Information Hiding to Foil the Casual Counterfeiter
نویسندگان
چکیده
Security documents (currency, treasury bills, stocks, bonds, birth certificates, etc.) provide an interesting problem space for investigating information hiding. Recent advances in the quality of consumer printers and scanners have allowed the application of traditional information hiding techniques to printed materials. This paper explores how some of those techniques might be used to address the problem of counterfeiting as the capability of home printers to produce “exact” copies improves.
منابع مشابه
Tartan Threads: A Method for the Real-time Digital Recognition of Secure Documents in Ink Jet Printers
Thanks to today’s digital imaging technology, any ten year old child with basic computer skills can create convincing counterfeit currency. It comes as no surprise that as output quality and costs have improved in ink-jet printers, there has been a corresponding surge in digital counterfeiting of security documents. The design of a system, through which a printer can recognize a security or oth...
متن کاملBlur/Deblur Attack against Document Protection Systems Based on Digital Watermarking
A growing concern emerges regarding the possibility of counterfeiting currencies using digital imaging technologies. In order to help developing resistance against this new type of fraud, this paper presents possible attacking scenarios against supposedly sophisticated document protection systems based on digital watermarking. These new attacks, which would allow even an average counterfeiter t...
متن کاملTowards fraud-proof ID documents using multiple data hiding technologies and biometrics
Identity documents, such as ID cards, passports, and driver’s licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterf...
متن کاملA survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملForensic authentication of banknotes on mobile phones
Relatively cheap and high quality consumer scanners and printers have enabled the rise of the casual money counterfeiter. One who passes along home-made fake bills of low denomination in busy environments where the receiver is not likely to authenticate a bill. While this may be negligible on macro-economic scale, it does hurt consumers. In this paper we investigate several methods to identify ...
متن کامل