Skip to main content

Integrity Check for Printed Binary Document Images

  • Conference paper
Book cover Networked Digital Technologies (NDT 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 88))

Included in the following conference series:

  • 1151 Accesses

Abstract

Following the digital revolution, many documents have been converted to the digital format and saved in computers. Documents are usually printed using black and white printers when converted to hardcopy documents. The printed documents may be scanned to computers as a binary text images. However, hard copy documents are subject to forgery. Also, a scanned document cannot be an exact replica of its original version because of the additional noise caused by D.A conversion. Therefore, it has been essential to check the integrity of scanned documents to detect and locate alternations in forged documents and validate unaltered scanned images. It is unreasonable to keep records of original copies for each printed document for authentication purposes. Thus, it is better to embed information about the document contents into the document itself. In this paper, a self-validating binary document images to validate hardcopy black and white text image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, M., Doermann, D.: Clutter Noise Removal in Binary Document Images. In: ICDAR 2009 (2009)

    Google Scholar 

  2. Arnold, M.: Techniques and Applications of Digital Watermarking and Content Protection. Artech House, Norwood (2003) (incorporated)

    Google Scholar 

  3. Baird, H.S.: The skew angle of printed documents. In: Document Image Analysis. IEEE Computer Society Press, Los Alamitos (1995)

    Google Scholar 

  4. Chen, M., Memon, N., Wong, E.K.: Data Hiding in Document Images. In: Lu, C. (ed.) Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property, pp. 231–247. Ideal Group Publishing, Hershey (2004)

    Google Scholar 

  5. Fridrich, J., Goljan, M.: Protection of Digital Images Using Self Embedding. In: Symposium on Content Security and Data Hiding in Digital Media (1999)

    Google Scholar 

  6. Furht, B., Muharemagic, E., Socek, D.: Multimedia Encryption and Watermarking. Springer, New York (2005)

    MATH  Google Scholar 

  7. Kim, H.Y., Afif, A.: Secure Authentication Watermarking for Binary Images. In: SIBGRAPI 2003, p. 199 (2003)

    Google Scholar 

  8. Kim, H.Y., Afif, A.: A Secure Authentication Watermarking for Halftone and Binary Images. International Journal of Imaging Systems and Technology 14(4), 147–152 (2004)

    Article  Google Scholar 

  9. Kim, Y., Oh, I.: Watermarking text Document images using edge direction histogram. Pattern Recognition Letters 25(11), 1243–1251 (2004)

    Article  Google Scholar 

  10. Liu, H., Rui, W., Huang, J.: Binary Image Authentication using Zernike Moments. IEEE, ICIP 1, 385–388 (2007)

    Google Scholar 

  11. Low, S.H., Maxemchuk, N.F., Lapone, A.M.: Document Identification for Copyright Protection Using Centroid Detection. IEEE Transactions on Communications 46(3), 372–383 (1998)

    Article  Google Scholar 

  12. Lu, H., Kot, A.C., Cheng, J.: Secure data hiding in binary document images for authentication. In: Proceedings of the 2003 International Symposium on Circuits and Systems, ISCAS 2003, May 25-28, vol. 3, pp. III-806–III-809 (2003)

    Google Scholar 

  13. Mei, Q.G., Wong, E.K., Memon, N.D.: Data hiding in binary text documents. In: Proc. of SPIE Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 369–375 (2001)

    Google Scholar 

  14. Sun, Q.B., Feng, P.R., Deng, R.: An optical watermarking solution for authenticating printed documents. In: Proceedings of International Conference on Information Technology: Coding and Computing, pp. 65–70 (2001)

    Google Scholar 

  15. Tan, C.L., Huang, W., Yu, Z.: Imaged Document Text Retrieval Without OCR. IEEE Transaction on Pattern Analysis and Machine Intelligence 24(6), 838–844 (2002)

    Article  Google Scholar 

  16. Yang, H., Kot, A.C.: Data hiding for bi-level documents using smoothing technique. ISCAS (5), 692–695 (2004)

    Google Scholar 

  17. Zhu, B., Wu, J., Kankanhalli, M.S.: Print signatures for document authentication. In: Conference on Computer and Communications Security, Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 145–154 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Elliman, D., Blanchfield, P., Albakaa, A. (2010). Integrity Check for Printed Binary Document Images. In: Zavoral, F., Yaghob, J., Pichappan, P., El-Qawasmeh, E. (eds) Networked Digital Technologies. NDT 2010. Communications in Computer and Information Science, vol 88. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14306-9_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14306-9_52

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14305-2

  • Online ISBN: 978-3-642-14306-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics