Printed Document Integrity Verification Using Barcode

Printed documents are still relevant in our daily life and information in it must be protected from threats and attacks such as forgery, falsification or unauthorized modification. Such threats make the document lose its integrity and authenticity. There are several techniques that have been proposed and used to ensure authenticity and originality of printed documents. But some of the techniques are not suitable for public use due to its complexity, hard to obtain special materials to secure the document and expensive. This paper discuss several techniques for printed document security such as watermarking and barcode as well as the usability of two dimensional barcode in document authentication and data compression with the barcode. A conceptual solution that are simple and efficient to secure the integrity and document sender’s authenticity is proposed that uses two dimensional barcode to carry integrity and authenticity information in the document. The information stored in the barcode contains digital signature that provides sender’s authenticity and hash value that can ensure the integrity of the printed document.

[1]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[2]  P. Bhambri A Novel Approach of Zero Watermarking for Text Documents , 2015 .

[3]  Saeed Mozaffari,et al.  Watermarking in binary document images using fractal codes , 2014, Pattern Recognit. Lett..

[4]  Oriol Ramos Terrades,et al.  A System Based on Intrinsic Features for Fraudulent Document Detection , 2013, 2013 12th International Conference on Document Analysis and Recognition.

[5]  Anurag Jain,et al.  Data Compression Techniques : A Comparative Study , 2013 .

[6]  N. Hiransakolwong,et al.  Grid-line watermarking: A novel method for creating a high-performance text-image watermark , 2013 .

[7]  Nazori Agani,et al.  Document Authentication Using Print-Scan Image Watermarking Based on DCT (Discrete Cosine Transform) Algorithm , 2013 .

[8]  Steven J. Simske,et al.  Modulation in the HVS Domain for Hardcopy Watermarking of Color Documents , 2012, 2012 Eighth International Conference on Signal Image Technology and Internet Based Systems.

[9]  P. D. Bharati,et al.  Text watermarking algorithm using structural approach , 2012, 2012 World Congress on Information and Communication Technologies.

[10]  Muhammad Khurram Khan,et al.  Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes , 2012, 2012 International Symposium on Biometrics and Security Technologies.

[11]  Hector Perez-Meana,et al.  Identity Document Authentication Based on VSS and QR Codes , 2012 .

[12]  Thomas M. Breuel,et al.  Text-line examination for document forgery detection , 2011, International Journal on Document Analysis and Recognition (IJDAR).

[13]  Senthil Shanmugasundaram,et al.  A Comparative Study Of Text Compression Algorithms , 2011 .

[14]  Anwar M. Mirza,et al.  A zero-watermarking algorithm for text documents based on structural components , 2010, 2010 International Conference on Information and Emerging Technologies.

[15]  Xiaojun Liu,et al.  A New Digital Watermarking Scheme Based on Text , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[16]  Reza Davarzani,et al.  Farsi Text Watermarking Based on Character Coding , 2009, 2009 International Conference on Signal Processing Systems.

[17]  Mi-Young Kim Natural Language Watermarking by Morpheme Segmentation , 2009, 2009 First Asian Conference on Intelligent Information and Database Systems.

[18]  Bülent Sankur,et al.  Natural language watermarking via morphosyntactic alterations , 2009, Comput. Speech Lang..

[19]  Hong Wang,et al.  Natural Language Watermarking Using Chinese Syntactic Transformations , 2008 .

[20]  Donald W. Simborg Viewpoint Paper: Healthcare Fraud: Whose Problem is it Anyway? , 2008, J. Am. Medical Informatics Assoc..

[21]  Benoit M. Macq,et al.  Natural Language Watermarking and Robust Hashing Based on Presuppositional Analysis , 2007, 2007 IEEE International Conference on Information Reuse and Integration.

[22]  Sheng Huang,et al.  Optical Watermarking for Printed Document Authentication , 2007, IEEE Transactions on Information Forensics and Security.

[23]  Olli Nevalainen,et al.  A Standalone OCR System for Mobile Cameraphones , 2006, 2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications.

[24]  Mohammad Hassan Shirali-Shahreza,et al.  A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).

[25]  Xingming Sun,et al.  A Natural Language Watermarking Based on Chinese Syntax , 2005, ICNC.

[26]  Alex Biryukov,et al.  Analysis of a SHA-256 Variant , 2005, Selected Areas in Cryptography.

[27]  Helena Handschuh,et al.  Security Analysis of SHA-256 and Sisters , 2003, Selected Areas in Cryptography.

[28]  Radu Sion,et al.  Natural Language Watermarking and Tamperproofing , 2002, Information Hiding.

[29]  Rudolf L. van Renesse Hidden and scrambled images: a review , 2002 .

[30]  Hong Yan,et al.  Interword distance changes represented by sine waves for watermarking text images , 2001, IEEE Trans. Circuits Syst. Video Technol..

[31]  Arlindo L. Oliveira Techniques for the creation of digital watermarks in sequentialcircuit designs , 2001, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[32]  Sergei Nirenburg,et al.  Natural language processing for information assurance and security: an overview and implementations , 2001, NSPW '00.

[33]  Pieter Retief Kasselman,et al.  Analysis and design of cryptographic hash functions , 1999 .

[34]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[35]  C. Biermann Paper and Its Properties , 1996 .

[36]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.