Skip to main content

Categorization of Document Image Tampering Techniques and How to Identify Them

  • Conference paper
  • First Online:
Pattern Recognition and Information Forensics (ICPR 2018)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 11188))

Included in the following conference series:

Abstract

We present in a descriptive way the first results of our study of the problem of document image tampering detection. We aim at helping the community by establishing certain guidelines in what refers to the categorization and targeting of this problem. We propose a categorization of the main types of forgeries performed by a direct manipulation of the document image. That applies to most of the cases we observed in real world forged documents according to our sources from external private companies. In addition, we describe a set of visual clues result of these tampering operations that can be addressed when developing automatic methods for its detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. van Beusekom, J., Stahl, A., Shafait, F.: Lessons learned from automatic forgery detection in over 100,000 invoices. In: Garain, U., Shafait, F. (eds.) IWCF 2012/2014. LNCS, vol. 8915, pp. 130–142. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-20125-2_12

    Chapter  Google Scholar 

  2. Tkachenko, I., Gomez-Krmer, P.: Robustness of character recognition techniques to double print-and-scan process. In: 14th IAPR International Conference on Document Analysis and Recognition, ICDAR, vol. 09, pp. 27–32, November 2017

    Google Scholar 

  3. Prabhu, A.S., Shah, Z., Shah, M.: Robust detection of copy move forgeries for scanned documents using multiple methods. Int. J. Comput. Sci. Issues 9, 436 (2012)

    Google Scholar 

  4. Malik, M.I., et al.: Proceedings of the 2nd ICDAR International Workshop on Automated Forensic Handwriting Analysis, AFHA 2013, Washington DC, USA, 22–23 August 2013, vol. 1022 (2013)

    Google Scholar 

  5. Bertrand, R., Gomez-Krãmer, P., Terrades, O.R., Franco, P., Ogier, J.-M.: A system based on intrinsic features for fraudulent document detection. In: 12th International Conference on Document Analysis and Recognition, Washington, DC, United States, vol. 12, pp. 106–110 (2013)

    Google Scholar 

  6. van Beusekom, J., Shafait, F., Breuel, T.M.: Document signature using intrinsic features for counterfeit detection. In: Srihari, S.N., Franke, K. (eds.) IWCF 2008. LNCS, vol. 5158, pp. 47–57. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85303-9_5

    Chapter  Google Scholar 

  7. van Beusekom, J., Shafait, F., Breuel, T.M.: Text-line examination for document forgery detection. Int. J. Doc. Anal. Recogn. (IJDAR) 16(2), 189–207 (2013)

    Article  Google Scholar 

  8. Sencar, H.T., Memon, N.: Overview of state-of-the-art in digital image forensics, pp. 325–347

    Chapter  Google Scholar 

  9. Cruz, F., Sidre, N., Coustaty, M., Poulain D’Andecy, V., Ogier, J.M.: Local binary patterns for document forgery detection. In 14th IAPR International Conference on Document Analysis and Recognition, ICDAR, pp. 1223–1228, November 2017

    Google Scholar 

Download references

Acknowledgments

This project has been granted by the Region Nouvelle Aquitaine and European Union supporting the project “Securdoc: développement d’un prototype de détection de fraude de document numérique” framed at the “programme opérationnel FEDER/FSE 2014–2020” (grant number P2016-BAFE-186).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Francisco Cruz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cruz, F., Sidère, N., Coustaty, M., Poulain d’Andecy, V., Ogier, JM. (2019). Categorization of Document Image Tampering Techniques and How to Identify Them. In: Zhang, Z., Suter, D., Tian, Y., Branzan Albu, A., Sidère, N., Jair Escalante, H. (eds) Pattern Recognition and Information Forensics. ICPR 2018. Lecture Notes in Computer Science(), vol 11188. Springer, Cham. https://doi.org/10.1007/978-3-030-05792-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05792-3_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05791-6

  • Online ISBN: 978-3-030-05792-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics