Abstract
In the first part of this paper, we propose a watermarking method for text documents that is less vulnerable to attacks than previous methods. In the second part, we propose a method for protecting the actual content of the document. In a section of independent interest, we discuss the interplay between error-correcting codes and steganography.
What we call a fingerprint is a “robust invisible watermark” for Mintzer el al. [15], and what we call a watermark is a “robust visible watermark”.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ross Anderson, ed. Information Hiding: First International Workshop, LNCS 1174, Springer, 1996.
Ross Anderson. Stretching the limits of steganography. Information Hiding: First International Workshop, Ross Anderson, ed. LNCS 1174, Springer, 1996, 39–47.
R. Ascher and G. Nagy. A means for achieving a high degree of compaction on scan-digitized printed text. IEEE Trans. on Computers 23 (1974), 1174–1179.
David Aucsmith, ed. Information Hiding: Second International Workshop, LNCS 1525, Springer, 1998.
J. Brassil, S. Low, N. Maxemchuk, L. O’Gorman. Electronic marking and identification techniques to discourage document copying. Proc. IEEEInfocom’94, vol. 3, 1994, 1278–1287. Also in IEEEJ. Selected Areas in Communications, vol 13, 1995, 1495–1504.
J. Brassil, S. Low, N. Maxemchuk, L. O’Gorman. Hiding information in document images. Proc. 1995 Conf. on Information Sciences and Systems, Johns Hopkins, 1995, 482–489.
Jack Brassil and Larry O’Gorman. Watermarking document images with bounding box expansion. Information Hiding: First International Workshop, Ross Anderson, ed. LNCS 1174, Springer, 1996, 227–235.
M. H. M. Costa. Writing on dirty paper. IEEE Trans. Information Theory 29 (1983), 439–441.
Ingemar J. Cox, Joe Kilian, Tom Leighton, and Talal Shamoon. A secure, robust watermark for multimedia. Information Hiding: First International Workshop, Ross Anderson, ed. LNCS 1174, Springer, 1996, 185–206.
J. J. Eggers, W. D. Ihlenfeldt, and B. Girod. Digital watermarking of chemical structure sets. Information Hiding: Fourth International Workshop, Ira S. Moskowitz, ed. Springer.
David Hecht. Embedded data glyph technology for hardcopy digital documents. SPIE Proceedings, Vol. 2171, 1994, 341–352. http://www.dataglyphs.com
P. G. Howard, F. Kossentini, B. Martins, S. Forchhammer, and W. J. Rucklidge. The Emerging JBIG2 Standard. CSVT Vol. 8, November 1998, 838–848.
Y. LeCun, L. Bottou, P. Haffner, P. Howard, P. Simard, and Y. Bengio. http://djvu.research.att.com and http://www.research.att.com/~yann
S. H. Low, N. F. Maxemchuk, J. T. Brassil, and L. O’Gorman. Document marking and identification using both line and word shifting. Proc. IEEEInfocom’95, 1995.
Fred Mintzer, Jeffrey Lotspiech, Norishige Morimoto. Safeguarding digital library contents and users. D-Lib Magazine, December 1997. http://www.dlib.org/dlib/december97/ibm/12lotspiech.html
W. Wesley Peterson and E. J. Weldon. Error-Correcting Codes, 2nd Edition. MIT Press, 1972.
Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Attacks on copyright marking systems. Information Hiding: Second International Workshop, David Aucsmith, ed. LNCS 1525, Springer, 1998, 218–238.
Andreas Pfitzmann, ed. Information Hiding: Third International Workshop, LNCS 1768, Springer, 2000.
W. Rucklidge and D. Huttenlocher. A flexible network document imaging architecture. SPIE Electronic Imaging, San Jose, January 2000.
Matthias Ruhl, Marshall Bern, and David Goldberg. Secure notarization of paper text documents. Proc. of the 12th ACM-SIAM Symp. on Discrete Algorithms, SIAM, 2001.
Claude Shannon. Channels with side information at the transmitter. IBM J. Research and Development, Vol 2. (1958), 289–293. Reprinted in Key Papers in the Development of Information Theory, D. Slepian, ed. IEEE Press, 1974, Part A.
Ming Ye, Marshall Bern, and David Goldberg. Document image matching and annotation lifting, To appear in Int. Conf. Document Analysis and Recognition, Seattle, 2001.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bern, M., Breidenbach, J., Goldberg, D. (2001). Trustworthy Paper Documents. In: Moskowitz, I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45496-9_1
Download citation
DOI: https://doi.org/10.1007/3-540-45496-9_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42733-9
Online ISBN: 978-3-540-45496-0
eBook Packages: Springer Book Archive