Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning
In this paper we propose a new authentication and localisation scheme to produce a watermark which can be embedded in a limited capacity binary text document and that will work in a print and scan environment. The scheme utilises Message Authentication Codes (MAC), specifically OMACs, which create a cryptographic fixed-length summary of a document. An OMAC must be truncated to a form part of our watermark and is used during authentication. The remainder of the watermark is used during localisation. We have created over 2,000,000 watermarks in controlled experiments to evaluate their ability to authenticate a document and localise any changes. In addition, we have embedded an authenticating watermark into seven different documents and authenticated them after printing and scanning.
KeywordsLocalisation Error Block Cipher Localisation Scheme Message Authentication Code Localisation Block
Unable to display preview. Download preview PDF.
- 1.Culnane, C., Treharne, H., Ho, A.T.S.: Improving multi-set formatted binary text watermarking using continuous line embedding. In: IEEE International Conference on Innovative Computing, Information and Control (ICICIC 2007) (to appear, 2007)Google Scholar
- 2.Topkara, M., Topkara, U., Atallah, M.J.: Words are not enough: sentence level natural language watermarking. In: MCPS 2006: Proceedings of the 4th ACM international workshop on Contents protection and security, pp. 37–46. ACM Press, New York (2006)Google Scholar
- 3.Villán, R., Voloshynovskiy, S., Koval, O., Deguillaume, F., Pun, T.: Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents IX, February 2007. Society of Photo-Optical Instrumentation Engineers (SPIE) Conference, vol. 6505, p. 65051T (2007)Google Scholar
- 4.Miller, M.L., Cox, I.J., Bloom, J.A.: Digital Watermarking, 1st edn. Morgan Kaufmann, San Francisco (2002)Google Scholar
- 6.Zou, D., Shi, Y.Q.: Formatted text document data hiding robust to printing, copying and scanning. In: IEEE International Symposium on Circuits and Systems (ISCAS 2005) (2005)Google Scholar
- 7.Dworkin, M.: Recommendation for block cipher modes of operation: The cmac mode for authentication. Special Publication 800-38B, NIST (May 2005)Google Scholar
- 8.Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621. Springer, Heidelberg (2005)Google Scholar
- 9.NIST. Nist brief Comments on Recent Cryptographic Attacks on Secure Hashing Functions and the Continued Security Provided by SHA-1. Internet (August 2004), http://csrc.nist.gov/hash_standards_comments.pdf