Practical algorithms for image analysis: description, examples, and code
Practical algorithms for image analysis: description, examples, and code
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
Print signatures for document authentication
Proceedings of the 10th ACM conference on Computer and communications security
Image-Based Techniques for Shredded Document Reconstruction
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
Reconstruction of shredded document based on image feature matching
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
Consider two ordinary, seemingly identical plain paper shredders labeled A and B. When each of the two shredders is fed a blank sheet of paper, the resulting remnants are sufficiently similar that they are indistinguishable upon visual inspection.No w suppose that one of the shredders has been modified to introduce imperceptible variations in the size of each remnant it cuts. One of the shredders is then selected at random to destroy a blank sheet. By examination of the resulting paper remnants, can one determine if the sheet was shredded by A or B?In this paper we show how information hidden in the size and shape of shredded page remnants can be used to reveal the identity of the device used for shredding. We describe means for modifying shredders to introduce this hidden information. Experimental results reveal that properly embedded information can survive the severe nonlinear distortions introduced by the mechanics of paper shredding.F inally, we consider the question of whether paper shreds could reveal shredder identity even in the absence of device modifications.