Abstract
In this paper we propose a new authentication and localisation scheme to produce a watermark which can be embedded in a limited capacity binary text document and that will work in a print and scan environment. The scheme utilises Message Authentication Codes (MAC), specifically OMACs, which create a cryptographic fixed-length summary of a document. An OMAC must be truncated to a form part of our watermark and is used during authentication. The remainder of the watermark is used during localisation. We have created over 2,000,000 watermarks in controlled experiments to evaluate their ability to authenticate a document and localise any changes. In addition, we have embedded an authenticating watermark into seven different documents and authenticated them after printing and scanning.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Culnane, C., Treharne, H., Ho, A.T.S.: Improving multi-set formatted binary text watermarking using continuous line embedding. In: IEEE International Conference on Innovative Computing, Information and Control (ICICIC 2007) (to appear, 2007)
Topkara, M., Topkara, U., Atallah, M.J.: Words are not enough: sentence level natural language watermarking. In: MCPS 2006: Proceedings of the 4th ACM international workshop on Contents protection and security, pp. 37–46. ACM Press, New York (2006)
Villán, R., Voloshynovskiy, S., Koval, O., Deguillaume, F., Pun, T.: Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents IX, February 2007. Society of Photo-Optical Instrumentation Engineers (SPIE) Conference, vol. 6505, p. 65051T (2007)
Miller, M.L., Cox, I.J., Bloom, J.A.: Digital Watermarking, 1st edn. Morgan Kaufmann, San Francisco (2002)
Culnane, C., Treharne, H., Ho, A.T.S.: A new multi-set modulation technique for increasing hiding capacity of binary watermark for print and scan processes. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 96–110. Springer, Heidelberg (2006)
Zou, D., Shi, Y.Q.: Formatted text document data hiding robust to printing, copying and scanning. In: IEEE International Symposium on Circuits and Systems (ISCAS 2005) (2005)
Dworkin, M.: Recommendation for block cipher modes of operation: The cmac mode for authentication. Special Publication 800-38B, NIST (May 2005)
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621. Springer, Heidelberg (2005)
NIST. Nist brief Comments on Recent Cryptographic Attacks on Secure Hashing Functions and the Continued Security Provided by SHA-1. Internet (August 2004), http://csrc.nist.gov/hash_standards_comments.pdf
Iwata, T., Kurosawa, K.: Omac: One-Key CBC MAC. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 129–153. Springer, Heidelberg (2003)
Mitchell, C.J.: Partial key recovery attacks on XCBC, TMAC and OMAC. In: Smart, N. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796. Springer, Heidelberg (2005)
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., New York (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Culnane, C., Treharne, H., Ho, A.T.S. (2008). Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning. In: Shi, Y.Q., Kim, HJ., Katzenbeisser, S. (eds) Digital Watermarking. IWDW 2007. Lecture Notes in Computer Science, vol 5041. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92238-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-540-92238-4_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-92237-7
Online ISBN: 978-3-540-92238-4
eBook Packages: Computer ScienceComputer Science (R0)