Skip to main content

Development of Visible Anti-copy Patterns

  • Conference paper
Trust and Privacy in Digital Business (TrustBus 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3184))

Abstract

Today, many governments try to implement e-government to provide one stop service through digitization of conventional document and providing public service through cyber systems. However, the last and the most difficult problem with the current e-government projects is that the government cannot provide on-line solution for issuing government certificates through cyber operations, because of the possible forgery and illegal modifications.

In this research, an algorithm of generating visible anti-copy patterns is suggested to issue government certificates or bank certificates in cyber space. In this scheme, people can print certificates at home or in office using ordinary printers. Visible anti-copy patterns provide a solution to distinguish copied documents from original ones through naked eyes. In order to generate visible anti-copy patterns, this research examines characteristics of digital image input and output devices. Different from traditional anti-forgery methods that need special equipment, visible anti-copy patterns developed in this research can be easily recognized with naked eyes whether the document is originally printed or it is copied or scanned and printed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. U.S. Secret Service on Currency Protection Fact Sheet, Counterfeit Deterrence, http://usembassy.state.gov/posts/in4/wwwhwn0514f.html

  2. Sun, Q.B., Feng, P.R., Deng, R.: An Optical Watermarking Solution for Authenticating Printed Documents. In: International Conference on Information Technology ITCC 2001, pp. 65–70 (2001)

    Google Scholar 

  3. Naor, M., Pinkas, B.: Visual Authentication and identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)

    Google Scholar 

  4. Phillips, G.: New digital anti-copy/scan and verification technologies. SPIE Vol. 5310. Optical Security and Counterfeit Deterrence Techniques V, San Jose (2004)

    Google Scholar 

  5. Picard, J.: Digital authentication with copy detection patterns. SPIE Vol. 5310, Optical Security and Counterfeit Deterrence Techniques V, San Jose (2004)

    Google Scholar 

  6. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for Data Hiding. IBM Systems Journal 25, 313–335 (1996)

    Article  Google Scholar 

  7. Lin, C.-Y., Chang, S.-F.: Semi-Fragile Watermarking for Authenticating JPEG Visual Content. In: Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, California, January 2000, pp. 140–151 (2000)

    Google Scholar 

  8. http://www.sicc.com.sg/tradeser_index.html

  9. Vollmerhausen, H., Driggers, R.G.: Analysis of Sampled Imaging Systems. SPIE Press, Bellingham (2000)

    Book  Google Scholar 

  10. Barten, P.G.J.: Contrast Sensitivity of the Human Eye and its Effects on Image Quality. SPIE Press, Bellingham (1999)

    Book  Google Scholar 

  11. http://web.mit.edu/persci/people/adelson/checkershadow_illusion.html

  12. http://www.icaen.uiowa.edu/~aip/Lectures/eye_phys_lecture.pdf

  13. Cox, J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Academic Press, San Diego (2002)

    Google Scholar 

  14. Cox, J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. NEC Res. Insti., Princeton, NJ, Tech. Rep. 95-10 (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, J., Kim, K., Lee, J., Choi, J. (2004). Development of Visible Anti-copy Patterns. In: Katsikas, S., Lopez, J., Pernul, G. (eds) Trust and Privacy in Digital Business. TrustBus 2004. Lecture Notes in Computer Science, vol 3184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30079-3_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30079-3_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22919-3

  • Online ISBN: 978-3-540-30079-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics