skip to main content
10.1145/2034691.2034743acmconferencesArticle/Chapter ViewAbstractPublication PagesdocengConference Proceedingsconference-collections
research-article

A study of the interaction of paper substrates on printed forensic imaging

Published: 19 September 2011 Publication History

Abstract

At the microscopic level, printing on a substrate exhibits imperfections that can be used as a unique identifier for labels, documents and other printed items. In previous work, we have demonstrated using these minute imperfections around a simple forensic mark such as a single printed character for robust authentication of the character with a low cost (and mobile) system. This approach allows for product authentication even when there is only minimal printing (e.g. on a small label or medallion), supporting a variety of secure document workflows. In this paper, we present an investigation on the influence that the substrate type has on the imperfections of the printing process that are used to derive the character 'signature'. We also make a comparison between two printing processes, dry electro photographic process (laser) and (thermal) inkjet. Understanding the sensitivity of our methods to these factors is important so that we know the limitations of the approach for document forensics.

References

[1]
E. Kee and H. Faird, "Printer profiling for forensics and ballistics", ACM MM&Sec, 2008.
[2]
S.J. Simske, M. Sturgill, P. Everest, and G. Guillory, "A system for forensic analysis of large image sets," Proc. IEEE WIFS, 2009.
[3]
P-J. Chiang, N. Khanna, A. K. Mikkilineni, M. V. Ortiz Segovia, S. Suh, J. P. Allebach, G. T-C. Chiu & E. J. Delp, "Printer and scanner forensics: examining the security mechanisms for a unique interface", IEEE Signal Processing Magazine 72, 2009.
[4]
J. J. Plimmer, "Choosing correct forensic marker(s) in currency, document and product protection", SPIE-IS&T 6075, 2008.
[5]
B. Zhu, J. WU, M. S. Kankanhalli, "Print Signatures for Document authentication", CCS ACM, 2003.
[6]
A. Idrissa, T. Fournel & Alain Aubert, "Secure embedded verification of print signatures", J. Phys.: Conf. Ser. 206 012036, 2010.
[7]
S.J. Simske and G. Adams, "High-Resolution Glyph-Inspection Based Security System", IEEE ICASSP, 2010.
[8]
L. Hindus, "Image-Based 'Fingerprinting", Advanced Imaging, 1998.
[9]
D.E. Bicknell and G.M. Laporte, "Forged and Counterfeit Documents", in Wiley Encyclopedia of Forensic Science, 3104, June 2009.
[10]
G. Adams, "Hand held Dyson relay lens for anti-counterfeiting", Proc. IEEE IST, 2010.
[11]
S.B. Pollard, G. Adams and S.J. Simske, "Resolving distortion between linear and area sensors for forensic print inspection", IEEE ICIP, 2010.
[12]
S.J. Simske, S.B. Pollard & G. Adams, "An imaging system for simultaneous inspection, authentication and forensics", IEEE IST, 2010.
[13]
S.B. Pollard, S.J. Simske, G.B. Adams, "Model Based Print Signature Profile Extraction For Forensic Analysis of Individual Text," Proc. IEEE WIFS 2010, pp. 1--6, 2010

Cited By

View all
  • (2024)Authentication of Copy Detection Patterns: A Pattern Reliability Based ApproachIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335951019(3124-3134)Online publication date: 2024
  • (2023)Mobile authentication of copy detection patternsEURASIP Journal on Information Security10.1186/s13635-023-00140-52023:1Online publication date: 6-Jun-2023
  • (2022)Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns2022 IEEE International Workshop on Information Forensics and Security (WIFS)10.1109/WIFS55849.2022.9975447(1-6)Online publication date: 12-Dec-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DocEng '11: Proceedings of the 11th ACM symposium on Document engineering
September 2011
296 pages
ISBN:9781450308632
DOI:10.1145/2034691
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 September 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. document fraud
  2. forensics
  3. high-resolution imaging
  4. model matching
  5. security

Qualifiers

  • Research-article

Conference

DocEng '11
Sponsor:
DocEng '11: ACM Symposium on Document Engineering
September 19 - 22, 2011
California, Mountain View, USA

Acceptance Rates

Overall Acceptance Rate 194 of 564 submissions, 34%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Authentication of Copy Detection Patterns: A Pattern Reliability Based ApproachIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335951019(3124-3134)Online publication date: 2024
  • (2023)Mobile authentication of copy detection patternsEURASIP Journal on Information Security10.1186/s13635-023-00140-52023:1Online publication date: 6-Jun-2023
  • (2022)Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns2022 IEEE International Workshop on Information Forensics and Security (WIFS)10.1109/WIFS55849.2022.9975447(1-6)Online publication date: 12-Dec-2022
  • (2022)Detection of Information Hiding at Anti-Copying 2D BarcodesIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2021.305909232:1(437-450)Online publication date: Jan-2022
  • (2022)Protecting Documents Using Printed Anticopy ElementsMultimedia Security 210.1002/9781119987390.ch2(31-58)Online publication date: Jul-2022
  • (2021)Printer source identification by feature modeling in the total variable printer spaceJournal of Forensic Sciences10.1111/1556-4029.1482266:6(2261-2273)Online publication date: 25-Aug-2021
  • (2019)Estimation of Copy-sensitive Codes Using a Neural ApproachProceedings of the ACM Workshop on Information Hiding and Multimedia Security10.1145/3335203.3335718(77-82)Online publication date: 2-Jul-2019
  • (2015)Currency security and forensicsMultimedia Tools and Applications10.1007/s11042-013-1809-x74:11(4013-4043)Online publication date: 1-Jun-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media