Skip to main content

Printer and Scanner Forensics: Models and Methods

  • Chapter

Part of the book series: Studies in Computational Intelligence ((SCI,volume 282))

Introduction

Contrary to popular opinion, the use of paper in our society will not disappear any time during the foreseeable future. In fact, the use of paper continues to grow rather than decline. It is certainly true that as individuals, we may be printing less than we used to. And the role of paper has been transformed from the archival record of a document to a convenient and aesthetically appealing graphical user interface. The use of paper is now intimately linked to the electronic systems that capture, process, transmit, generate, and reproduce textual and graphical content. Paper can be thought of as an interface between humans and the digital world. If this interface is not secure, the entire system becomes vulnerable to attack and abuse. Although paper is read by humans in the same way that it has been for millennia, and has had the same fundamental form and composition for almost that long as well, the technologies for printing and scanning documents and capturing their content have evolved tremendously, especially during the last twenty years. This has moved the capability to generate printed documents from the hands of a select few to anyone with access to lowcost scanners, printers, and personal computers. It has greatly broadened the opportunities for abuse of trust through the generation of fallacious documents and tampering with existing documents, including the embedding of messages in these documents.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Investigating machine identification code technology in color laser printers (July 2005), http://www.eff.org/wp/investigating-machine-identification-code-technology-color-laser-printers

  2. Check Clearing for the 21st Century Act (April 24, 2007), http://www.federalreserve.gov/paymentsystems/truncation/default.htm

  3. Akao, Y., Kobayashi, K., Sugawara, S., Seki, Y.: Discrimination of inkjet-printed counterfeits by spur marks and feature extraction by spatial frequency analysis. In: van Renesse, R.L. (ed.) Proceedings of the SPIE International Conference on Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677, pp. 129–137 (2002)

    Google Scholar 

  4. Ali, G.N., Chiang, P.J., Mikkilineni, A.K., Allebach, J.P., Chiu, G.T.C., Delp, E.J.: Intrinsic and extrinsic signatures for information hiding and secure printing with electrophotographic devices. In: Proceedings of the IS&T’s NIP19: International Conference on Digital Printing Technologies, New Orleans, LA, September 2003, vol. 19, pp. 511–515 (2003)

    Google Scholar 

  5. Ali, G.N., Chiang, P.J., Mikkilineni, A.K., Chiu, G.T.C., Delp, E.J., Allebach, J.P.: Application of principal components analysis and gaussian mixture models to printer identification. In: Proceedings of the IS&T’s NIP20: International Conference on Digital Printing Technologies, Salt Lake City, UT, October/November 2004, vol. 20, pp. 301–305 (2004)

    Google Scholar 

  6. Arslan, O., Kumontoy, R.M., Chiang, P.J., Mikkillineni, A.K., Allebach, J.P., Chiu, G.T.C., Delp, E.J.: Identification of inkjet printers for forensic applications. In: Proceedings of the IS&T’s NIP21: International Conference on Digital Printing Technologies, Baltimore, MD, October 2005, vol. 21, pp. 235–238 (2005)

    Google Scholar 

  7. Barni, M., Bartolini, F.: Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Marcel Dekker, New York (2004)

    Google Scholar 

  8. Barni, M., Podilchuk, C.I., Bartolini, F., Delp, E.J.: Watermark embedding: hiding a signal within a cover image. IEEE Communications Magazine 39(8), 102–108 (2001)

    Article  Google Scholar 

  9. Bernal, E., Allebach, J.P., Pizlo, Z.: Improved pen alignment for bidirectional printing. The Journal of Imaging Science and Technology 51(1), 1–22 (2007)

    Article  Google Scholar 

  10. Brassil, J.T., Low, S., Maxemchuk, N.F.: Copyright protection for the electronic distribution of text documents. Proceedings of the IEEE 87, 1181–1196 (1999)

    Article  Google Scholar 

  11. Bulan, O., Monga, V., Sharma, G., Oztan, B.: Data embedding in hardcopy images via halftone-dot orientation modulation. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents X, vol. 6819 (January 2009)

    Google Scholar 

  12. Burges, C.J.C.: A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery 2(2), 121–167 (1998)

    Article  Google Scholar 

  13. Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/~cjlin/libsvm

  14. Chen, C.L.: Modeling, Analysis, and Robust Controls for Electrophotographic Imaging Systems Subject to Spatially Periodic Disturbances and Measurable Nonlinearities. Ph.D. thesis, Purdue University (2003)

    Google Scholar 

  15. Chen, M., Fridrich, J., Goljan, M., Lukas, J.: Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security 3(1), 74–90 (2008)

    Article  Google Scholar 

  16. Chiang, P.J., Ali, G.N., Mikkilineni, A.K., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Extrinsic signatures embedding using exposure modulation for information hiding and secure printing in electrophotographic devices. In: Proceedings of the IS&T’s NIP20: International Conference on Digital Printing Technologies, Salt Lake City, UT, October/November 2004, vol. 20, pp. 295–300 (2004)

    Google Scholar 

  17. Chiang, P.J., Khanna, N., Mikkilineni, A.K., Segovia, M.V.O., Suh, S., Allebach, J.P., Chiu, G.T.C., Delp, E.J.: Printer and scanner forensics. IEEE Signal Processing Magazine 26(2), 72–83 (2009)

    Article  Google Scholar 

  18. Chiang, P.J., Mikkilineni, A.K., Delp, E.J., Allebach, J.P., Chiu, G.T.C.: Extrinsic signatures embedding and detection in electrophotographic halftone images through laser intensity modulation. In: Proceedings of the IS&T’s NIP22: International Conference on Digital Printing Technologies, Denver, CO, September 2006, pp. 432–435 (2006)

    Google Scholar 

  19. Conners, R.W., Trivedi, M.M., Harlow, C.A.: Segmentation of a high-resolution urban scene using texture operators. Computer Vision, Graphics, and Image Processing 25, 273–310 (1984)

    Article  Google Scholar 

  20. Cristianini, N., Taylor, J.S.: An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods. Cambridge University Press, Cambridge (2000)

    Google Scholar 

  21. Doherty, P.: Classification of ink jet printers and inks. J. Am. Soc. of Quest. Doc. Exam. 1(1), 88–106 (1998)

    MathSciNet  Google Scholar 

  22. Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. Wiley-Interscience, Hoboken (2000)

    Google Scholar 

  23. Foi, A., Katkovnik, V., Egiazarian, K., Astola, J.: A novel local polynomial estimator based on directional multiscale optimizations. In: Proceedings of the 6th IMA Int. Conf. Math. in Signal Processing, vol. 5685, pp. 79–82 (2004)

    Google Scholar 

  24. Fu, M.S., Au, O.: Data hiding in halftone images by stochastic error diffusion. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2001, vol. 3, pp. 1965–1968 (2001)

    Google Scholar 

  25. Fukunaga, K.: Introduction to Statistical Pattern Recognition. Academic Press, San Diego (1990)

    MATH  Google Scholar 

  26. Gloe, T., Franz, E., Winkler, A.: Forensics for flatbed scanners. In: Delp III, E.J., Wong, P.W. (eds.) Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, 65051I. SPIE, San Jose (2007)

    Google Scholar 

  27. Gou, H., Swaminathan, A., Wu, M.: Robust scanner identification based on noise features. In: Delp III, E.J., Wong, P.W. (eds.) Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, 65050S. SPIE, San Jose (2007)

    Google Scholar 

  28. Gupta, G., Saha, S.K., Chakraborty, S., Mazumdar, C.: Document frauds: Identification and linking fake document to scanners and printers. In: International Conference on Computing: Theory and Applications (ICCTA 2007), March 2007, pp. 497–501 (2007)

    Google Scholar 

  29. Haralick, R.M., Shanmugam, K., Dinstein, I.: Textural features for image classification. IEEE Transactions on Systems, Man, and Cybernetics SMC-3(6), 610–621 (1973)

    Google Scholar 

  30. Holst, G.C.: CCD Arrays, Cameras, and Displays, 2nd edn. JCD Publishing & SPIE Press, USA (1998)

    Google Scholar 

  31. Hsu, C.W., Chang, C.C., Lin, C.J.: A practical guide to support vector classification. Department of Computer Science and Information Engineering, National Taiwan University (July 2003), http://www.csie.ntu.edu.tw/~cjlin/papers/guide/guide.pdf

  32. Janesick, J.R.: Scientific Charge-Coupled Devices. SPIE, San Jose (January 2001)

    Book  Google Scholar 

  33. Joachims, T.: Making large-scale support vector machine learning practical. In: Schölkopf, B., Burges, C., Smola, A. (eds.) Advances in Kernel Methods: Support Vector Machines. MIT Press, Cambridge (1998)

    Google Scholar 

  34. Kacker, D., Allebach, J.P.: Joint halftoning and watermarking. IEEE Transactions on Signal Processing 51(4), 1054–1068 (2003)

    Article  MathSciNet  Google Scholar 

  35. Kacker, D., Camis, T., Allebach, J.P.: Electrophotographic process embedded in direct binary search. IEEE Transactions on Image Processing 11(3), 234–257 (2002)

    Article  Google Scholar 

  36. Khanna, N., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Forensic techniques for classifying scanner, computer generated and digital camera images. In: Proceedings of the 2008 IEEE International Conference on Acoustics, Speech, and Signal Processing, Las Vegas, NV (March 2008)

    Google Scholar 

  37. Khanna, N., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Scanner identification with extension to forgery detection. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, January 2008, vol. 6819, 68190G (2008)

    Google Scholar 

  38. Khanna, N., Mikkilineni, A.K., Chiang, P.J., Ortiz, M.V., Shah, V., Suh, S., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Printer and sensor forensics. In: IEEE Workshop on Signal Processing Applications for Public Security and Forensics (SAFE 2007), April 2007, pp. 1–8 (2007)

    Google Scholar 

  39. Khanna, N., Mikkilineni, A.K., Chiang, P.J., Ortiz, M.V., Suh, S., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Sensor forensics: Printers, cameras and scanners, they never lie. In: 2007 IEEE International Conference on Multimedia and Expo., July 2007, pp. 20–23 (2007)

    Google Scholar 

  40. Khanna, N., Mikkilineni, A.K., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Forensic classification of imaging sensor types. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents IX, January 2007, vol. 6505, 65050U. SPIE, San Jose (2007)

    Google Scholar 

  41. Khanna, N., Mikkilineni, A.K., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Scanner identification using sensor pattern noise. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents IX, January 2007, vol. 6505, 65051K. SPIE, San Jose (2007)

    Google Scholar 

  42. Khanna, N., Mikkilineni, A.K., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Survey of scanner and printer forensics at purdue university. In: Srihari, S.N., Franke, K. (eds.) IWCF 2008. LNCS, vol. 5158, pp. 22–34. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  43. Khanna, N., Mikkilineni, A.K., Delp, E.J.: Forensic camera classification: Verification of sensor pattern noise approach. Forensic Science Communications (FSC) 11(1) (January 2009)

    Google Scholar 

  44. Khanna, N., Mikkilineni, A.K., Delp, E.J.: Scanner identification using feature-based processing and analysis. IEEE Transactions on Information Forensics and Security 4(1), 123–139 (2009)

    Article  Google Scholar 

  45. Khanna, N., Mikkilineni, A.K., Martone, A.F., Ali, G.N., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: A survey of forensic characterization methods for physical devices. Digital Investigation 3, 17–28 (2006)

    Article  Google Scholar 

  46. Lee, J.H., Allebach, J.P.: Inkjet printer model-based halftoning. IEEE Transactions on Image Processing 14(5), 674–689 (2005)

    Article  Google Scholar 

  47. Lukas, J., Fridrich, J., Goljan, M.: Determining digital image origin using sensor imperfections. In: Said, A., Apostolopoulos, J.G. (eds.) Proceedings of the SPIE International Conference on Image and Video Communications and Processing, vol. 5685, pp. 249–260. SPIE, San Jose (2005)

    Google Scholar 

  48. Lukas, J., Fridrich, J.J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Transactions on Information Forensics and Security 1(2), 205–214 (2006)

    Article  Google Scholar 

  49. Mikkilineni, A.K., Arslan, O., Chiang, P.J., Kumontoy, R.M., Allebach, J.P., Chiu, G.T.C., Delp, E.J.: Printer forensics using svm techniques. In: Proceedings of the IS&T’s NIP21: International Conference on Digital Printing Technologies, Baltimore, MD, October 2005, vol. 21, pp. 223–226 (2005)

    Google Scholar 

  50. Mikkilineni, A.K., Chiang, P.J., Ali, G.N., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Printer identification based on textural features. In: Proceedings of the IS&T’s NIP20: International Conference on Digital Printing Technologies, Salt Lake City, UT, October/November 2004, vol. 20, pp. 306–311 (2004)

    Google Scholar 

  51. Mikkilineni, A.K., Chiang, P.J., Ali, G.N., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Printer identification based on graylevel co-occurrence features for security and forensic applications. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, March 2005, vol. 5681, pp. 430–440 (2005)

    Google Scholar 

  52. Mikkilineni, A.K., Chiang, P.J., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Channel model and operational capacity analysis of printed text documents. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents IX, 65051U, San Jose, CA (January 2007)

    Google Scholar 

  53. Mukhtar, M., Meckl, P., Chiu, G.T.C.: Color registration error reduction in document scanner using iterative velocity command synthesis. In: Proceedings of the 2008 ASME Dynamic Systems and Control Conference, Ann Arbor, Michigan (October 2008)

    Google Scholar 

  54. Norris, M., Barney, E.: Printer modeling for document imaging. In: Proceedings of CISST: International Conference on Imaging Science, Systems and Technology, Las Vegas, NV, June 2004, pp. 14–20 (2004)

    Google Scholar 

  55. Oliver, J.F., Chen, J.X.: Use of signature analysis to discriminate digital printing technologies. In: Proceedings of the IS&T’s NIP18: International Conference on Digital Printing Technologies, San Diego, California, September 2002, pp. 218–222 (2002)

    Google Scholar 

  56. Ortiz Segovia, M.V., Chiu, G.T.C., Delp, E.J., Allebach, J.P.: Information embedding in electrophotographic document forms through laser intensity modulation a communications systems perspective. In: Proceedings of the IS&T’s NIP25: International Conference on Digital Printing Technologies, Louisville, KY (September 2009)

    Google Scholar 

  57. Partouche, F., Espanet, B., Villena, C., Murie, C.: Forensic analysis of inkjet printings by pyrolysis gc/ms. In: Proceedings of NIP21: The 21st International Conference on Digital Printing Technologies, Baltimore, MD, pp. 216–219 (2005)

    Google Scholar 

  58. Pursley, M.B.: Introduction to Digital Communications. Pearson Education, Inc., London (2005)

    Google Scholar 

  59. Sencar, H.T., Memon, N.: Overview of state-of-the-art in digital image forensics. In: Part of Indian Statistical Institute Platinum Jubilee Monograph series titled ‘Statistical Science and Interdisciplinary Research’ (2008) (to appear)

    Google Scholar 

  60. Sharma, G., Wang, S.: Show-through watermarking of duplex printed documents. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents VI, January 2004, vol. 5306 (2004)

    Google Scholar 

  61. Shein, L.B.: Electrophotography and Development Physics, 2nd edn. Springer, New York (1992)

    Google Scholar 

  62. Shein, L.B.: Handbook of Electrostatic Processes, pp. 321–348. Marcel Dekker, New York (1995)

    Google Scholar 

  63. Simske, S.J., Aronoff, J.S., Sturgill, M., Collins, F., Golodetz, G., Israel, R.: Security printing deterrents: A comparison of TIJ, DEP and LEP printing. In: Proceedings of the IS&T’s NIP23: International Conference on Digital Printing Technologies, Anchorage, AK, September 2007, pp. 543–548 (2007)

    Google Scholar 

  64. Simske, S.J., Hattersley, J.R., Golodetz, G., Stssiak, J., Aronoff, J.S.: Ink-specific handheld readers and security variable data printing (svdp). In: Proceedings of NIP22: The 22nd International Conference on Digital Printing Technologies, Denver, CO, vol. 2006, pp. 441–443 (2006)

    Google Scholar 

  65. Suh, S., Allebach, J.P., Chiu, G.T.C., Delp, E.J.: Printer mechanism-level information embedding and extraction for halftone documents: New results. In: Proceedings of the IS&T’s NIP23: International Conference on Digital Printing Technologies, Anchorage, Alaska, September 2007, pp. 549–553 (2007)

    Google Scholar 

  66. Sweeney, P.: Error Control Coding: From Theory to Practice. Wiley, New York (2002)

    Google Scholar 

  67. Talbot, V., Perrot, P., Murie, C.: Ink jet printing discrimination based on invariant moment. In: Proceedings of the IS&T’s NIP22: International Conference on Digital Printing Technologies, Denver, CO, September 2006, pp. 427–431 (2006)

    Google Scholar 

  68. Voloshynovskiy, S., Pereira, S., Pun, T., Eggers, J.J., Su, J.K.: Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE Communications Magazine 39(8), 118–126 (2001)

    Article  Google Scholar 

  69. Williams, E.M.: The Physics and Technology of Xerographic Processes. Wiley, New York (1984)

    Google Scholar 

  70. Williams, E.M.: The Physics and Technology of Xerographic Processes. Wiley, New York (1984)

    Google Scholar 

  71. Wolin, D.: Document verification and traceability through image quality analysis. In: Proceedings of the IS&T’s NIP18: International Conference on Digital Printing Technologies, San Diego, California, September 2002, pp. 214–217 (2002)

    Google Scholar 

  72. Yen, J., Carlsson, M., Chang, M., Garcia, J.M., Nguyen, H.: Constraint solving for inkjet print mask design. The Journal of Imaging Science and Technology 44(5), 391–397 (2000)

    Google Scholar 

  73. Yi, J.: A Xerographic simulation model. Master’s thesis, University of Idaho, Boise, ID (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Chiang, PJ. et al. (2010). Printer and Scanner Forensics: Models and Methods. In: Sencar, H.T., Velastin, S., Nikolaidis, N., Lian, S. (eds) Intelligent Multimedia Analysis for Security Applications. Studies in Computational Intelligence, vol 282. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11756-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11756-5_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11754-1

  • Online ISBN: 978-3-642-11756-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics