Handbook of Applied Cryptography
Handbook of Applied Cryptography
Easy Laser Printer Maintenance and Repair
Easy Laser Printer Maintenance and Repair
Tracing the Source of a Shredded Document
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
The Myth of the Paperless Office
The Myth of the Paperless Office
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Fingerprinting Relational Databases: Schemes and Specialties
IEEE Transactions on Dependable and Secure Computing
Secure rural supply chain management using low cost paper watermarking
Proceedings of the second ACM SIGCOMM workshop on Networked systems for developing regions
Printer profiling for forensics and ballistics
Proceedings of the 10th ACM workshop on Multimedia and security
Some consequences of paper fingerprinting for elections
EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
Document imaging security and forensics ecosystem considerations
Proceedings of the 10th ACM symposium on Document engineering
Secure protocols for serverless remote product authentication
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
A study of the interaction of paper substrates on printed forensic imaging
Proceedings of the 11th ACM symposium on Document engineering
PaperSpeckle: microscopic fingerprinting of paper
Proceedings of the 18th ACM conference on Computer and communications security
Hi-index | 0.00 |
We present a novel solution for authenticating printed paper documents by utilizing the inherent non--repeatable randomness existing in the printing process. For a document printed by a laser-printer, we extract the unique features of the non--repeatable print content for each copy. The shape profiles of this content are used as the feature to represent the uniqueness of that particular printed copy. These features along with some important document content is then captured as the print signature. We present theoretical and experimental details on how to register as well as authenticate this print signature. The security analysis of this technique is also presented. We finally provide experimental results to demonstrate the feasibility of the proposed method.