Abstract
We present in a descriptive way the first results of our study of the problem of document image tampering detection. We aim at helping the community by establishing certain guidelines in what refers to the categorization and targeting of this problem. We propose a categorization of the main types of forgeries performed by a direct manipulation of the document image. That applies to most of the cases we observed in real world forged documents according to our sources from external private companies. In addition, we describe a set of visual clues result of these tampering operations that can be addressed when developing automatic methods for its detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
van Beusekom, J., Stahl, A., Shafait, F.: Lessons learned from automatic forgery detection in over 100,000 invoices. In: Garain, U., Shafait, F. (eds.) IWCF 2012/2014. LNCS, vol. 8915, pp. 130–142. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-20125-2_12
Tkachenko, I., Gomez-Krmer, P.: Robustness of character recognition techniques to double print-and-scan process. In: 14th IAPR International Conference on Document Analysis and Recognition, ICDAR, vol. 09, pp. 27–32, November 2017
Prabhu, A.S., Shah, Z., Shah, M.: Robust detection of copy move forgeries for scanned documents using multiple methods. Int. J. Comput. Sci. Issues 9, 436 (2012)
Malik, M.I., et al.: Proceedings of the 2nd ICDAR International Workshop on Automated Forensic Handwriting Analysis, AFHA 2013, Washington DC, USA, 22–23 August 2013, vol. 1022 (2013)
Bertrand, R., Gomez-Krãmer, P., Terrades, O.R., Franco, P., Ogier, J.-M.: A system based on intrinsic features for fraudulent document detection. In: 12th International Conference on Document Analysis and Recognition, Washington, DC, United States, vol. 12, pp. 106–110 (2013)
van Beusekom, J., Shafait, F., Breuel, T.M.: Document signature using intrinsic features for counterfeit detection. In: Srihari, S.N., Franke, K. (eds.) IWCF 2008. LNCS, vol. 5158, pp. 47–57. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85303-9_5
van Beusekom, J., Shafait, F., Breuel, T.M.: Text-line examination for document forgery detection. Int. J. Doc. Anal. Recogn. (IJDAR) 16(2), 189–207 (2013)
Sencar, H.T., Memon, N.: Overview of state-of-the-art in digital image forensics, pp. 325–347
Cruz, F., Sidre, N., Coustaty, M., Poulain D’Andecy, V., Ogier, J.M.: Local binary patterns for document forgery detection. In 14th IAPR International Conference on Document Analysis and Recognition, ICDAR, pp. 1223–1228, November 2017
Acknowledgments
This project has been granted by the Region Nouvelle Aquitaine and European Union supporting the project “Securdoc: développement d’un prototype de détection de fraude de document numérique” framed at the “programme opérationnel FEDER/FSE 2014–2020” (grant number P2016-BAFE-186).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Cruz, F., Sidère, N., Coustaty, M., Poulain d’Andecy, V., Ogier, JM. (2019). Categorization of Document Image Tampering Techniques and How to Identify Them. In: Zhang, Z., Suter, D., Tian, Y., Branzan Albu, A., Sidère, N., Jair Escalante, H. (eds) Pattern Recognition and Information Forensics. ICPR 2018. Lecture Notes in Computer Science(), vol 11188. Springer, Cham. https://doi.org/10.1007/978-3-030-05792-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-05792-3_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05791-6
Online ISBN: 978-3-030-05792-3
eBook Packages: Computer ScienceComputer Science (R0)