Abstract
Today, many governments try to implement e-government to provide one stop service through digitization of conventional document and providing public service through cyber systems. However, the last and the most difficult problem with the current e-government projects is that the government cannot provide on-line solution for issuing government certificates through cyber operations, because of the possible forgery and illegal modifications.
In this research, an algorithm of generating visible anti-copy patterns is suggested to issue government certificates or bank certificates in cyber space. In this scheme, people can print certificates at home or in office using ordinary printers. Visible anti-copy patterns provide a solution to distinguish copied documents from original ones through naked eyes. In order to generate visible anti-copy patterns, this research examines characteristics of digital image input and output devices. Different from traditional anti-forgery methods that need special equipment, visible anti-copy patterns developed in this research can be easily recognized with naked eyes whether the document is originally printed or it is copied or scanned and printed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
U.S. Secret Service on Currency Protection Fact Sheet, Counterfeit Deterrence, http://usembassy.state.gov/posts/in4/wwwhwn0514f.html
Sun, Q.B., Feng, P.R., Deng, R.: An Optical Watermarking Solution for Authenticating Printed Documents. In: International Conference on Information Technology ITCC 2001, pp. 65–70 (2001)
Naor, M., Pinkas, B.: Visual Authentication and identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)
Phillips, G.: New digital anti-copy/scan and verification technologies. SPIE Vol. 5310. Optical Security and Counterfeit Deterrence Techniques V, San Jose (2004)
Picard, J.: Digital authentication with copy detection patterns. SPIE Vol. 5310, Optical Security and Counterfeit Deterrence Techniques V, San Jose (2004)
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for Data Hiding. IBM Systems Journal 25, 313–335 (1996)
Lin, C.-Y., Chang, S.-F.: Semi-Fragile Watermarking for Authenticating JPEG Visual Content. In: Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, California, January 2000, pp. 140–151 (2000)
Vollmerhausen, H., Driggers, R.G.: Analysis of Sampled Imaging Systems. SPIE Press, Bellingham (2000)
Barten, P.G.J.: Contrast Sensitivity of the Human Eye and its Effects on Image Quality. SPIE Press, Bellingham (1999)
http://web.mit.edu/persci/people/adelson/checkershadow_illusion.html
http://www.icaen.uiowa.edu/~aip/Lectures/eye_phys_lecture.pdf
Cox, J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Academic Press, San Diego (2002)
Cox, J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. NEC Res. Insti., Princeton, NJ, Tech. Rep. 95-10 (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, J., Kim, K., Lee, J., Choi, J. (2004). Development of Visible Anti-copy Patterns. In: Katsikas, S., Lopez, J., Pernul, G. (eds) Trust and Privacy in Digital Business. TrustBus 2004. Lecture Notes in Computer Science, vol 3184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30079-3_22
Download citation
DOI: https://doi.org/10.1007/978-3-540-30079-3_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22919-3
Online ISBN: 978-3-540-30079-3
eBook Packages: Springer Book Archive