Abstract
In this paper, we present a digital check forgery attack on check processing systems used in online banking that results in check fraud. Such an attack is facilitated by multiple factors: the use of digital images to perform check transactions, advances in image processing technologies, the use of untrusted client-side devices and software, and the modalities of deposit. We note that digital check forgery attacks offer better chances of success in committing fraud when compared with conventional check forgery attacks. We discuss an instance of this attack and find several leading banks vulnerable to digital check forgery.
This work was partially supported by National Science Foundation grants CNS-1065537, CNS-1069311, CNS-0845894, and CNS-0910988.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
http://www.marketsandmarkets.com/PressReleases/merchant-remote-deposit-capture.asp
http://www.pymnts.com/briefing-room/mobile/playmakers/2013/how-popular-is-mobile-check-deposit/
http://www.forrester.com/The+State+Of+Mobile+Banking+2012/fulltext/-/E-RES75582
http://www.theguardian.com/money/2013/dec/26/banks-smartphone-photos-cheques
http://www.aba.com/Products/Surveys/Pages/2013DepositAccount.aspx
http://nelenkov.blogspot.com/2012/07/jelly-bean-hardware-backed-credential.html
http://www.moebs.com/AboutUs/Moebsinthenews/tabid/57/ctl/Details/mid/484/ItemID/26/Default.aspx
Anbarjafari, G., Demirel, H.: Image super resolution based on interpolation of wavelet domain high frequency subbands and the spatial domain input image. ETRI J. 32(3), 390–394 (2010)
Bianchi, T., Piva, A.: Detection of nonaligned double jpeg compression based on integer periodicity maps. IEEE Trans. Inf. Forensics Secur. 7(2), 842–848 (2012)
Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: a survey. Digital Invest. 10(3), 226–245 (2013)
Bohme, R., Kirchner, M.: Counter-forensics: attacking image Forensics. In: Sencar, H.T., Memon, N. (eds.) Digital image Forensics: There is More to a Picture Than Meets the Eye, pp. 327–366. Springer, New York (2013)
Chen, C., Shi, Y.Q., Su, W.: A machine learning based scheme for double jpeg compression detection. In: ICPR, pp. 1–4. IEEE (2008)
Chowriappa, A., Rodrigues, R.N., Kesavadas, T., Govindaraju, V., Bisantz, A.: Generation of handwriting by active shape modeling and global local approximation (gla) adaptation. In: International Conference on Frontiers in Handwriting Recognition (ICFHR), pp. 206–211 (2010)
Efford, N.: Digital Image Processing: A Practical Introduction Using Java\(^{TM}\). Pearson Education, Harlow (2000)
Farid, H.: Exposing digital forgeries from jpeg ghosts. IEEE Trans. Inf. Forensics Secur. 4(1), 154–160 (2009)
Farid, H.: A survey of image forgery detection. IEEE Signal Process. Mag. 2(26), 16–25 (2009)
Gallery, E.: An Overview of Trusted Computing Technology. IEEE (2005)
Goljan, M., Fridrich, J.: Sensor-fingerprint based identification of images corrected for lens distortion. In: Proceedings SPIE, Electronic Imaging, Media Watermarking, Security and Forensics 2012 (2012)
Gonzalez, R., Woods, R.: Digital Image Processing, 3rd edn. Prentice Hall, Upper Saddle River (2007)
Lewis, A., Kuhn, M.: Towards copy-evident JPEG images. In: Fischer, S., Maehle, E., Reischuk, R. (eds.) GI Jahrestagung. LNI, vol. 154, pp. 1582–1591. GI (2009)
Li, B., Shi, Y.Q., Huang, J.: Detecting doubly compressed jpeg images by using mode based first digit features. In: 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 730–735 (2008)
Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205–214 (2006)
Palacios, R., Gupta, A.: A system for processing handwritten bank checks automatically. J. Image Vis. Comput. 10(10), 1297–1313 (2008)
Park, S.C., Park, M.K., Kang, M.G.: Super-resolution image reconstruction: a technical overview. IEEE Signal Process. Mag. 20(3), 21–36 (2003)
Pevn, T., Fridrich, J.J.: Detection of double-compression in jpeg images for applications in steganography. IEEE Trans. Inf. Forensics Secur. 3(2), 247–258 (2008)
Piva, A.: An overview on image forensics. ISRN Signal Process. 2013, 22 (2013). Article ID 496701
Stamm, M.C., Liu, K.J.R.: Anti-forensics of digital image compression. IEEE Trans. Inf. Forensics Secur. 6(3), 1050–1065 (2011)
Yang, J., Wright, J., Huang, T.S., Ma, Y.: Image super-resolution via sparse representation. IEEE Trans. Image Process. 19(11), 2861–2873 (2010)
Yu, H., Ng, T.-T., Sun, Q.: Recaptured photo detection using specularity distribution. In: 15th IEEE International Conference on Image Processing, ICIP 2008, pp. 3140–3143 (2008)
Zhou, L., Wang, D., Guo, Y., Zhang, J.: Blur detection of digital forgery using mathematical morphology. In: Nguyen, N.T., Grzech, A., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2007. LNCS (LNAI), vol. 4496, pp. 990–998. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 International Financial Cryptography Association
About this paper
Cite this paper
Gjomemo, R., Malik, H., Sumb, N., Venkatakrishnan, V.N., Ansari, R. (2014). Digital Check Forgery Attacks on Client Check Truncation Systems. In: Christin, N., Safavi-Naini, R. (eds) Financial Cryptography and Data Security. FC 2014. Lecture Notes in Computer Science(), vol 8437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45472-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-662-45472-5_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45471-8
Online ISBN: 978-3-662-45472-5
eBook Packages: Computer ScienceComputer Science (R0)