Skip to main content

Digital Check Forgery Attacks on Client Check Truncation Systems

  • Conference paper
  • First Online:
Financial Cryptography and Data Security (FC 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8437))

Included in the following conference series:

Abstract

In this paper, we present a digital check forgery attack on check processing systems used in online banking that results in check fraud. Such an attack is facilitated by multiple factors: the use of digital images to perform check transactions, advances in image processing technologies, the use of untrusted client-side devices and software, and the modalities of deposit. We note that digital check forgery attacks offer better chances of success in committing fraud when compared with conventional check forgery attacks. We discuss an instance of this attack and find several leading banks vulnerable to digital check forgery.

This work was partially supported by National Science Foundation grants CNS-1065537, CNS-1069311, CNS-0845894, and CNS-0910988.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. http://www.fdic.gov/consumers/consumer/alerts/check21.html

  2. http://www.marketsandmarkets.com/PressReleases/merchant-remote-deposit-capture.asp

  3. http://www.pymnts.com/briefing-room/mobile/playmakers/2013/how-popular-is-mobile-check-deposit/

  4. http://www.forrester.com/The+State+Of+Mobile+Banking+2012/fulltext/-/E-RES75582

  5. http://www.theguardian.com/money/2013/dec/26/banks-smartphone-photos-cheques

  6. http://www.canadianlawyermag.com/legalfeeds/1640/canadian-banks-get-ok-to-move-ahead-with-image-cheque-deposit.html

  7. http://www.afponline.org/fraud/

  8. http://www.aba.com/Products/Surveys/Pages/2013DepositAccount.aspx

  9. http://www.ffiec.gov/exam/check21/faq.htm#General

  10. http://www.sno.phy.queensu.ca/phil/exiftool/

  11. http://source.android.com/

  12. http://www.trustedcomputinggroup.org/

  13. http://nelenkov.blogspot.com/2012/07/jelly-bean-hardware-backed-credential.html

  14. http://ti.com/m-shield

  15. http://www.moebs.com/AboutUs/Moebsinthenews/tabid/57/ctl/Details/mid/484/ItemID/26/Default.aspx

  16. Anbarjafari, G., Demirel, H.: Image super resolution based on interpolation of wavelet domain high frequency subbands and the spatial domain input image. ETRI J. 32(3), 390–394 (2010)

    Article  Google Scholar 

  17. Bianchi, T., Piva, A.: Detection of nonaligned double jpeg compression based on integer periodicity maps. IEEE Trans. Inf. Forensics Secur. 7(2), 842–848 (2012)

    Article  Google Scholar 

  18. Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: a survey. Digital Invest. 10(3), 226–245 (2013)

    Article  Google Scholar 

  19. Bohme, R., Kirchner, M.: Counter-forensics: attacking image Forensics. In: Sencar, H.T., Memon, N. (eds.) Digital image Forensics: There is More to a Picture Than Meets the Eye, pp. 327–366. Springer, New York (2013)

    Chapter  Google Scholar 

  20. Chen, C., Shi, Y.Q., Su, W.: A machine learning based scheme for double jpeg compression detection. In: ICPR, pp. 1–4. IEEE (2008)

    Google Scholar 

  21. Chowriappa, A., Rodrigues, R.N., Kesavadas, T., Govindaraju, V., Bisantz, A.: Generation of handwriting by active shape modeling and global local approximation (gla) adaptation. In: International Conference on Frontiers in Handwriting Recognition (ICFHR), pp. 206–211 (2010)

    Google Scholar 

  22. Efford, N.: Digital Image Processing: A Practical Introduction Using Java\(^{TM}\). Pearson Education, Harlow (2000)

    Google Scholar 

  23. Farid, H.: Exposing digital forgeries from jpeg ghosts. IEEE Trans. Inf. Forensics Secur. 4(1), 154–160 (2009)

    Article  MathSciNet  Google Scholar 

  24. Farid, H.: A survey of image forgery detection. IEEE Signal Process. Mag. 2(26), 16–25 (2009)

    Article  Google Scholar 

  25. Gallery, E.: An Overview of Trusted Computing Technology. IEEE (2005)

    Google Scholar 

  26. Goljan, M., Fridrich, J.: Sensor-fingerprint based identification of images corrected for lens distortion. In: Proceedings SPIE, Electronic Imaging, Media Watermarking, Security and Forensics 2012 (2012)

    Google Scholar 

  27. Gonzalez, R., Woods, R.: Digital Image Processing, 3rd edn. Prentice Hall, Upper Saddle River (2007)

    Google Scholar 

  28. Lewis, A., Kuhn, M.: Towards copy-evident JPEG images. In: Fischer, S., Maehle, E., Reischuk, R. (eds.) GI Jahrestagung. LNI, vol. 154, pp. 1582–1591. GI (2009)

    Google Scholar 

  29. Li, B., Shi, Y.Q., Huang, J.: Detecting doubly compressed jpeg images by using mode based first digit features. In: 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 730–735 (2008)

    Google Scholar 

  30. Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205–214 (2006)

    Article  Google Scholar 

  31. Palacios, R., Gupta, A.: A system for processing handwritten bank checks automatically. J. Image Vis. Comput. 10(10), 1297–1313 (2008)

    Article  Google Scholar 

  32. Park, S.C., Park, M.K., Kang, M.G.: Super-resolution image reconstruction: a technical overview. IEEE Signal Process. Mag. 20(3), 21–36 (2003)

    Article  Google Scholar 

  33. Pevn, T., Fridrich, J.J.: Detection of double-compression in jpeg images for applications in steganography. IEEE Trans. Inf. Forensics Secur. 3(2), 247–258 (2008)

    Article  Google Scholar 

  34. Piva, A.: An overview on image forensics. ISRN Signal Process. 2013, 22 (2013). Article ID 496701

    Article  Google Scholar 

  35. Stamm, M.C., Liu, K.J.R.: Anti-forensics of digital image compression. IEEE Trans. Inf. Forensics Secur. 6(3), 1050–1065 (2011)

    Article  Google Scholar 

  36. Yang, J., Wright, J., Huang, T.S., Ma, Y.: Image super-resolution via sparse representation. IEEE Trans. Image Process. 19(11), 2861–2873 (2010)

    Article  MathSciNet  Google Scholar 

  37. Yu, H., Ng, T.-T., Sun, Q.: Recaptured photo detection using specularity distribution. In: 15th IEEE International Conference on Image Processing, ICIP 2008, pp. 3140–3143 (2008)

    Google Scholar 

  38. Zhou, L., Wang, D., Guo, Y., Zhang, J.: Blur detection of digital forgery using mathematical morphology. In: Nguyen, N.T., Grzech, A., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2007. LNCS (LNAI), vol. 4496, pp. 990–998. Springer, Heidelberg (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rigel Gjomemo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 International Financial Cryptography Association

About this paper

Cite this paper

Gjomemo, R., Malik, H., Sumb, N., Venkatakrishnan, V.N., Ansari, R. (2014). Digital Check Forgery Attacks on Client Check Truncation Systems. In: Christin, N., Safavi-Naini, R. (eds) Financial Cryptography and Data Security. FC 2014. Lecture Notes in Computer Science(), vol 8437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45472-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45472-5_1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45471-8

  • Online ISBN: 978-3-662-45472-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics