Skip to main content

Trustworthy Paper Documents

  • Conference paper
  • First Online:
Information Hiding (IH 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2137))

Included in the following conference series:

Abstract

In the first part of this paper, we propose a watermarking method for text documents that is less vulnerable to attacks than previous methods. In the second part, we propose a method for protecting the actual content of the document. In a section of independent interest, we discuss the interplay between error-correcting codes and steganography.

What we call a fingerprint is a “robust invisible watermark” for Mintzer el al. [15], and what we call a watermark is a “robust visible watermark”.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ross Anderson, ed. Information Hiding: First International Workshop, LNCS 1174, Springer, 1996.

    Google Scholar 

  2. Ross Anderson. Stretching the limits of steganography. Information Hiding: First International Workshop, Ross Anderson, ed. LNCS 1174, Springer, 1996, 39–47.

    Google Scholar 

  3. R. Ascher and G. Nagy. A means for achieving a high degree of compaction on scan-digitized printed text. IEEE Trans. on Computers 23 (1974), 1174–1179.

    Article  MATH  Google Scholar 

  4. David Aucsmith, ed. Information Hiding: Second International Workshop, LNCS 1525, Springer, 1998.

    Google Scholar 

  5. J. Brassil, S. Low, N. Maxemchuk, L. O’Gorman. Electronic marking and identification techniques to discourage document copying. Proc. IEEEInfocom’94, vol. 3, 1994, 1278–1287. Also in IEEEJ. Selected Areas in Communications, vol 13, 1995, 1495–1504.

    Google Scholar 

  6. J. Brassil, S. Low, N. Maxemchuk, L. O’Gorman. Hiding information in document images. Proc. 1995 Conf. on Information Sciences and Systems, Johns Hopkins, 1995, 482–489.

    Google Scholar 

  7. Jack Brassil and Larry O’Gorman. Watermarking document images with bounding box expansion. Information Hiding: First International Workshop, Ross Anderson, ed. LNCS 1174, Springer, 1996, 227–235.

    Google Scholar 

  8. M. H. M. Costa. Writing on dirty paper. IEEE Trans. Information Theory 29 (1983), 439–441.

    Article  MATH  Google Scholar 

  9. Ingemar J. Cox, Joe Kilian, Tom Leighton, and Talal Shamoon. A secure, robust watermark for multimedia. Information Hiding: First International Workshop, Ross Anderson, ed. LNCS 1174, Springer, 1996, 185–206.

    Google Scholar 

  10. J. J. Eggers, W. D. Ihlenfeldt, and B. Girod. Digital watermarking of chemical structure sets. Information Hiding: Fourth International Workshop, Ira S. Moskowitz, ed. Springer.

    Google Scholar 

  11. David Hecht. Embedded data glyph technology for hardcopy digital documents. SPIE Proceedings, Vol. 2171, 1994, 341–352. http://www.dataglyphs.com

    Article  Google Scholar 

  12. P. G. Howard, F. Kossentini, B. Martins, S. Forchhammer, and W. J. Rucklidge. The Emerging JBIG2 Standard. CSVT Vol. 8, November 1998, 838–848.

    Google Scholar 

  13. Y. LeCun, L. Bottou, P. Haffner, P. Howard, P. Simard, and Y. Bengio. http://djvu.research.att.com and http://www.research.att.com/~yann

  14. S. H. Low, N. F. Maxemchuk, J. T. Brassil, and L. O’Gorman. Document marking and identification using both line and word shifting. Proc. IEEEInfocom’95, 1995.

    Google Scholar 

  15. Fred Mintzer, Jeffrey Lotspiech, Norishige Morimoto. Safeguarding digital library contents and users. D-Lib Magazine, December 1997. http://www.dlib.org/dlib/december97/ibm/12lotspiech.html

  16. W. Wesley Peterson and E. J. Weldon. Error-Correcting Codes, 2nd Edition. MIT Press, 1972.

    Google Scholar 

  17. Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Attacks on copyright marking systems. Information Hiding: Second International Workshop, David Aucsmith, ed. LNCS 1525, Springer, 1998, 218–238.

    Google Scholar 

  18. Andreas Pfitzmann, ed. Information Hiding: Third International Workshop, LNCS 1768, Springer, 2000.

    Google Scholar 

  19. W. Rucklidge and D. Huttenlocher. A flexible network document imaging architecture. SPIE Electronic Imaging, San Jose, January 2000.

    Google Scholar 

  20. Matthias Ruhl, Marshall Bern, and David Goldberg. Secure notarization of paper text documents. Proc. of the 12th ACM-SIAM Symp. on Discrete Algorithms, SIAM, 2001.

    Google Scholar 

  21. Claude Shannon. Channels with side information at the transmitter. IBM J. Research and Development, Vol 2. (1958), 289–293. Reprinted in Key Papers in the Development of Information Theory, D. Slepian, ed. IEEE Press, 1974, Part A.

    Article  MathSciNet  Google Scholar 

  22. Ming Ye, Marshall Bern, and David Goldberg. Document image matching and annotation lifting, To appear in Int. Conf. Document Analysis and Recognition, Seattle, 2001.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bern, M., Breidenbach, J., Goldberg, D. (2001). Trustworthy Paper Documents. In: Moskowitz, I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45496-9_1

Download citation

  • DOI: https://doi.org/10.1007/3-540-45496-9_1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42733-9

  • Online ISBN: 978-3-540-45496-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics