Skip to main content

Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning

  • Conference paper
Digital Watermarking (IWDW 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5041))

Included in the following conference series:

Abstract

In this paper we propose a new authentication and localisation scheme to produce a watermark which can be embedded in a limited capacity binary text document and that will work in a print and scan environment. The scheme utilises Message Authentication Codes (MAC), specifically OMACs, which create a cryptographic fixed-length summary of a document. An OMAC must be truncated to a form part of our watermark and is used during authentication. The remainder of the watermark is used during localisation. We have created over 2,000,000 watermarks in controlled experiments to evaluate their ability to authenticate a document and localise any changes. In addition, we have embedded an authenticating watermark into seven different documents and authenticated them after printing and scanning.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Culnane, C., Treharne, H., Ho, A.T.S.: Improving multi-set formatted binary text watermarking using continuous line embedding. In: IEEE International Conference on Innovative Computing, Information and Control (ICICIC 2007) (to appear, 2007)

    Google Scholar 

  2. Topkara, M., Topkara, U., Atallah, M.J.: Words are not enough: sentence level natural language watermarking. In: MCPS 2006: Proceedings of the 4th ACM international workshop on Contents protection and security, pp. 37–46. ACM Press, New York (2006)

    Google Scholar 

  3. Villán, R., Voloshynovskiy, S., Koval, O., Deguillaume, F., Pun, T.: Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents IX, February 2007. Society of Photo-Optical Instrumentation Engineers (SPIE) Conference, vol. 6505, p. 65051T (2007)

    Google Scholar 

  4. Miller, M.L., Cox, I.J., Bloom, J.A.: Digital Watermarking, 1st edn. Morgan Kaufmann, San Francisco (2002)

    Google Scholar 

  5. Culnane, C., Treharne, H., Ho, A.T.S.: A new multi-set modulation technique for increasing hiding capacity of binary watermark for print and scan processes. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 96–110. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  6. Zou, D., Shi, Y.Q.: Formatted text document data hiding robust to printing, copying and scanning. In: IEEE International Symposium on Circuits and Systems (ISCAS 2005) (2005)

    Google Scholar 

  7. Dworkin, M.: Recommendation for block cipher modes of operation: The cmac mode for authentication. Special Publication 800-38B, NIST (May 2005)

    Google Scholar 

  8. Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621. Springer, Heidelberg (2005)

    Google Scholar 

  9. NIST. Nist brief Comments on Recent Cryptographic Attacks on Secure Hashing Functions and the Continued Security Provided by SHA-1. Internet (August 2004), http://csrc.nist.gov/hash_standards_comments.pdf

  10. Iwata, T., Kurosawa, K.: Omac: One-Key CBC MAC. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 129–153. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Mitchell, C.J.: Partial key recovery attacks on XCBC, TMAC and OMAC. In: Smart, N. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  12. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., New York (1996)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Culnane, C., Treharne, H., Ho, A.T.S. (2008). Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning. In: Shi, Y.Q., Kim, HJ., Katzenbeisser, S. (eds) Digital Watermarking. IWDW 2007. Lecture Notes in Computer Science, vol 5041. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92238-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-92238-4_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-92237-7

  • Online ISBN: 978-3-540-92238-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics