Information Hiding to Foil the Casual Counterfeiter

نویسندگان

  • Daniel Gruhl
  • Walter Bender
چکیده

Security documents (currency, treasury bills, stocks, bonds, birth certificates, etc.) provide an interesting problem space for investigating information hiding. Recent advances in the quality of consumer printers and scanners have allowed the application of traditional information hiding techniques to printed materials. This paper explores how some of those techniques might be used to address the problem of counterfeiting as the capability of home printers to produce “exact” copies improves.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tartan Threads: A Method for the Real-time Digital Recognition of Secure Documents in Ink Jet Printers

Thanks to today’s digital imaging technology, any ten year old child with basic computer skills can create convincing counterfeit currency. It comes as no surprise that as output quality and costs have improved in ink-jet printers, there has been a corresponding surge in digital counterfeiting of security documents. The design of a system, through which a printer can recognize a security or oth...

متن کامل

Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking

A growing concern emerges regarding the possibility of counterfeiting currencies using digital imaging technologies. In order to help developing resistance against this new type of fraud, this paper presents possible attacking scenarios against supposedly sophisticated document protection systems based on digital watermarking. These new attacks, which would allow even an average counterfeiter t...

متن کامل

Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

Identity documents, such as ID cards, passports, and driver’s licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterf...

متن کامل

A survey on digital data hiding schemes: principals, algorithms, and applications

This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...

متن کامل

Forensic authentication of banknotes on mobile phones

Relatively cheap and high quality consumer scanners and printers have enabled the rise of the casual money counterfeiter. One who passes along home-made fake bills of low denomination in busy environments where the receiver is not likely to authenticate a bill. While this may be negligible on macro-economic scale, it does hurt consumers. In this paper we investigate several methods to identify ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998