skip to main content
10.1145/1411328.1411332acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Printer profiling for forensics and ballistics

Published: 22 September 2008 Publication History

Abstract

We describe a technique for authenticating printed and scanned text documents. This technique works by modeling the degradation in a document caused by printing. The resulting printer profile is then used to detect inconsistencies across a document, and for ballistic purposes - that of linking a document to a printer.

References

[1]
G. Ali, P.-J. Chiang, A. K. Mikkilineni, J. P. Allebach, G. T. Chiu, and E. J. Delp. Intrinsic and extrinsic signatures for information hiding and secure printing with electrophotographic devices. In IS&T's NIP19: International Conference on Digital Printing Technologies, pages 511--515, 2003.
[2]
G. N. Ali, P.-J. Chiang, A. K. Mikkilineni, G. T.-C. Chiu, E. J. Delp, and J. P. Allebach. Application of principal components analysis and gaussian mixture models to printer identification. In International Conference on Digital Printing Technologies, pages 301--305, 2004.
[3]
H. Baird. The state of the art of document image degradation modeling. In International Workshop on Document Analysis Systems, Rio de Janeiro, 2000.
[4]
J. Barron, D. Fleet, and S. Beauchemin. Performance of optical flow techniques. International Journal of Computer Vision, 12(1):43--77, Feb. 1994.
[5]
R. Duda and P. Hart. Pattern Classification and Scene Analysis. John Wiley and Sons, 1973.
[6]
B. Horn. Robot Vision. MIT Press, Cambridge, MA, 1986.
[7]
N. Khanna, A. Mikkilineni, A. Martone, G. N. Ali, G.-C. Chiu, J. P. Allebach, and E. Delp. A survey of forensic characterization methods for physical devices. Digital Investigation, 3S:S17--S28, 2006.
[8]
A. K. Mikkilineni, G. N. Ali, P.-J. Chiang, G. T. Chiu, J. P. Allebach, and E. J. Delp. Signature-embedding in printed documents for security and forensic applications. In SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, pages 455--466, 2004.
[9]
A. K. Mikkilineni, O. Arslan, P.-J. Chiang, R. M. Kumontoy, J. P. Allebach, G. T.-C. Chiu, and E. J. Delp. Printer Forensics using svm techniques. In IS&T's NIP21: International Conference on Digital Printing Technologies, pages 223--226, 2005.
[10]
A. K. Mikkilineni, P.-J. Chiang, G. N. Ali, G. T.-C. Chiu, J. P. Allebach, and E. J. Delp. Printer identification based on graylevel co-occurrence features for security and forensic applications. In Security, Steganography, and Watermarking of Multimedia Contents, pages 430--440, 2005.
[11]
J. Oliver and J. Chen. Use of signature analysis to discriminate digital printing technologies. In International Conference on Digital Printing Technologies, 2002.
[12]
J. Picard. Digital authentication with copy detection patterns. In SPIE International Conference on Optical Security and Counterfeit Deterrence Techniques, 2004.
[13]
J. Shi and J. Malik. Normalized cuts and image segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 22(8):888--905, 2000.
[14]
E. Simoncelli. Handbook of Computer Vision and Applications, chapter Bayesian Multi-scale Differential Optical Flow, pages 397--420. Academic Press, 1999.
[15]
V. Talbot, P. Perrot, and C. Murie. Inkjet printing discrimination based on invariant moments. In International Conference on Digital Printing Technologies, 2006.
[16]
B. Zhu, J. Wu, and M. Kankanhalli. Print signatures for document authentication. In Conference on Computer and Communications Security, Washington, DC, 2003.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and security
September 2008
242 pages
ISBN:9781605580586
DOI:10.1145/1411328
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 September 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. digital forensics
  2. digital tampering
  3. document authentication
  4. printer ballistics

Qualifiers

  • Research-article

Conference

MM&Sec '08
Sponsor:
MM&Sec '08: Multimedia and Security Workshop
September 22 - 23, 2008
Oxford, United Kingdom

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Source printer identification from document images acquired using smartphoneJournal of Information Security and Applications10.1016/j.jisa.2024.10380484(103804)Online publication date: Aug-2024
  • (2022)Source printer identification using printer specific pooling of letter descriptorsExpert Systems with Applications: An International Journal10.1016/j.eswa.2021.116344192:COnline publication date: 15-Apr-2022
  • (2022)Verifying Document IntegrityMultimedia Security 210.1002/9781119987390.ch3(59-89)Online publication date: Jul-2022
  • (2022)Protecting Documents Using Printed Anticopy ElementsMultimedia Security 210.1002/9781119987390.ch2(31-58)Online publication date: Jul-2022
  • (2021)VIPPrint: Validating Synthetic Image Detection and Source Linking Methods on a Large Scale Dataset of Printed DocumentsJournal of Imaging10.3390/jimaging70300507:3(50)Online publication date: 8-Mar-2021
  • (2021)Ensembling Shallow Siamese Neural Network Architectures for Printed Documents Verification in Data-Scarcity ScenariosIEEE Access10.1109/ACCESS.2021.31102979(133924-133939)Online publication date: 2021
  • (2020)Source Printer Classification Using Printer Specific Local Texture DescriptorIEEE Transactions on Information Forensics and Security10.1109/TIFS.2019.291986915(160-171)Online publication date: 2020
  • (2019)Deep learning for printed document source identificationSignal Processing: Image Communication10.1016/j.image.2018.09.00670(184-198)Online publication date: Feb-2019
  • (2019)Passive classification of source printer using text-line-level geometric distortion signatures from scanned images of printed documentsMultimedia Tools and Applications10.1007/s11042-019-08508-x79:11-12(7377-7400)Online publication date: 23-Dec-2019
  • (2019)Forensic document examination system using boosting and bagging methodologiesSoft Computing10.1007/s00500-019-04297-5Online publication date: 14-Aug-2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media