Abstract
In this paper, an approach for forgery detection using text-line information is presented. In questioned document examination, text-line rotation and alignment can be important clues for detecting tampered documents. Measuring and detecting such mis-rotations and mis-alignments are a cumbersome task. Therefore, an automated approach for verification of documents based on these two text-line features is proposed in this paper. An in-depth evaluation of the proposed methods shows its usefulness in the context of document security with an area under the ROC curve (AUC) score of AUC=0.89. The automatic nature of the approach allows the presented methods to be used in high-volume environments.
Similar content being viewed by others
References
Lindblom B.S., Gervais R.: Scientific Examination of Ques- tioned Documents, pp. 238–241. Taylor and Francis, Boca Raton, FL (2006)
Smith, P.J., O’Doherty, P., Luna, C., McCarthy, S.: Commercial anticounterfeit products using machine vision. In: Proceedings of SPIE Optical Security and Counterfeit Deterrence Techniques V, vol. 5310, pp. 237–243. San Jose, CA, USA (2004)
Amidror, I.: A new print-based security strategy for the protection of valuable documents and products using moire intensity profiles. In: Proceedings of SPIE Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677, pp. 89–100. San Jose, CA, USA (2002)
Hampp, N.A., Neebe, M., Juchem T., Wolperdinger M., Geiger M., Schmuck A.: Multifunctional optical security features based on bacteriorhodopsin. In: Proceedings of SPIE Optical Security and Counterfeit Deterrence Techniques V, vol. 5310, pp. 117–124. San Jose, CA, USA (2004)
van Renesse, R.: Ordering the order, a survey of optical document security features. In: Proceedings of SPIE Conference on Practical Holography IX, pp. 268–275. San Jose, CA, USA (1995)
van Renesse, R.: Protection of high security documents—developments in holography to secure the future market and serve the public. In: Proceedings of Holo-Pack, Holo-Print, Vienna, Austria (2006)
van Renesse, R.: Hidden and scambled images—a review. In: Proceedings of SPIE Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677, pp. 333–348. San Jose, CA, USA (2002)
Ali, G.N., Chiang, P.-J., Mikkilineni, A.K., Allebach, J.P., Chiu, G.T.C., Delp, E.J.: Intrinsic and extrinsic signatures for information hiding and secure printing with electrophotographic devices. In: Proceedings of the International Conference on Digital Printing Technologies, pp. 511–515. New Orleans, LA, USA (2003)
Mikkilineni, A.K., Chiang, P.-J., Ali, G.N., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Printer identification based on graylevel co-occurrence features for security and forensic applications. In: Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, pp. 430–440. San Jose, CA, USA (2005)
Khanna, N., Mikkilineni, A.K., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Survey of scanner and printer forensics at purdue university. In: Proceedings of the 2nd International Workshop on Computational Forensics. Lecture Notes in Computer Science, vol. 5158, pp. 22–34. Washington, DC, USA (2008)
Schulze, C., Schreyer, M., Stahl, A., Breuel, T.M.: Evaluation of graylevel-features for printing technique classification in high-throughput document management systems. In: Proceedings of the 2nd International Workshop on Computational Forensics. Lecture Notes in Computer Science, vol. 5158, pp. 35–46. Washington, DC, USA (2008)
Schreyer, M.: Intelligent printing technique recognition and photocopy detection for forensic document examination. In: Proceedings of Informatiktage 2009, vol. S-8, pp. 39–42. Bonn, Germany (2009)
Schulze, C., Schreyer, M., Stahl, A., Breuel, T.M.: Using DCT features for printing technique and copy detection. In: Proceedings of the 5th International Conference on Digital Forensics, pp. 95–106. Orlando, FL, USA (2009)
Breuel, T.M.: Robust least square baseline finding using a branch and bound algorithm. In: Proceedings of SPIE Document Recognition and Retrieval IX, pp. 20–27. San Jose, CA, USA (2002)
Shafait F., Keysers D., Breuel T.M.: Performance evaluation and benchmarking of six page segmentation algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 30(6), 941–954 (2008)
van Beusekom J., Shafait F., Breuel T.M.: Combined orientation and skew detection using geometric text-line modeling. Int. J. Doc. Anal. Recognit. 13(2), 79–92 (2010)
Kanungo T., Haralick R.M.: An automatic closed-loop methodology for generating character groundtruth for scanned documents. IEEE Trans. Pattern Anal. Mach. Intell. 21(2), 179–183 (1999)
Breuel T.M.: On the use of interval arithmetic in geometric branch-and-bound algorithms. Pattern Recognit. Lett. 24(9–10), 1375–1384 (2003)
Duda, R.O., Hart, P. E., Stork, D. G.: Pattern Classification, p. 49. Wiley, New York (2001)
van Beusekom, J., Shafait, F., Breuel, T.M.: Document signature using intrinsic features for counterfeit detection. In: Proceedings of the 2nd International Workshop on Computational Forensics. Lecture Notes in Computer Science, vol. 5158, pp. 47–57. Washing-ton, DC, USA (2008)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
van Beusekom, J., Shafait, F. & Breuel, T.M. Text-line examination for document forgery detection. IJDAR 16, 189–207 (2013). https://doi.org/10.1007/s10032-011-0181-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10032-011-0181-5