Skip to main content

Document Signature Using Intrinsic Features for Counterfeit Detection

  • Conference paper
Computational Forensics (IWCF 2008)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 5158))

Included in the following conference series:

Abstract

Document security does not only play an important role in specific domains e.g. passports, checks and degrees but also in every day documents e.g. bills and vouchers. Using special high-security features for this class of documents is not feasible due to the cost and the complexity of these methods. We present an approach for detecting falsified documents using a document signature obtained from its intrinsic features: bounding boxes of connected components are used as a signature. Using the model signature learned from a set of original bills, our approach can identify documents whose signature significantly differs from the model signature. Our approach uses globally optimal document alignment to build a model signature that can be used to compute the probability of a new document being an original one. Preliminary evaluation shows that the method is able to reliably detect faked documents.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Smith, P.J., O’Doherty, P., Luna, C., McCarthy, S.: Commercial anticounterfeit products using machine vision. In: van Renesse, R.L. (ed.) Optical Security and Counterfeit Deterrence Techniques V. Presented at the Society of Photo-Optical Instrumentation Engineers (SPIE) Conference. Proceedings of the SPIE, vol. 5310, pp. 237–243 (June 2004)

    Google Scholar 

  2. Amidror, I.: A new print-based security strategy for the protection of valuable documents and products using moire intensity profiles. In: van Renesse, R.L. (ed.) Optical Security and Counterfeit Deterrence Techniques V. Proceedings of the SPIE, vol. 4677, pp. 89–100 (June 2002)

    Google Scholar 

  3. Hampp, N.A., Neebe, M., Juchem, T., Wolperdinger, M., Geiger, M., Schmuck, A.: Multifunctional optical security features based on bacteriorhodopsin. In: van Renesse, R.L. (ed.) Optical Security and Counterfeit Deterrence Techniques V. Proceedings of the SPIE, vol. 5310, pp. 117–124 (June 2004)

    Google Scholar 

  4. Bernsen, J.: Dynamic thresholding of gray level images. In: Proc. Int. Conf. on Pattern Recognition, Paris, France, pp. 1251–1255 (1986)

    Google Scholar 

  5. Breuel, T.M.: The OCRopus open source OCR system. In: SPIE Document Recognition and Retrieval XV, San Jose, USA, pp. 0F1–0F15 (January 2008)

    Google Scholar 

  6. Shafait, F., Keysers, D., Breuel, T.M.: Performance evaluation and benchmarking of six page segmentation algorithms. IEEE Trans. on Pattern Analysis and Machine Intelligence 30(6), 941–954 (2008)

    Article  Google Scholar 

  7. Zitova, B., Flusser, J.: Image registration methods: a survey. Image and Vision Computing 21(11), 977–1000 (2003)

    Article  Google Scholar 

  8. Nakai, T., Kise, K., Iwamura, M.: A method of annotation extraction from paper documents using alignment based on local arrangements of feature points. In: Int. Conf. on Document Analysis and Recognition, Curitiba, Brazil, pp. 23–27 (September 2007)

    Google Scholar 

  9. Liang, J., DeMenthon, D., Doermann, D.: Camera-based document image mosaicing. In: Int. Conf. on Patt. Recog., Hong Kong, China, pp. 476–479 (August 2006)

    Google Scholar 

  10. Shafait, F., van Beusekom, J., Keysers, D., Breuel, T.M.: Page frame detection for marginal noise removal from scanned documents. In: Ersbøll, B.K., Pedersen, K.S. (eds.) SCIA 2007. LNCS, vol. 4522, pp. 651–660. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  11. van Beusekom, J., Shafait, F., Breuel, T.M.: Image-matching for revision detection in printed historical documents. In: Hamprecht, F.A., Schnörr, C., Jähne, B. (eds.) DAGM 2007. LNCS, vol. 4713, pp. 507–516. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  12. Breuel, T.M.: A practical, globally optimal algorithm for geometric matching under uncertainty. Electronic Notes in Theoretical Computer Science 46, 1–15 (2001)

    Article  Google Scholar 

  13. Breuel, T.M.: Implementation techniques for geometric branch-and-bound matching methods. Computer Vision and Image Understanding 90(3), 258–294 (2003)

    Article  MATH  Google Scholar 

  14. Granlund, G.H.: Fourier Preprocessing for Hand Print Character Recognition. IEEE Trans. on Computers C–21(2), 195–201 (1972)

    Article  MathSciNet  Google Scholar 

  15. Lampert, C.H., Mei, L., Breuel, T.M.: Printing technique classification for document counterfeit detection. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS (LNAI), vol. 1, pp. 639–644. Springer, Heidelberg (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Sargur N. Srihari Katrin Franke

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

van Beusekom, J., Shafait, F., Breuel, T.M. (2008). Document Signature Using Intrinsic Features for Counterfeit Detection. In: Srihari, S.N., Franke, K. (eds) Computational Forensics. IWCF 2008. Lecture Notes in Computer Science, vol 5158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85303-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85303-9_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85302-2

  • Online ISBN: 978-3-540-85303-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics