Automatic authentication of color laser print-outs using machine identification codes

Authentication of documents can be done by detecting the printing device used to generate the print-out. Many manufacturers of color laser printers and copiers designed their devices in a way to integrate a unique tracking pattern in each print-out. This pattern is used to identify the exact device the print-out originates from. In this paper, we present an important extension of our previous work for (a) detecting the class of printer that was used to generate a print-out, namely automatic methods for (b) comparing two base patterns from two different print-outs to verify if two print-outs come from the same printer and for (c) automatic decoding of the base pattern to extract the serial number and, if available, the time and the date the document was printed. Finally, we present (d) the first public dataset on tracking patterns (also called machine identification codes) containing 1,264 images from 132 different printers. Evaluation on this dataset resulted in accuracies of up to 93.0 % for detecting the printer class. Comparison and decoding of the tracking patterns achieved accuracies of 91.3 and 98.3 %, respectively.

[1]  Heung-Kyu Lee,et al.  Color laser printer identification by analyzing statistical features on discrete wavelet transform , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[2]  Thomas M. Breuel,et al.  Evaluation of Graylevel-Features for Printing Technique Classification in High-Throughput Document Management Systems , 2008, IWCF.

[3]  Jan P. Allebach,et al.  Intrinsic and Extrinsic Signatures for Information Hiding and Secure Printing with Electrophotographic Devices , 2003, NIP & Digital Fabrication Conference.

[4]  Sargur N. Srihari,et al.  A Machine Learning Approach to Off-Line Signature Verification Using Bayesian Inference , 2009, IWCF.

[5]  Thomas M. Breuel,et al.  Efficient implementation of local adaptive thresholding techniques using integral images , 2008, Electronic Imaging.

[6]  N. Otsu A threshold selection method from gray level histograms , 1979 .

[7]  Martin Neebe,et al.  Multifunctional optical security features based on bacteriorhodopsin , 2004, IS&T/SPIE Electronic Imaging.

[8]  Thomas M. Breuel,et al.  Implementation techniques for geometric branch-and-bound matching methods , 2003, Comput. Vis. Image Underst..

[9]  L Rudolf,et al.  Optical Security and Counterfeit Deterrence Techniques III , 1996 .

[10]  Siyuan Chen,et al.  A New Off-line Signature Verification Method based on Graph , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[11]  Jan P. Allebach,et al.  Printer identification based on graylevel co-occurrence features for security and forensic applications , 2005, IS&T/SPIE Electronic Imaging.

[12]  R. L. van Renesse,et al.  Paper based document security-a review , 1997 .

[13]  Rudolf L. van Renesse,et al.  Hidden and scrambled images: a review , 2002, IS&T/SPIE Electronic Imaging.

[14]  Yun Q. Shi,et al.  A Novel Multi-size Block Benford's Law Scheme for Printer Identification , 2010, PCM.

[15]  Sargur N. Srihari,et al.  Computational Forensics: An Overview , 2008, IWCF.

[16]  Thomas M. Breuel,et al.  Automatic counterfeit protection system code classification , 2010, Electronic Imaging.

[17]  Isaac Amidror New print-based security strategy for the protection of valuable documents and products using moire intensity profiles , 2002, IS&T/SPIE Electronic Imaging.

[18]  Lambert Schomaker,et al.  Automatic writer identification using connected-component contours and edge-based features of uppercase Western script , 2004, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[19]  Carlos Luna,et al.  Commercial anticounterfeit products using machine vision , 2004, IS&T/SPIE Electronic Imaging.

[20]  Sargur N. Srihari,et al.  Comparison of historical documents for writership , 2010, Electronic Imaging.

[21]  Jan P. Allebach,et al.  Survey of Scanner and Printer Forensics at Purdue University , 2008, IWCF.

[22]  Matti Pietikäinen,et al.  Adaptive document image binarization , 2000, Pattern Recognit..

[23]  Willem A. Vliegenthart,et al.  Optical security and counterfeit deterrence techniques III : 27-28 January 2000, San Jose, California , 2000 .

[24]  Thomas M. Breuel Binary Morphology and Related Operations on Run-Length Representations , 2008, VISAPP.

[25]  Lambert Schomaker,et al.  Automatic writer identification using fragmented connected-component contours , 2004, Ninth International Workshop on Frontiers in Handwriting Recognition.

[26]  Thomas M. Breuel A practical, globally optimal algorithm for geometric matching under uncertainty , 2001, Electron. Notes Theor. Comput. Sci..

[27]  Rudolf L. van Renesse Ordering the order: a survey of optical document security features , 1995 .

[28]  Thomas M. Breuel,et al.  Combined orientation and skew detection using geometric text-line modeling , 2009, International Journal on Document Analysis and Recognition (IJDAR).

[29]  Marco Schreyer,et al.  Intelligent Printing Technique Recognition and Photocopy Detection for Forensic Document Examination , 2009, Informatiktage.

[30]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[31]  Thomas M. Breuel,et al.  Using DCT Features for Printing Technique and Copy Detection , 2009, IFIP Int. Conf. Digital Forensics.