Forensic Analysis and Anonymisation of Printed Documents

  title={Forensic Analysis and Anonymisation of Printed Documents},
  author={Timo Richter and Stephan Escher and Dagmar Sch{\"o}nfeld and Thorsten Strufe},
  journal={Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security},
  • Timo Richter, S. Escher, +1 author T. Strufe
  • Published 14 June 2018
  • Computer Science
  • Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security
Contrary to popular belief, the paperless office has not yet established itself. [...] Key Method We developed a refined and generic extraction algorithm, found a new tracking dot pattern and decoded pattern information. Through out we propose to reuse document colour tracking dots, in combination with passive printer forensic methods. From privacy perspective we additional investigated anonymization approaches to defeat arbitrary tracking. Finally we propose our toolkitdeda which implements the entire workflow…Expand
VIPPrint: Validating Synthetic Image Detection and Source Linking Methods on a Large Scale Dataset of Printed Documents
It is verified that state-of-the-art methods to distinguish natural and synthetic face images fail when applied to print and scanned images, and a new dataset composed of a large number of synthetic and natural printed face images is presented.
VIPPrint: A Large Scale Dataset of Printed and Scanned Images for Synthetic Face Images Detection and Source Linking
It is verified that state-of-the-art methods to distinguish natural and synthetic face images fail when applied to print and scanned images, and a new dataset composed of a large number of synthetic and natural printed face images is presented.
A Camera Shooting Resilient Watermarking Scheme for Underpainting Documents
A novel underpainting based camera shooting resilient (CSR) document watermarking algorithm for dealing with the leak source tracking problem and proposes DCT-based watermark embedding algorithm and distortion compensation based extracting algorithm, which make the watermark robust to camera shooting process.
How to transform the Apple's application 'Find My' into a toolbox for whistleblowers
The aim of this paper is to make mass surveillance and kleptographic backdoors ineffective in the lifting of the whistleblower's anonymity by using Find My app and an entity authentication protocol based on artificial intelligence.
On Practical Aspects of Coercion-Resistant Remote Voting Systems
This paper takes the practical viewpoint and analyses the most common assumptions that are required by the various schemes, together with the exact level of coercion-resistance they provide.
Physically unclonable functions taggant for universal steganographic prints
A physically unclonable functions taggant, in an aqueous-soluble ink, based on surface-enhanced Raman scattering of discrete self-assemblies of Au nanoparticles is described, which will be particularly useful for steganography and provide a sensitive fingerprint for anti-counterfeiting.


Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection
A system using the difference in edge roughness to distinguish laser printed ages from inkjet printed pages is presented, and shows that the presented feature extraction method achieves the best outlier rank score in comparison to state-of-the-art features.
Automatic authentication of color laser print-outs using machine identification codes
This paper presents an important extension of their previous work for detecting the class of printer that was used to generate a print-out, namely automatic methods for comparing two base patterns from two different print-outs to verify if two print- outs come from the same printer and for automatic decoding of the base pattern.
Passive classification of source printer using text-line-level geometric distortion signatures from scanned images of printed documents
A set of features for characterizing text-line-level geometric distortions is proposed and a novel system to use them for identification of the origin of a printed document and gives much higher accuracy under small training size constraint is presented.
Geometric distortion signatures for printer identification
A forensic technique for analyzing a printed image in order to trace the originating printer by exploiting the geometric distortion that these devices inevitably introduce in the printing process, which is applicable for commonly used electrophotographic printers.
Printer watermark obfuscation
This team will discuss several obfuscation methods and demonstrate a successful one, and includes an explanation of the firmware generated yellow dots matrix and answers to the following questions.
Printer and scanner forensics
The role of paper has been transformed from the archival record of a document to a convenient and aesthetically appealing graphical user interface and the use of paper is now intimately linked to the electronic systems that capture, process, transmit, generate, and reproduce textual and graphic content.
Printer Identification Using Supervised Learning for Document Forgery Detection
  • Sarah Elkasrawi, F. Shafait
  • Engineering, Computer Science
    2014 11th IAPR International Workshop on Document Analysis Systems
  • 2014
A method to automatically identify source printers using common-resolution scans (400 dpi) that depends on distinctive noise produced by printers, which is important in forgery detection.
Detecting documents forged by printing and copying
This is the first work to distinguish documents produced by laser printer, inkjet printer, and copier based on features extracted from individual characters in the documents, and has an average accuracy of 90% and works with JPEG compression.
Statistical Measures for Differentiation of Photocopy from Print technology Forensic Perspective
This paper focuses on frequently used word like ‘the’ as test sample for characterizing printed text and proposes an algorithm based on analysis of histogram of printed text image for distinguishing inkjet print from its photocopy.
Printer-scanner identification via analysis of structured security deterrents
  • Matthew Gaubatz, S. Simske
  • Computer Science
    2009 First IEEE International Workshop on Information Forensics and Security (WIFS)
  • 2009
It is shown that QA metrics associated with printed security markings provide a useful approach for performing multiple device identification, i.e., printer-scanner identification, and the proposed approach leverages the highly structured nature of color tile deterrents to predict device (combination) signatures based on a limited amount of information.