High capacity analog channels for smart documents

Widely-used valuable hardcopy documents such as passports, visas, driving licenses, educational certificates, entrance-passes for entertainment events etc. are conventionally protected against counterfeiting and data tampering attacks by applying analog security technologies (e.g. KINEGRAMS®, holograms, micro-printing, UV/IR inks etc.). How-ever, easy access to high quality, low price modern desktop publishing technology has left most of these technologies ineffective, giving rise to high quality false documents. The higher price and restricted usage are other drawbacks of the analog document pro-tection techniques. Digital watermarking and high capacity storage media such as IC-chips, optical data stripes etc. are the modern technologies being used in new machine-readable identity verification documents to ensure contents integrity; however, these technologies are either expensive or do not satisfy the application needs and demand to look for more efficient document protection technologies. In this research three different high capacity analog channels: high density data stripe (HD-DataStripe), data hiding in printed halftone images (watermarking), and super-posed constant background grayscale image (CBGI) are investigated for hidden com-munication along with their applications in smart documents. On way to develop high capacity analog channels, noise encountered from printing and scanning (PS) process is investigated with the objective to recover the digital information encoded at nearly maximum channel utilization. By utilizing noise behaviour, countermeasures against the noise are taken accordingly in data recovery process. HD-DataStripe is a printed binary image similar to the conventional 2-D barcodes (e.g. PDF417), but it offers much higher data storage capacity and is intended for machine-readable identity verification documents. The capacity offered by the HD-DataStripe is sufficient to store high quality biometric characteristics rather than extracted templates, in addition to the conventional bearer related data contained in a smart ID-card. It also eliminates the need for central database system (except for backup record) and other ex-pensive storage media, currently being used. While developing novel data-reading tech-nique for HD-DataStripe, to count for the unavoidable geometrical distortions, registra-tion marks pattern is chosen in such a way so that it results in accurate sampling points (a necessary condition for reliable data recovery at higher data encoding-rate). For more sophisticated distortions caused by the physical dot gain effects (intersymbol interfer-ence), the countermeasures such as application of sampling theorem, adaptive binariza-tion and post-data processing, each one of these providing only a necessary condition for reliable data recovery, are given. Finally, combining the various filters correspond-ing to these countermeasures, a novel Data-Reading technique for HD-DataStripe is given. The novel data-reading technique results in superior performance than the exist-ing techniques, intended for data recovery from printed media. In another scenario a small-size HD-DataStripe with maximum entropy is used as a copy detection pattern by utilizing information loss encountered at nearly maximum channel capacity. While considering the application of HD-DataStripe in hardcopy documents (contracts, official letters etc.), unlike existing work [Zha04], it allows one-to-one contents matching and does not depend on hash functions and OCR technology, constraints mainly imposed by the low data storage capacity offered by the existing analog media. For printed halftone images carrying hidden information higher capacity is mainly attributed to data-reading technique for HD-DataStripe that allows data recovery at higher printing resolution, a key requirement for a high quality watermarking technique in spatial domain. Digital halftoning and data encoding techniques are the other factors that contribute to data hiding technique given in this research. While considering security aspects, the new technique allows contents integrity and authenticity verification in the present scenario in which certain amount of errors are unavoidable, restricting the usage of existing techniques given for digital contents. Finally, a superposed constant background grayscale image, obtained by the repeated application of a specially designed small binary pattern, is used as channel for hidden communication and it allows up to 33 pages of A-4 size foreground text to be encoded in one CBGI. The higher capacity is contributed from data encoding symbols and data reading technique.

[1]  C. J. Harwood,et al.  Optical Document Security , 1998 .

[2]  Rakhi C. Motwani,et al.  Collocated Dataglyphs for large-message storage and retrieval , 2004, IS&T/SPIE Electronic Imaging.

[3]  Adnan M. Alattar,et al.  Watermarking electronic text documents containing justified paragraphs and irregular line spacing , 2004, IS&T/SPIE Electronic Imaging.

[4]  Alexander Herrigel smartID: a new approach for the integrity verification of analog and digital documents , 2004, IS&T/SPIE Electronic Imaging.

[5]  Marshall W. Bern,et al.  Trustworthy Paper Documents , 2001, Information Hiding.

[6]  Markus G. Kuhn,et al.  Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.

[7]  Ralf Steinmetz,et al.  Biometric authentication for ID cards with hologram watermarks , 2002, IS&T/SPIE Electronic Imaging.

[8]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[9]  Alessandro Artusi Real Time Tone Mapping , 2004 .

[10]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[11]  Kazem Taghva,et al.  Document Recognition and Retrieval XII , 2004 .

[12]  George K. Phillips Combining thermochromics and conventional inks to deter document fraud , 2000, Electronic Imaging.

[13]  Hae Yong Kim A new public-key authentication watermarking for binary document images resistant to parity attacks , 2005, IEEE International Conference on Image Processing 2005.

[14]  Fernando Pérez-González,et al.  Visible encryption: using paper as a secure channel , 2003, IS&T/SPIE Electronic Imaging.

[15]  Carmen García-Mateo,et al.  Multimodal Biometrics , 2007, Ann. des Télécommunications.

[16]  Nasir D. Memon,et al.  Data hiding in binary text documents , 2001, IS&T/SPIE Electronic Imaging.

[17]  Lawrence O'Gorman,et al.  Secure Identification Documents Via Pattern Recognition and Public-Key Cryptography , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[18]  Hsi-Chun Alister Wang Data hiding techniques for printed binary images , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[19]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[20]  Jana Dittmann Content-fragile watermarking for image authentication , 2001, IS&T/SPIE Electronic Imaging.

[21]  Arun Ross,et al.  Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.

[22]  Jack Tchan,et al.  The development of an image analysis system that can detect fraudulent alterations made to printed images , 2004, IS&T/SPIE Electronic Imaging.

[23]  Gaurav Sharma,et al.  Show-through watermarking of duplex printed documents , 2004, IS&T/SPIE Electronic Imaging.

[24]  George K. Phillips Combining nanocharacter printing, digital watermarking, and UV-coded taggents for optimal machine-readable security , 2002, IS&T/SPIE Electronic Imaging.

[25]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[26]  Sharron G. Penn,et al.  Nanobarcodes particles as covert security tags for documents and product security , 2004, IS&T/SPIE Electronic Imaging.

[27]  Yasuhiro Mitsui,et al.  New alteration detecting technique for printed documents using dot pattern watermarking , 2003, IS&T/SPIE Electronic Imaging.

[28]  Benoit M. Macq,et al.  A print and scan optimized watermarking scheme , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[29]  Oscar C. Au,et al.  Data hiding watermarking for halftone images , 2002, IEEE Trans. Image Process..

[30]  Jana Dittmann,et al.  Hologram watermarks for document authentications , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[31]  Min Wu,et al.  Multimedia Data Hiding , 2003, Springer New York.

[32]  Thierry Pun,et al.  Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management , 2005, IEEE Transactions on Information Forensics and Security.

[33]  李幼升,et al.  Ph , 1989 .

[34]  J.-H. Lee,et al.  Digital color halftoning , 2005, IEEE Signal Processing Magazine.

[35]  Nebojsa Jojic,et al.  Tamper-Resistant Biometric IDs , 2004, ISSE.

[36]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[37]  Steven H. Low,et al.  Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.

[38]  Khair Eddin Sabri,et al.  Data Hiding In A Binary Image , 2003 .

[39]  Hagit Hel-Or Watermarking and copyright labeling of printed images , 2001, J. Electronic Imaging.

[40]  Steven H. Low,et al.  Performance comparison of two text marking methods , 1998, IEEE J. Sel. Areas Commun..

[41]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[42]  Isaac Amidror New print-based security strategy for the protection of valuable documents and products using moire intensity profiles , 2002, IS&T/SPIE Electronic Imaging.

[43]  Oscar C. Au,et al.  Halftone image data hiding with intensity selection and connection selection , 2001, Signal Process. Image Commun..

[44]  David L. Hecht,et al.  Embedded data glyph technology for hardcopy digital documents , 1994, Electronic Imaging.

[45]  Thierry Pun,et al.  Visual communications with side information via distributed printing channels: extended multimedia and security perspectives , 2004, IS&T/SPIE Electronic Imaging.

[46]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[47]  S.H. Low,et al.  Capacity of text marking channel , 2000, IEEE Signal Processing Letters.

[48]  Giuseppe Schirripa Spagnolo,et al.  Content fragile watermarking based on a computer generated hologram coding technique , 2005 .

[49]  Gaurav Sharma,et al.  Digital color imaging , 1997, IEEE Trans. Image Process..

[50]  George K. Phillips New digital anti-copy/scan and verification technologies , 2004, IS&T/SPIE Electronic Imaging.

[51]  Min Wu,et al.  Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.

[52]  Jana Dittmann,et al.  Watermarking protocols for authentication and ownership protection based on timestamps and holograms , 2002, IS&T/SPIE Electronic Imaging.

[53]  Alexander Herrigel,et al.  Optical/digital identification/verification system based on digital watermarking technology , 2000, Other Conferences.

[54]  Justin Picard Digital authentication with copy-detection patterns , 2004, IS&T/SPIE Electronic Imaging.

[55]  Daniel P. Lopresti,et al.  Chipless ID for paper documents , 2005, IS&T/SPIE Electronic Imaging.