Skip to main content

Tracing the Source of a Shredded Document

  • Conference paper
  • First Online:
Information Hiding (IH 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2578))

Included in the following conference series:

Abstract

Consider two ordinary, seemingly identical plain paper shredders labeled A and B.Whe n each of the two shredders is fed a blank sheet of paper, the resulting remnants are sufficiently similar that they are indistinguishable upon visual inspection.Now suppose that one of the shredders has been modified to introduce imperceptible variations in the size of each remnant it cuts. One of the shredders is then selected at random to destroy a blank sheet.By examination of the resulting paper remnants, can one determine if the sheet was shredded by A or B?

In this paper we show how information hidden in the size and shape of shredded page remnants can be used to reveal the identity of the device used for shredding.W e describe means for modifying shredders to introduce this hidden information. Experimental results reveal that properly embedded information can survive the severe nonlinear distortions introduced by the mechanics of paper shredding.F inally, we consider the question of whether paper shreds could reveal shredder identity even in the absence of device modifications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. van Renesse, R. L.: Optical Document Security. Artech House, Boston (1993) 387

    Google Scholar 

  2. Wagner, N. R.: Fingerprinting. Proceedings of the 1983 IEEE Symposium on Security and Privacy. IEEE Computer Society (1983) 18–22 388

    Google Scholar 

  3. Golb, N.: Who Wrote the Dead Sea Scrolls? The Search for the Secret of Qumran. Scribner, New York (1995) 388

    Google Scholar 

  4. Ogden, J. A.: The Siting of Papyrus Fragments: An Experimental Application of Digital Computers. Ph.D. Thesis, University of Glascow (1969) 388

    Google Scholar 

  5. Levison, M.: The Siting of Fragments. The Computer Journal, vol 7, no 4 (1965) 388

    Google Scholar 

  6. Seul, M., O’Gorman, L., Sammon, M.: Practical Algorithms for Image Analysis: Description, Examples and Code. Cambridge University Press, Cambridge UK (2000) 391, 399

    MATH  Google Scholar 

  7. Helstrom, C. W.: Probability and Stochastic Processes for Engineers. MacMillan Publishing Co., New York (1984)

    Google Scholar 

  8. UPC Symbol Specification Manual. Uniform Code Council, Inc., Dayton Ohio (1986). See http://www.uc-council.org/re.ib/01302/d36-t.htm 396

  9. Papoulis, A.: Probability, Random Variables and Stochastic Processes. McGraw-Hill Book Co., New York (1965) 397, 399

    MATH  Google Scholar 

  10. Information Security Team: Terminator VIII: How to Destroy your Classified Materials. Department of Defense Security Institute (1992). See http://www.dss.mil/training/term4/doc 398

  11. Cohen, F.: The Mathematics of Shredding. Proceedings of the 2002 IEEE Symposium on Security and Privacy. IEEE Computer Society (2002) 399

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Brassil, J. (2003). Tracing the Source of a Shredded Document. In: Petitcolas, F.A.P. (eds) Information Hiding. IH 2002. Lecture Notes in Computer Science, vol 2578. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36415-3_25

Download citation

  • DOI: https://doi.org/10.1007/3-540-36415-3_25

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00421-9

  • Online ISBN: 978-3-540-36415-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics