Document imaging security and forensics ecosystem considerations

  • Authors:
  • Steven J. Simske;Margaret Sturgill;Guy Adams;Paul Everest

  • Affiliations:
  • Hewlett-Packard Labs, Fort Collins, CO, USA;Hewlett-Packard Labs, Fort Collins, CO, USA;Hewlett-Packard Labs, Bristol, United Kingdom;Hewlett-Packard, Corvallis, OR, USA

  • Venue:
  • Proceedings of the 10th ACM symposium on Document engineering
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Much of the focus in document security tends to be on the deterrent -- the physical (printed, manufactured) item placed on a document, often used for routing in addition to security purposes. Hybrid (multiple) deterrents are not always reliably read by a single imaging device, and so a single device generally cannot simultaneously provide overall document security. We herein show how a relatively simple deterrent can be used in combination with multiple imaging devices to provide document security. In this paper, we show how these devices can be used to classify the printing technology used, a subject of importance for counterfeiter identification as well as printer quality control. Forensic-level imaging is also useful in preventing repudiation and forging, while mobile and/or simple scanning can be used to prevent tampering -- propitiously in addition to providing useful, non-security related, capabilities such as document routing (track and trace) and workflow association.