Skip to main content

High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents

  • Conference paper
Book cover Digital Watermarking (IWDW 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5041))

Included in the following conference series:

Abstract

A digital authentication technique for hardcopy documents (e.g. contracts, official letters, ID cards etc.) is given. In order to secure the printed contents against forgery attacks the foreground contents are encoded in the superposed constant background greyscale image (CBGI) whereas in contents authentication process the contents are decoded from the scanned superposed background image and compared with scanned or printed contents.

The distinguishing features of the novel technique are: l) high-quality superposed constant background image with multiple grey levels, 2) higher data encoding capacity enabling one-to-one contents integrity authentication rather than some selected features, and 3) underlying textual-contents independence, a challenge encountered from the languages with complex writing structures, furthermore, the above characteristics of the superposed data encoding technique allow its application: in the area of secret communication as a tool for military, original quality rather than higher quality fax transmission and digital document management.

The superposed background image forming the encoded portion does not affect the aesthetic appearance of the document. The newly developed coding scheme in conjunction with a novel data-reading technique offers data encoding capacity 15 to 20 times higher than that one offered by market products.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alattar, A.M., Alattar, O.M.: Watermarking electronic text documents containing justified paragraphs and irregular line spacing. In: SPIE, Security and Watermarking of Multimedia Contents VI, San Jose, CA, USA, vol. 5306 (2004)

    Google Scholar 

  2. Bern, M., Breidenbach, J., Goldberg, D.: Trustworthy paper documents. In: Information Hiding Workshop, Pittsburgh, PA, April 2001, pp. 25–27 (2001)

    Google Scholar 

  3. Brassil, J.T., Low, S., Maxemchuk, N.F., O’Gorman, L.: Electronic marking and identification techniques to discourage document copying. IEEE Journal on Selected Areas in Communication 13(8), 1495–1504 (1995)

    Article  Google Scholar 

  4. Brassil, J.T., Low, S., Maxemchuk, N.F.: Copyright protection for the electronic distribution of text documents. Proc. of the IEEE 87(7), 1181–1196 (1999)

    Article  Google Scholar 

  5. Low, S.H., Maxemchuk, N.F.: Performance comparison of two text marking methods. IEEE Transaction on Selected Areas in Communication (1998)

    Google Scholar 

  6. Low, S.H., Maxemchuk, N.F.: Capacity of text marking channel. IEEE Signal Processing Letters 7(12), 345–347 (2000)

    Article  Google Scholar 

  7. Motwani, R., Breidenbach, J.A., Black, J.: Collocated Dataglyphs for Large Message Storage and Retrieval. In: SPIE, Security and Watermarking of Multimedia Contents VI, San Jose, CA USA, vol. 5306 (2004)

    Google Scholar 

  8. Brewington, G.T.: System and method for providing hardcopy secure documents and for validation of such documents, Xerox Corp., Pub. No. US. 2004/0117627 AI, Pub. date, June 17 (2004)

    Google Scholar 

  9. Hecht, D.: Embedded DataGlyph Technology for Hardcopy Digital Documents. In: Proc. of SPIE Color Hard Copy and Graphic Arts III, February 1994, vol. 2171 (1994)

    Google Scholar 

  10. Hilton, D., Tan, W., Wells, P.: Document printed with graphical symbols which encode Information Enseal Systems Limited (GB). US Patent 6871789 (2005)

    Google Scholar 

  11. Suzaki, M., Mitsui, Y., Suto, M.: New alteration detecting technique for printed documents using dot pattern watermarking. In: SPIE 2003, Security and Watermarking of Multimedia Contents V, San Jose, CA, USA (2003)

    Google Scholar 

  12. Iqbal, T.: High Capacity Analog Channels for Smart Documents., Ph.D. thesis, University Duisburg-Essen, Germany, Fac. of Engineering (2006)

    Google Scholar 

  13. Zhao, J.: Digital authentication with digital and analog documents, MediaSec technologies GmbH (DE), US Patent No. 6,751,336 (June 2004)

    Google Scholar 

  14. Iqbal, T., Geisselhardt, W.: Doument with Encoded Portion, Int. Patent PCT/EP2007/006126, filed on March 2, 2007, Essen, Germany (2007)

    Google Scholar 

  15. Jordan, Kutter, M.: Method for Robust Asymmetric Modulation Spatial Marking with Spatial Sub-Sampling., Alpvision SA, Pub. No. US 2006/0147082 AI, Pub. date, July 6 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Geisselhardt, W., Iqbal, T. (2008). High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents. In: Shi, Y.Q., Kim, HJ., Katzenbeisser, S. (eds) Digital Watermarking. IWDW 2007. Lecture Notes in Computer Science, vol 5041. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92238-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-92238-4_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-92237-7

  • Online ISBN: 978-3-540-92238-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics