and systemic risk measuresEntropy and systemic risk measures
Entropy and systemic risk measures
 
Entropy-based Histograms for Selectivity Estimation
Entropy-based Histograms for Selectivity EstimationEntropy-based Histograms for Selectivity Estimation
Entropy-based Histograms for Selectivity Estimation
 
Managing Entropy - Clarity '13 - Keith Goode
Managing Entropy - Clarity '13 - Keith GoodeManaging Entropy - Clarity '13 - Keith Goode
Managing Entropy - Clarity '13 - Keith Goode
 

Similar to Impact of Scrambling on Barcode Entropy

K034066071
K034066071K034066071
K034066071ijceronline
 
A_law_and_Microlaw_companding
A_law_and_Microlaw_compandingA_law_and_Microlaw_companding
A_law_and_Microlaw_compandingAkshay Sharma
 
A few fundamental concepts in digital electronics
A few fundamental concepts in digital electronicsA few fundamental concepts in digital electronics
A few fundamental concepts in digital electronicsJoy Prabhakaran
 
IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...
IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...
IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...IRJET Journal
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...IJCSEA Journal
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...IJCSEA Journal
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...IJCSEA Journal
 
Decoders
DecodersDecoders
DecodersRe Man
 
Digital electronics(EC8392) unit- 1-Sesha Vidhya S/ ASP/ECE/RMKCET
Digital electronics(EC8392) unit- 1-Sesha Vidhya S/ ASP/ECE/RMKCETDigital electronics(EC8392) unit- 1-Sesha Vidhya S/ ASP/ECE/RMKCET
Digital electronics(EC8392) unit- 1-Sesha Vidhya S/ ASP/ECE/RMKCETSeshaVidhyaS
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...IJCSEA Journal
 
Digital logic-formula-notes-final-1
Digital logic-formula-notes-final-1Digital logic-formula-notes-final-1
Digital logic-formula-notes-final-1Kshitij Singh
 
Design of low power cmos logic circuits using gate diffusion input (gdi) tech...
Design of low power cmos logic circuits using gate diffusion input (gdi) tech...Design of low power cmos logic circuits using gate diffusion input (gdi) tech...
Design of low power cmos logic circuits using gate diffusion input (gdi) tech...VLSICS Design
 
project ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction systemproject ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction systemRekha dudiya
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniquesDhanashriNandre
 
Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackJyotiVERMA176
 
09-Digital Communication_Channel_Coding.pptx
09-Digital Communication_Channel_Coding.pptx09-Digital Communication_Channel_Coding.pptx
09-Digital Communication_Channel_Coding.pptxKhanSwat3
 
Thesis presentation archita keni
Thesis presentation archita keniThesis presentation archita keni
Thesis presentation archita keniArchita Keni
 
Path recommender rec tour
Path recommender   rec tourPath recommender   rec tour
Path recommender rec tourEnrico Palumbo
 

Similar to Impact of Scrambling on Barcode Entropy (20)

K034066071
K034066071K034066071
K034066071
 
A_law_and_Microlaw_companding
A_law_and_Microlaw_compandingA_law_and_Microlaw_companding
A_law_and_Microlaw_companding
 
A few fundamental concepts in digital electronics
A few fundamental concepts in digital electronicsA few fundamental concepts in digital electronics
A few fundamental concepts in digital electronics
 
IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...
IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...
IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...
 
Combinational circuits
Combinational circuitsCombinational circuits
Combinational circuits
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
 
Decoders
DecodersDecoders
Decoders
 
Digital electronics(EC8392) unit- 1-Sesha Vidhya S/ ASP/ECE/RMKCET
Digital electronics(EC8392) unit- 1-Sesha Vidhya S/ ASP/ECE/RMKCETDigital electronics(EC8392) unit- 1-Sesha Vidhya S/ ASP/ECE/RMKCET
Digital electronics(EC8392) unit- 1-Sesha Vidhya S/ ASP/ECE/RMKCET
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
 
Digital logic-formula-notes-final-1
Digital logic-formula-notes-final-1Digital logic-formula-notes-final-1
Digital logic-formula-notes-final-1
 
Design of low power cmos logic circuits using gate diffusion input (gdi) tech...
Design of low power cmos logic circuits using gate diffusion input (gdi) tech...Design of low power cmos logic circuits using gate diffusion input (gdi) tech...
Design of low power cmos logic circuits using gate diffusion input (gdi) tech...
 
project ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction systemproject ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction system
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
 
Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attack
 
Part 2
Part 2Part 2
Part 2
 
09-Digital Communication_Channel_Coding.pptx
09-Digital Communication_Channel_Coding.pptx09-Digital Communication_Channel_Coding.pptx
09-Digital Communication_Channel_Coding.pptx
 
Thesis presentation archita keni
Thesis presentation archita keniThesis presentation archita keni
Thesis presentation archita keni
 
Path recommender rec tour
Path recommender   rec tourPath recommender   rec tour
Path recommender rec tour
 

More from Marie Vans

Preserving virtual worlds educational events using social media v2
Preserving virtual worlds educational events using social media v2Preserving virtual worlds educational events using social media v2
Preserving virtual worlds educational events using social media v2Marie Vans
 
Creating an Award-Winning Educational Machinima
Creating an Award-Winning Educational MachinimaCreating an Award-Winning Educational Machinima
Creating an Award-Winning Educational MachinimaMarie Vans
 
Classification of CNN.com Articles using a TF*IDF Metric
Classification of CNN.com Articles using a TF*IDF MetricClassification of CNN.com Articles using a TF*IDF Metric
Classification of CNN.com Articles using a TF*IDF MetricMarie Vans
 
Archive enabling tagging using progressive barcodes
Archive enabling tagging using progressive barcodesArchive enabling tagging using progressive barcodes
Archive enabling tagging using progressive barcodesMarie Vans
 
Creating displays of virtual objects and events
Creating displays of virtual objects and eventsCreating displays of virtual objects and events
Creating displays of virtual objects and eventsMarie Vans
 
Creating displays of virtual objects and events
Creating displays of virtual objects and eventsCreating displays of virtual objects and events
Creating displays of virtual objects and eventsMarie Vans
 
Progressive barcode applications
Progressive barcode applicationsProgressive barcode applications
Progressive barcode applicationsMarie Vans
 
Progressive barcode presentation
Progressive barcode presentationProgressive barcode presentation
Progressive barcode presentationMarie Vans
 
VWBPE 15: The story of science during the scientific revolution: Designing an...
VWBPE 15: The story of science during the scientific revolution: Designing an...VWBPE 15: The story of science during the scientific revolution: Designing an...
VWBPE 15: The story of science during the scientific revolution: Designing an...Marie Vans
 

More from Marie Vans (9)

Preserving virtual worlds educational events using social media v2
Preserving virtual worlds educational events using social media v2Preserving virtual worlds educational events using social media v2
Preserving virtual worlds educational events using social media v2
 
Creating an Award-Winning Educational Machinima
Creating an Award-Winning Educational MachinimaCreating an Award-Winning Educational Machinima
Creating an Award-Winning Educational Machinima
 
Classification of CNN.com Articles using a TF*IDF Metric
Classification of CNN.com Articles using a TF*IDF MetricClassification of CNN.com Articles using a TF*IDF Metric
Classification of CNN.com Articles using a TF*IDF Metric
 
Archive enabling tagging using progressive barcodes
Archive enabling tagging using progressive barcodesArchive enabling tagging using progressive barcodes
Archive enabling tagging using progressive barcodes
 
Creating displays of virtual objects and events
Creating displays of virtual objects and eventsCreating displays of virtual objects and events
Creating displays of virtual objects and events
 
Creating displays of virtual objects and events
Creating displays of virtual objects and eventsCreating displays of virtual objects and events
Creating displays of virtual objects and events
 
Progressive barcode applications
Progressive barcode applicationsProgressive barcode applications
Progressive barcode applications
 
Progressive barcode presentation
Progressive barcode presentationProgressive barcode presentation
Progressive barcode presentation
 
VWBPE 15: The story of science during the scientific revolution: Designing an...
VWBPE 15: The story of science during the scientific revolution: Designing an...VWBPE 15: The story of science during the scientific revolution: Designing an...
VWBPE 15: The story of science during the scientific revolution: Designing an...
 

Recently uploaded

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Impact of Scrambling on Barcode Entropy

  • 1. IS&T NIP26 Conference, 23 September, 2010 Impact of Scrambling on Barcode Entropy Marie Vans, Steven Simske, Margaret Sturgill, & Jason Aronoff HP Laboratories, Fort Collins, CO, USA 23 September 2010
  • 2. IS&T NIP26 Conference, 23 September, 2010 2 Outline – Introduction – Entropy Measures – Scrambling Techniques – Tests – Results – Conclusions
  • 3. IS&T NIP26 Conference, 23 September, 2010 3 Introduction – Barcodes not just for ringing up sales anymore: • Connecting to websites • Consumer capture of content – 1D vs. 2D/3D Barcodes • Older 1D barcode standards being replaced and/or augmented with 2D or 3D barcodes • High-density barcodes used for additional data carrying or referencing – ECC • Added for robustness to certain types of distortion and damage • Nature of ECC derived from assumptions more relevant to 1D barcodes/general information theory. • Use of ECC can be questioned • Opens door to using barcodes as information carriers outside of the current barcode standards. – Previous Work • effect of the print-scan (PS) cycle, or “copying” cycle • localized damage such as water damage and/or puncturing • blurring S.J. Simske, M. Sturgill, and J.S. Aronoff, “Effect of Copying and Restoration on Color Barcode Payload Density,” Proc. ACM DocEng, vol. 9, pp. 127-130, 2009.
  • 4. IS&T NIP26 Conference, 23 September, 2010 4 Some Background – An attempt to highlight differential effects of encryption methods on entropy by applying scrambling techniques to randomly generated strings with and without Error Correcting Codes (ECC) – Major Pieces: • Entropy −Increasing entropy reduces the likelihood of a fraudulent agent being able to “guess” correct barcodes • Scrambling −Four ways to mix-up the barcode data • ECC −Reed-Solomon Error Correcting Codes
  • 5. IS&T NIP26 Conference, 23 September, 2010 5 Entropy Measures Entropy as a measure for the effect of ECC and scrambling on 2D barcodes. Here, entropy represents signal randomness: how the bits are distributed in a signal. ∑=         −+ = N i XE XE xXEXE e 1 1 )(* )( )()( log Expected Values 0 0.1 0.2 0.3 0.4 0.5 0.6 1 2 3 4 5 6 7 8 9 10 11 12 Run Lengths Expected Expected Values 0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 Max Entropy Low Entropy Minimum Entropy Entropy Normalized Entropy
  • 6. IS&T NIP26 Conference, 23 September, 2010 6 Entropy Measures - continued Entropy based on Hamming Distance. N refers to the maximum Hamming Distance (HD) between two bytes and x refers to the normalized i HD of the actual strings. This HD is calculated on a moving window along a string in a forward direction. 1 0.1* 0.1 0.11 log 1 2 2 −         −+ = ∑= N x e N i Equation 2 - Hamming Distance Entropy 0 0.5 1 1.5 2 2.5 Max Entropy Low Entropy Minimum Entropy Entropy Hamming Distance (HD) Entropy
  • 7. IS&T NIP26 Conference, 23 September, 2010 7 Scrambling Techniques XOR: •A randomly generated string of same size as entire string (message + ECC bits) and XOR’d with input string. Structural scramble: •Divide string matrix into equal sized structures (squares, rectangles, etc.). Swap bits within each structure so new structure is a mirror image of the original. Even Check Bits: •Add check bit at end of each row & column so that total number of black modules is even. Odd Check Bits: •Add check bit at end of each row & column so that total number of black modules is odd.
  • 8. IS&T NIP26 Conference, 23 September, 2010 8 Hypothesis – “Challenging” entropy of string set with another random string : • Should result in different responses if string not as entropic as challenge string – When random number is challenged, should be no difference in the entropy between the two randomly generated strings. – If string contains ECC, could be detectable difference in entropy between string with ECC and randomly generated challenge string. Random Signal Random Signal ECCRandom Signal Random Signal Challenge A B
  • 9. IS&T NIP26 Conference, 23 September, 2010 9 Experimental Set-up •28,000 individual barcodes generated using: • 500 randomly generated strings • Average length - 310 bits • Symbol sizes of 12x12 up to 26x26 • Module sizes from 12 to 18 pixels •Each test has an associated scrambling algorithm and entropy measure. •Each test run twice • Using maximum number of ECC bits allowable for size • Using randomly generated data where the ECC bits would normally be inserted. • A total of 672,000 barcodes were tested with half containing ECC bits and half completely random without ECC.
  • 10. IS&T NIP26 Conference, 23 September, 2010 10 Results – Result is the percent change of entropy between the input and output strings • Mean output/mean input • E.g. A result near 1.0 means there was very little change – Non ECC change was very small • scrambling a fully random string should result in another random string – ECC entropy change increased • scrambling a string containing non-random bits should result in a more random string – Measured using Normalized Entropy with all scrambling techniques Normalized Entropy - ECC vs NonECC 0.88 0.9 0.92 0.94 0.96 0.98 1 1.02 1.04 12 x 12 14 x 14 16 x 16 18 x 18 20 x 20 22 x 22 24 x 24 26 x 26 Symbol Size Average%ChgOut/In ECC NonECC
  • 11. IS&T NIP26 Conference, 23 September, 2010 11 Results – Population statistics – Normalized Entropy • Normalized Entropy (e1) means for ECC and non-ECC using the XOR scrambling algorithm • No way to distinguish between ECC and non-ECC strings by looking at difference in input or output means only. Normalized Entropy - Input & Output Means for ECC & NonECC 0.1 0.12 0.14 0.16 0.18 0.2 0.22 0.24 0.26 0.28 12 x 12 14 x 14 16 x 16 18 x 18 20 x 20 22 x 22 24 x 24 26 x 26 Symbol Size MeanEntropy Mean Input Entropy - ECC Mean Input Entropy - NoECC Mean Output Entropy - ECC Mean Output Entropy - NoECC
  • 12. IS&T NIP26 Conference, 23 September, 2010 12 Results – Change in entropy after scrambling results in higher entropy (less randomness) for both the ECC and the non-ECC strings. – For most symbol sizes, e2 output values are lower than input values – ECC strings start out with more structure than the non-ECC string and become more random after scrambling. – Change in entropy after scrambling non-ECC strings is detectable HamDistWind Entropy Measure - ECC vs. NonECC 0.84 0.86 0.88 0.9 0.92 0.94 0.96 0.98 1 1.02 12 x 12 14 x 14 16 x 16 18 x 18 20 x 20 22 x 22 24 x 24 26 x 26 Symbol Size Average%ChgOut/InEntropyMeasure HamDistWind w ith ECC HamDistWind NoECC XOR-HamDistwind 0.6 0.65 0.7 0.75 0.8 0.85 0.9 0.95 1 1.05 12x12 14x14 16x16 18x18 20x20 22x22 24x24 26x26 Symbol Size Average%ChangeOut/In ECC Data NonECC Data
  • 13. IS&T NIP26 Conference, 23 September, 2010 13 Results – Example shows standard error for output means using the XOR scrambling algorithm • Other scrambling algorithms show similar results – Half the error bar shown to show the magnitude – The two populations overlap and cannot be distinguished with any reasonable level of statistical confidence – Population statistics show that detecting difference between ECC and non-ECC signals using population means is not easy using these methods HanDistWind Entropy -- StdErr Output ECC vs. NonECC 0 0.005 0.01 0.015 0.02 0.025 0.03 12 x 12 14 x 14 16 x 16 18 x 18 20 x 20 22 x 22 24 x 24 26 x 26 Symbol Size StdErrOutput-HamDistWind ECC Data Non-ECC Data XOR--HamDistWind Entropy -- Output Mean ECC vs. NonECC 0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0 2 4 6 8 10 Symbol Size MeanInput-HamDistWind ECC Data Non-ECC Data Figure 13: XOR Scrambling - Output Mean
  • 14. IS&T NIP26 Conference, 23 September, 2010 14 Conclusions – Three entropy-based methods for determining the degree of randomness in a signal – Affect of scrambling on the outcome of these methods – Data Matrix standard does not take this type of security into account • ECC within the signal has structure and is therefore vulnerable to attacks – Our entropy measures and the appropriate “attack” can detect the difference between a truly random signal and a signal that contains structure – Uses: • Discover if ECC has been used & potential vulnerabilities of the security data • Methods can be implemented to determine whether data is encrypted • Possible to interrogate the entropy of the comprised signal and compare it to the original entropy values.
  • 15. 15 IS&T NIP26 Conference, 23 September, 2010 Q&A

Editor's Notes

  1. <number> HP Confidential August 5, 2016
  2. <number> HP Confidential August 5, 2016
  3. <number> HP Confidential August 5, 2016
  4. <number> HP Confidential August 5, 2016
  5. <number> HP Confidential August 5, 2016
  6. <number> HP Confidential August 5, 2016
  7. <number> HP Confidential August 5, 2016
  8. <number> HP Confidential August 5, 2016
  9. <number> HP Confidential August 5, 2016
  10. <number> HP Confidential August 5, 2016
  11. <number> HP Confidential August 5, 2016
  12. <number> HP Confidential August 5, 2016
  13. <number> HP Confidential August 5, 2016