Document imaging security and forensics ecosystem considerations

Much of the focus in document security tends to be on the deterrent -- the physical (printed, manufactured) item placed on a document, often used for routing in addition to security purposes. Hybrid (multiple) deterrents are not always reliably read by a single imaging device, and so a single device generally cannot simultaneously provide overall document security. We herein show how a relatively simple deterrent can be used in combination with multiple imaging devices to provide document security. In this paper, we show how these devices can be used to classify the printing technology used, a subject of importance for counterfeiter identification as well as printer quality control. Forensic-level imaging is also useful in preventing repudiation and forging, while mobile and/or simple scanning can be used to prevent tampering -- propitiously in addition to providing useful, non-security related, capabilities such as document routing (track and trace) and workflow association.

[1]  Thierry Pun,et al.  Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management , 2006, IEEE Trans. Inf. Forensics Secur..

[2]  Vishal Monga,et al.  High capacity color barcodes using dot orientation and color separability , 2009, Electronic Imaging.

[3]  Steven J. Simske,et al.  High-resolution glyph-inspection based security system , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[4]  Adam Finkelstein,et al.  Fingerprinting Blank Paper Using Commodity Scanners , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[5]  Steven J. Simske,et al.  Effect of copying and restoration on color barcode payload density , 2009, DocEng '09.

[6]  Lawrence E. Hicks The universal product code , 1975 .

[7]  Devi Parikh,et al.  Localization and Segmentation of A 2D High Capacity Color Barcode , 2008, 2008 IEEE Workshop on Applications of Computer Vision.

[8]  Marie Vans,et al.  Barcode Structural Pre-Compensation Optimization , 2009 .

[9]  Guy Adams Hand held Dyson Relay Lens for anti-counterfeiting , 2010, 2010 IEEE International Conference on Imaging Systems and Techniques.

[10]  C. Skaar Wood-Water Relations , 1988, Springer Series in Wood Science.

[11]  Steven J. Simske,et al.  Printer-scanner identification via analysis of structured security deterrents , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[12]  Steven J. Simske,et al.  A system for forensic analysis of large image sets , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[13]  Jan P. Allebach,et al.  A survey of forensic characterization methods for physical devices , 2006, Digit. Investig..

[14]  竹下 敦 OMA(Open Mobile Alliance)の概要と動向 , 2007 .

[15]  Thierry Pun,et al.  Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management , 2005, IEEE Transactions on Information Forensics and Security.

[16]  Mohan S. Kankanhalli,et al.  Print signatures for document authentication , 2003, CCS '03.

[17]  Edwin D. Reilly Universal product code , 2003 .

[18]  Debargha Mukherjee,et al.  Design of high capacity 3D print codes with visual cues aiming for robustness to the PS channel and external distortions , 2009, 2009 IEEE International Workshop on Multimedia Signal Processing.

[19]  Danna E. Bicknell,et al.  Forged and Counterfeit Documents , 2009 .

[20]  Debargha Mukherjee,et al.  Design of high capacity 3D print codes aiming for robustness to the PS channel and external distortions , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).