Print signatures for document authentication

We present a novel solution for authenticating printed paper documents by utilizing the inherent non--repeatable randomness existing in the printing process. For a document printed by a laser-printer, we extract the unique features of the non--repeatable print content for each copy. The shape profiles of this content are used as the feature to represent the uniqueness of that particular printed copy. These features along with some important document content is then captured as the print signature. We present theoretical and experimental details on how to register as well as authenticate this print signature. The security analysis of this technique is also presented. We finally provide experimental results to demonstrate the feasibility of the proposed method.

[1]  Remco C. Veltkamp,et al.  State of the Art in Shape Matching , 2001, Principles of Visual Information Retrieval.

[2]  Fernando Pérez-González,et al.  Visible encryption: using paper as a secure channel , 2003, IS&T/SPIE Electronic Imaging.

[3]  Jerome Swartz,et al.  Information encoding with two-dimensional bar codes , 1992, Computer.

[4]  Van Renesse,et al.  Optical document security , 1994 .

[5]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[6]  Proceedings of the 1983 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 25-27, 1983 , 1983, IEEE Symposium on Security and Privacy.

[7]  Abigail Sellen,et al.  The myth of the paperless office , 2001 .

[8]  Christian Kuhn The security document , 2005 .

[9]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[10]  Jack Brassil,et al.  Tracing the Source of a Shredded Document , 2002, Information Hiding.

[11]  Joshua R. Smith,et al.  FiberFingerprint Identification , 2002 .

[12]  Christine Reid,et al.  The Myth of the Paperless Office , 2003, J. Documentation.

[13]  Stephen J. Bigelow,et al.  Easy Laser Printer Maintenance and Repair , 1994 .

[14]  N. Otsu A threshold selection method from gray level histograms , 1979 .

[15]  E. Ziegel Introduction to the Theory and Practice of Econometrics , 1989 .

[16]  Jerome Swartz,et al.  Fundamentals of bar code information theory , 1990, Computer.

[17]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..