Introduction
Contrary to popular opinion, the use of paper in our society will not disappear any time during the foreseeable future. In fact, the use of paper continues to grow rather than decline. It is certainly true that as individuals, we may be printing less than we used to. And the role of paper has been transformed from the archival record of a document to a convenient and aesthetically appealing graphical user interface. The use of paper is now intimately linked to the electronic systems that capture, process, transmit, generate, and reproduce textual and graphical content. Paper can be thought of as an interface between humans and the digital world. If this interface is not secure, the entire system becomes vulnerable to attack and abuse. Although paper is read by humans in the same way that it has been for millennia, and has had the same fundamental form and composition for almost that long as well, the technologies for printing and scanning documents and capturing their content have evolved tremendously, especially during the last twenty years. This has moved the capability to generate printed documents from the hands of a select few to anyone with access to lowcost scanners, printers, and personal computers. It has greatly broadened the opportunities for abuse of trust through the generation of fallacious documents and tampering with existing documents, including the embedding of messages in these documents.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Investigating machine identification code technology in color laser printers (July 2005), http://www.eff.org/wp/investigating-machine-identification-code-technology-color-laser-printers
Check Clearing for the 21st Century Act (April 24, 2007), http://www.federalreserve.gov/paymentsystems/truncation/default.htm
Akao, Y., Kobayashi, K., Sugawara, S., Seki, Y.: Discrimination of inkjet-printed counterfeits by spur marks and feature extraction by spatial frequency analysis. In: van Renesse, R.L. (ed.) Proceedings of the SPIE International Conference on Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677, pp. 129–137 (2002)
Ali, G.N., Chiang, P.J., Mikkilineni, A.K., Allebach, J.P., Chiu, G.T.C., Delp, E.J.: Intrinsic and extrinsic signatures for information hiding and secure printing with electrophotographic devices. In: Proceedings of the IS&T’s NIP19: International Conference on Digital Printing Technologies, New Orleans, LA, September 2003, vol. 19, pp. 511–515 (2003)
Ali, G.N., Chiang, P.J., Mikkilineni, A.K., Chiu, G.T.C., Delp, E.J., Allebach, J.P.: Application of principal components analysis and gaussian mixture models to printer identification. In: Proceedings of the IS&T’s NIP20: International Conference on Digital Printing Technologies, Salt Lake City, UT, October/November 2004, vol. 20, pp. 301–305 (2004)
Arslan, O., Kumontoy, R.M., Chiang, P.J., Mikkillineni, A.K., Allebach, J.P., Chiu, G.T.C., Delp, E.J.: Identification of inkjet printers for forensic applications. In: Proceedings of the IS&T’s NIP21: International Conference on Digital Printing Technologies, Baltimore, MD, October 2005, vol. 21, pp. 235–238 (2005)
Barni, M., Bartolini, F.: Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Marcel Dekker, New York (2004)
Barni, M., Podilchuk, C.I., Bartolini, F., Delp, E.J.: Watermark embedding: hiding a signal within a cover image. IEEE Communications Magazine 39(8), 102–108 (2001)
Bernal, E., Allebach, J.P., Pizlo, Z.: Improved pen alignment for bidirectional printing. The Journal of Imaging Science and Technology 51(1), 1–22 (2007)
Brassil, J.T., Low, S., Maxemchuk, N.F.: Copyright protection for the electronic distribution of text documents. Proceedings of the IEEE 87, 1181–1196 (1999)
Bulan, O., Monga, V., Sharma, G., Oztan, B.: Data embedding in hardcopy images via halftone-dot orientation modulation. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents X, vol. 6819 (January 2009)
Burges, C.J.C.: A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery 2(2), 121–167 (1998)
Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/~cjlin/libsvm
Chen, C.L.: Modeling, Analysis, and Robust Controls for Electrophotographic Imaging Systems Subject to Spatially Periodic Disturbances and Measurable Nonlinearities. Ph.D. thesis, Purdue University (2003)
Chen, M., Fridrich, J., Goljan, M., Lukas, J.: Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security 3(1), 74–90 (2008)
Chiang, P.J., Ali, G.N., Mikkilineni, A.K., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Extrinsic signatures embedding using exposure modulation for information hiding and secure printing in electrophotographic devices. In: Proceedings of the IS&T’s NIP20: International Conference on Digital Printing Technologies, Salt Lake City, UT, October/November 2004, vol. 20, pp. 295–300 (2004)
Chiang, P.J., Khanna, N., Mikkilineni, A.K., Segovia, M.V.O., Suh, S., Allebach, J.P., Chiu, G.T.C., Delp, E.J.: Printer and scanner forensics. IEEE Signal Processing Magazine 26(2), 72–83 (2009)
Chiang, P.J., Mikkilineni, A.K., Delp, E.J., Allebach, J.P., Chiu, G.T.C.: Extrinsic signatures embedding and detection in electrophotographic halftone images through laser intensity modulation. In: Proceedings of the IS&T’s NIP22: International Conference on Digital Printing Technologies, Denver, CO, September 2006, pp. 432–435 (2006)
Conners, R.W., Trivedi, M.M., Harlow, C.A.: Segmentation of a high-resolution urban scene using texture operators. Computer Vision, Graphics, and Image Processing 25, 273–310 (1984)
Cristianini, N., Taylor, J.S.: An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods. Cambridge University Press, Cambridge (2000)
Doherty, P.: Classification of ink jet printers and inks. J. Am. Soc. of Quest. Doc. Exam. 1(1), 88–106 (1998)
Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. Wiley-Interscience, Hoboken (2000)
Foi, A., Katkovnik, V., Egiazarian, K., Astola, J.: A novel local polynomial estimator based on directional multiscale optimizations. In: Proceedings of the 6th IMA Int. Conf. Math. in Signal Processing, vol. 5685, pp. 79–82 (2004)
Fu, M.S., Au, O.: Data hiding in halftone images by stochastic error diffusion. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2001, vol. 3, pp. 1965–1968 (2001)
Fukunaga, K.: Introduction to Statistical Pattern Recognition. Academic Press, San Diego (1990)
Gloe, T., Franz, E., Winkler, A.: Forensics for flatbed scanners. In: Delp III, E.J., Wong, P.W. (eds.) Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, 65051I. SPIE, San Jose (2007)
Gou, H., Swaminathan, A., Wu, M.: Robust scanner identification based on noise features. In: Delp III, E.J., Wong, P.W. (eds.) Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, 65050S. SPIE, San Jose (2007)
Gupta, G., Saha, S.K., Chakraborty, S., Mazumdar, C.: Document frauds: Identification and linking fake document to scanners and printers. In: International Conference on Computing: Theory and Applications (ICCTA 2007), March 2007, pp. 497–501 (2007)
Haralick, R.M., Shanmugam, K., Dinstein, I.: Textural features for image classification. IEEE Transactions on Systems, Man, and Cybernetics SMC-3(6), 610–621 (1973)
Holst, G.C.: CCD Arrays, Cameras, and Displays, 2nd edn. JCD Publishing & SPIE Press, USA (1998)
Hsu, C.W., Chang, C.C., Lin, C.J.: A practical guide to support vector classification. Department of Computer Science and Information Engineering, National Taiwan University (July 2003), http://www.csie.ntu.edu.tw/~cjlin/papers/guide/guide.pdf
Janesick, J.R.: Scientific Charge-Coupled Devices. SPIE, San Jose (January 2001)
Joachims, T.: Making large-scale support vector machine learning practical. In: Schölkopf, B., Burges, C., Smola, A. (eds.) Advances in Kernel Methods: Support Vector Machines. MIT Press, Cambridge (1998)
Kacker, D., Allebach, J.P.: Joint halftoning and watermarking. IEEE Transactions on Signal Processing 51(4), 1054–1068 (2003)
Kacker, D., Camis, T., Allebach, J.P.: Electrophotographic process embedded in direct binary search. IEEE Transactions on Image Processing 11(3), 234–257 (2002)
Khanna, N., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Forensic techniques for classifying scanner, computer generated and digital camera images. In: Proceedings of the 2008 IEEE International Conference on Acoustics, Speech, and Signal Processing, Las Vegas, NV (March 2008)
Khanna, N., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Scanner identification with extension to forgery detection. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, January 2008, vol. 6819, 68190G (2008)
Khanna, N., Mikkilineni, A.K., Chiang, P.J., Ortiz, M.V., Shah, V., Suh, S., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Printer and sensor forensics. In: IEEE Workshop on Signal Processing Applications for Public Security and Forensics (SAFE 2007), April 2007, pp. 1–8 (2007)
Khanna, N., Mikkilineni, A.K., Chiang, P.J., Ortiz, M.V., Suh, S., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Sensor forensics: Printers, cameras and scanners, they never lie. In: 2007 IEEE International Conference on Multimedia and Expo., July 2007, pp. 20–23 (2007)
Khanna, N., Mikkilineni, A.K., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Forensic classification of imaging sensor types. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents IX, January 2007, vol. 6505, 65050U. SPIE, San Jose (2007)
Khanna, N., Mikkilineni, A.K., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Scanner identification using sensor pattern noise. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents IX, January 2007, vol. 6505, 65051K. SPIE, San Jose (2007)
Khanna, N., Mikkilineni, A.K., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Survey of scanner and printer forensics at purdue university. In: Srihari, S.N., Franke, K. (eds.) IWCF 2008. LNCS, vol. 5158, pp. 22–34. Springer, Heidelberg (2008)
Khanna, N., Mikkilineni, A.K., Delp, E.J.: Forensic camera classification: Verification of sensor pattern noise approach. Forensic Science Communications (FSC)Â 11(1) (January 2009)
Khanna, N., Mikkilineni, A.K., Delp, E.J.: Scanner identification using feature-based processing and analysis. IEEE Transactions on Information Forensics and Security 4(1), 123–139 (2009)
Khanna, N., Mikkilineni, A.K., Martone, A.F., Ali, G.N., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: A survey of forensic characterization methods for physical devices. Digital Investigation 3, 17–28 (2006)
Lee, J.H., Allebach, J.P.: Inkjet printer model-based halftoning. IEEE Transactions on Image Processing 14(5), 674–689 (2005)
Lukas, J., Fridrich, J., Goljan, M.: Determining digital image origin using sensor imperfections. In: Said, A., Apostolopoulos, J.G. (eds.) Proceedings of the SPIE International Conference on Image and Video Communications and Processing, vol. 5685, pp. 249–260. SPIE, San Jose (2005)
Lukas, J., Fridrich, J.J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Transactions on Information Forensics and Security 1(2), 205–214 (2006)
Mikkilineni, A.K., Arslan, O., Chiang, P.J., Kumontoy, R.M., Allebach, J.P., Chiu, G.T.C., Delp, E.J.: Printer forensics using svm techniques. In: Proceedings of the IS&T’s NIP21: International Conference on Digital Printing Technologies, Baltimore, MD, October 2005, vol. 21, pp. 223–226 (2005)
Mikkilineni, A.K., Chiang, P.J., Ali, G.N., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Printer identification based on textural features. In: Proceedings of the IS&T’s NIP20: International Conference on Digital Printing Technologies, Salt Lake City, UT, October/November 2004, vol. 20, pp. 306–311 (2004)
Mikkilineni, A.K., Chiang, P.J., Ali, G.N., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Printer identification based on graylevel co-occurrence features for security and forensic applications. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, March 2005, vol. 5681, pp. 430–440 (2005)
Mikkilineni, A.K., Chiang, P.J., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Channel model and operational capacity analysis of printed text documents. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents IX, 65051U, San Jose, CA (January 2007)
Mukhtar, M., Meckl, P., Chiu, G.T.C.: Color registration error reduction in document scanner using iterative velocity command synthesis. In: Proceedings of the 2008 ASME Dynamic Systems and Control Conference, Ann Arbor, Michigan (October 2008)
Norris, M., Barney, E.: Printer modeling for document imaging. In: Proceedings of CISST: International Conference on Imaging Science, Systems and Technology, Las Vegas, NV, June 2004, pp. 14–20 (2004)
Oliver, J.F., Chen, J.X.: Use of signature analysis to discriminate digital printing technologies. In: Proceedings of the IS&T’s NIP18: International Conference on Digital Printing Technologies, San Diego, California, September 2002, pp. 218–222 (2002)
Ortiz Segovia, M.V., Chiu, G.T.C., Delp, E.J., Allebach, J.P.: Information embedding in electrophotographic document forms through laser intensity modulation a communications systems perspective. In: Proceedings of the IS&T’s NIP25: International Conference on Digital Printing Technologies, Louisville, KY (September 2009)
Partouche, F., Espanet, B., Villena, C., Murie, C.: Forensic analysis of inkjet printings by pyrolysis gc/ms. In: Proceedings of NIP21: The 21st International Conference on Digital Printing Technologies, Baltimore, MD, pp. 216–219 (2005)
Pursley, M.B.: Introduction to Digital Communications. Pearson Education, Inc., London (2005)
Sencar, H.T., Memon, N.: Overview of state-of-the-art in digital image forensics. In: Part of Indian Statistical Institute Platinum Jubilee Monograph series titled ‘Statistical Science and Interdisciplinary Research’ (2008) (to appear)
Sharma, G., Wang, S.: Show-through watermarking of duplex printed documents. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents VI, January 2004, vol. 5306 (2004)
Shein, L.B.: Electrophotography and Development Physics, 2nd edn. Springer, New York (1992)
Shein, L.B.: Handbook of Electrostatic Processes, pp. 321–348. Marcel Dekker, New York (1995)
Simske, S.J., Aronoff, J.S., Sturgill, M., Collins, F., Golodetz, G., Israel, R.: Security printing deterrents: A comparison of TIJ, DEP and LEP printing. In: Proceedings of the IS&T’s NIP23: International Conference on Digital Printing Technologies, Anchorage, AK, September 2007, pp. 543–548 (2007)
Simske, S.J., Hattersley, J.R., Golodetz, G., Stssiak, J., Aronoff, J.S.: Ink-specific handheld readers and security variable data printing (svdp). In: Proceedings of NIP22: The 22nd International Conference on Digital Printing Technologies, Denver, CO, vol. 2006, pp. 441–443 (2006)
Suh, S., Allebach, J.P., Chiu, G.T.C., Delp, E.J.: Printer mechanism-level information embedding and extraction for halftone documents: New results. In: Proceedings of the IS&T’s NIP23: International Conference on Digital Printing Technologies, Anchorage, Alaska, September 2007, pp. 549–553 (2007)
Sweeney, P.: Error Control Coding: From Theory to Practice. Wiley, New York (2002)
Talbot, V., Perrot, P., Murie, C.: Ink jet printing discrimination based on invariant moment. In: Proceedings of the IS&T’s NIP22: International Conference on Digital Printing Technologies, Denver, CO, September 2006, pp. 427–431 (2006)
Voloshynovskiy, S., Pereira, S., Pun, T., Eggers, J.J., Su, J.K.: Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE Communications Magazine 39(8), 118–126 (2001)
Williams, E.M.: The Physics and Technology of Xerographic Processes. Wiley, New York (1984)
Williams, E.M.: The Physics and Technology of Xerographic Processes. Wiley, New York (1984)
Wolin, D.: Document verification and traceability through image quality analysis. In: Proceedings of the IS&T’s NIP18: International Conference on Digital Printing Technologies, San Diego, California, September 2002, pp. 214–217 (2002)
Yen, J., Carlsson, M., Chang, M., Garcia, J.M., Nguyen, H.: Constraint solving for inkjet print mask design. The Journal of Imaging Science and Technology 44(5), 391–397 (2000)
Yi, J.: A Xerographic simulation model. Master’s thesis, University of Idaho, Boise, ID (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Chiang, PJ. et al. (2010). Printer and Scanner Forensics: Models and Methods. In: Sencar, H.T., Velastin, S., Nikolaidis, N., Lian, S. (eds) Intelligent Multimedia Analysis for Security Applications. Studies in Computational Intelligence, vol 282. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11756-5_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-11756-5_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11754-1
Online ISBN: 978-3-642-11756-5
eBook Packages: EngineeringEngineering (R0)