Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning

In this paper we propose a new authentication and localisation scheme to produce a watermark which can be embedded in a limited capacity binary text document and that will work in a print and scan environment. The scheme utilises Message Authentication Codes (MAC), specifically OMACs, which create a cryptographic fixed-length summary of a document. An OMAC must be truncated to a form part of our watermark and is used during authentication. The remainder of the watermark is used during localisation. We have created over 2,000,000 watermarks in controlled experiments to evaluate their ability to authenticate a document and localise any changes. In addition, we have embedded an authenticating watermark into seven different documents and authenticated them after printing and scanning.

[1]  Martin F. H. Schuurmans,et al.  Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.

[2]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[3]  Morris J. Dworkin,et al.  SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication , 2005 .

[4]  Xiaoyun Wang,et al.  Finding Collisions in the Full SHA-1 , 2005, CRYPTO.

[5]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[6]  C. Culnane,et al.  Improving Mutli-set Formatted Binary Text Watermarking Using Continuous Line Embedding , 2007, Second International Conference on Innovative Computing, Informatio and Control (ICICIC 2007).

[7]  Helen Treharne,et al.  A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes , 2006, IWDW.

[8]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[9]  Chris J. Mitchell Partial Key Recovery Attacks on XCBC, TMAC and OMAC , 2005, IMACC.

[10]  Yun Q. Shi,et al.  Formatted text document data hiding robust to printing, copying and scanning , 2005, 2005 IEEE International Symposium on Circuits and Systems.

[11]  Thierry Pun,et al.  Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding , 2007, Electronic Imaging.

[12]  Kaoru Kurosawa,et al.  OMAC: One-Key CBC MAC , 2003, IACR Cryptol. ePrint Arch..

[13]  Mikhail J. Atallah,et al.  Words are not enough: sentence level natural language watermarking , 2006, MCPS '06.