Print signatures for document authentication
Proceedings of the 10th ACM conference on Computer and communications security
Localization and Segmentation of A 2D High Capacity Color Barcode
WACV '08 Proceedings of the 2008 IEEE Workshop on Applications of Computer Vision
Effect of copying and restoration on color barcode payload density
Proceedings of the 9th ACM symposium on Document engineering
Fingerprinting Blank Paper Using Commodity Scanners
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
IEEE Transactions on Information Forensics and Security
A survey of forensic characterization methods for physical devices
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Hi-index | 0.00 |
Much of the focus in document security tends to be on the deterrent -- the physical (printed, manufactured) item placed on a document, often used for routing in addition to security purposes. Hybrid (multiple) deterrents are not always reliably read by a single imaging device, and so a single device generally cannot simultaneously provide overall document security. We herein show how a relatively simple deterrent can be used in combination with multiple imaging devices to provide document security. In this paper, we show how these devices can be used to classify the printing technology used, a subject of importance for counterfeiter identification as well as printer quality control. Forensic-level imaging is also useful in preventing repudiation and forging, while mobile and/or simple scanning can be used to prevent tampering -- propitiously in addition to providing useful, non-security related, capabilities such as document routing (track and trace) and workflow association.