skip to main content
10.1145/3206004.3206019acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Forensic Analysis and Anonymisation of Printed Documents

Published:14 June 2018Publication History

ABSTRACT

Contrary to popular belief, the paperless office has not yet established itself. Printer forensics is therefore still an important field today to protect the reliability of printed documents or to track criminals. An important task of this is to identify the source device of a printed document. There are many forensic approaches that try to determine the source device automatically and with commercially available recording devices. However, it is difficult to find intrinsic signatures that are robust against a variety of influences of the printing process and at the same time can identify the specific source device. In most cases, the identification rate only reaches up to the printer model. For this reason we reviewed document colour tracking dots, an extrinsic signature embedded in nearly all modern colour laser printers. We developed a refined and generic extraction algorithm, found a new tracking dot pattern and decoded pattern information. Through out we propose to reuse document colour tracking dots, in combination with passive printer forensic methods. From privacy perspective we additional investigated anonymization approaches to defeat arbitrary tracking. Finally we propose our toolkitdeda which implements the entire workflow of extracting, analysing and anonymisation of a tracking dot pattern.

References

  1. Gazi N Ali, Aravind K Mikkilineni, Jan P Allebach, Edward J Delp, Pei-Ju Chiang, and George T Chiu. 2003. Intrinsic and extrinsic signatures for information hiding and secure printing with electrophotographic devices. In NIP & Digit Fabrication Conference, Vol. 2003. Society for Imaging Science and Technology, 511--515.Google ScholarGoogle Scholar
  2. Orhan Bulan, Junwen Mao, and Gaurav Sharma. 2009. Geometric distortion signatures for printer identification. In Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. IEEE, 1401--1404. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Pei-Ju Chiang, N. Khanna, A. Mikkilineni, M.V.O. Segovia, Sungjoo Suh, J. Allebach, G. Chiu, and E. Delp. 2009. Printer and scanner forensics. IEEE Signal Processing Magazine 26, 2 (March 2009), 72--83.Google ScholarGoogle Scholar
  4. Jung-Ho Choi, Hae-Yeoun Lee, and Heung-Kyu Lee. 2013. Color laser printer forensic based on noisy feature and support vector machine classifier. Multimedia Tools and Applications 67, 2 (Nov. 2013), 363--382. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Uma Devi, C. Raghvendra Rao, and M. Jayaram. 2014. Statistical Measures for Differentiation of Photocopy from Print technology Forensic Perspective. International Journal of Computer Applications 105, 15 (2014). http://search.proquest.com/openview/5acf04697ebccb072c71b71e5ab30c47/1? pq-origsite=gscholarGoogle ScholarGoogle Scholar
  6. DFKI. 2015. Datasets for Document Analysis. (2015). http://madm.dfki.de/ downloads 03/08/2017.Google ScholarGoogle Scholar
  7. Electronic Frontier Foundation. 2005. DocuColor Tracking Dot Decoding Guide. (2005). https://w2.eff.org/Privacy/printers/docucolor/index.php#program 21/07/2017.Google ScholarGoogle Scholar
  8. Sara Elkasrawi and Faisal Shafait. 2014. Printer Identification Using Supervised Learning for Document Forgery Detection. IEEE, 146--150.Google ScholarGoogle Scholar
  9. Maya Embar, Louis F. McHugh IV, and William R. Wesselman. 2014. Printer watermark obfuscation.. In RIIT, Becky Rutherfoord, Lei Li, Susan Van de Ven, Amber Settle, and Terry Steinbach (Eds.). ACM, 15--20. http://dblp.uni-trier.de/db/ conf/riit/riit2014.html#EmbarMW14; Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Stephan Escher and Thorsten Strufe. 2017. Robustness Analysis of a passive printer identification scheme for halftone images. In IEEE International Conference on Image Processing (ICIP).Google ScholarGoogle ScholarCross RefCross Ref
  11. Anselmo Ferreira, Luiz C. Navarro, Giuliano Pinheiro, Jefersson A. dos Santos, and Anderson Rocha. 2015. Laser printer attribution: Exploring new features and beyond. Forensic Science International 247 (Feb. 2015), 105--125.Google ScholarGoogle Scholar
  12. Lukas Gal, Michaela Belovi?ová, Michal Ceppan, Michal Oravec, and Miroslava Palková. 2013. Analysis of Laser and Inkjet Prints Using Spectroscopic Methods for Forensic Identification of Questioned Documents. In Symposium on Graphic Arts, Vol. 10.Google ScholarGoogle Scholar
  13. Matthew D. Gaubatz and Steven J. Simske. 2009. Printer-scanner identification via analysis of structured security deterrents. In Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on. IEEE, 151--155. http: //ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5386463Google ScholarGoogle Scholar
  14. Johann Gebhardt, Markus Goldstein, Faisal Shafait, and Andreas Dengel. 2013. Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection. IEEE, 479--483. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Hardik Jain, Gaurav Gupta, Sharad Joshi, and Nitin Khanna. 2017. Passive Classification of Source Printer using Text-line-level Geometric Distortion Signatures from Scanned Images of Printed Documents. arXiv preprint arXiv:1706.06651 (2017).Google ScholarGoogle Scholar
  16. Weina Jiang, Anthony TS Ho, Helen Treharne, and Yun Q Shi. 2010. A novel multi-size block Benford's law scheme for printer identification. In Pacific-Rim Conference on Multimedia. Springer, 643--652. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Do-Guk Kim, Jong-Uk Hou, and Heung-Kyu Lee. 2017. Learning deep features for source color laser printer identification based on cascaded learning. arXiv preprint arXiv:1711.00207 (2017).Google ScholarGoogle Scholar
  18. Do-Guk Kim and Heung-Kyu Lee. 2014. Color laser printer identification using photographed halftone images. In Signal Processing Conference (EUSIPCO), 2014 Proceedings of the 22nd European. IEEE, 795--799. http://ieeexplore.ieee.org/ xpls/abs_all.jsp?arnumber=6952258Google ScholarGoogle Scholar
  19. Herbert Klimant, Rudi Piotraschke, and Dagmar Schönfeld. 2006. Informations- und Kodierungstheorie (3 ed.). Teubner.Google ScholarGoogle Scholar
  20. Aravind K. Mikkilineni, Pei-Ju Chiang, George TC Chiu, Jan P. Allebach, and Edward J. Delp. 2007. Channel model and operational capacity analysis of printed text documents. In Electronic Imaging 2007. International Society for Optics and Photonics, 65051U--65051U. http://proceedings.spiedigitallibrary.org/proceeding. aspx?articleid=1298973Google ScholarGoogle Scholar
  21. CNN Money. {n. d.}. Fortune Global 500. ({n. d.}). http://fortune.com/global500/ list 31/08/2017.Google ScholarGoogle Scholar
  22. Thong Q. Nguyen, Yves Delignon, Lionel Chagas, and François Septier. 2014. Printer identification from micro-metric scale printing. In 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 6236-- 6239.Google ScholarGoogle ScholarCross RefCross Ref
  23. John Oliver and Joyce Chen. 2002. Use of signature analysis to discriminate digital printing technologies. In NIP & Digital Fabrication Conference, Vol. 2002. Society for Imaging Science and Technology, 218--222.Google ScholarGoogle Scholar
  24. Ricoh. {n. d.}. Going global, Company History about Ricoh. ({n. d.}). http: //www.ricoh.com/about/company/history/2000_2009; http://www.ricoh.com/ about/company/history/1985_1999 31/08/2017.Google ScholarGoogle Scholar
  25. Marco Schreyer, Christian Schulze, Armin Stahl, and Wolfgang Effelsberg. 2009. Intelligent Printing Technique Recognition and Photocopy Detection for Forensic Document Examination.. In Informatiktage, Vol. 8. 39--42. https://www.researchgate.net/profile/Sebastian_Magnus/ publication/221388729_Ein_Rahmenwerk_fur_Genetische_Algorithmen_ zur_Losung_erweiterter_Vehicle_Routing_Problems_VRPSPDMUTW/links/ 0a85e52fca0dcedffb000000.pdf#page=40Google ScholarGoogle Scholar
  26. Shize Shang, Nasir Memon, and Xiangwei Kong. 2014. Detecting documents forged by printing and copying. EURASIP Journal on Advances in Signal Processing 2014, 1 (2014), 1--13. http://link.springer.com/article/10.1186/ 1687--6180--2014--140Google ScholarGoogle ScholarCross RefCross Ref
  27. S. Suzuki and K. Abe. 1985. Topological Structural Analysis of Digitized Binary Images by Border Following. CVGIP 30, 1 (1985), 32--46.Google ScholarGoogle ScholarCross RefCross Ref
  28. Ma?gorzata Szafarska, Renata Wietecha-Pos?uszny, Micha? Wo?niakiewicz, and Pawe? Ko?cielniak. 2011. Application of capillary electrophoresis to examination of color inkjet printing inks for forensic purposes. Forensic Science International 212, 1--3 (Oct. 2011), 78--85.Google ScholarGoogle Scholar
  29. Min-Jen Tsai, Chien-Lun Hsu, Jin-Sheng Yin, and Imam Yuadi. 2016. Digital forensics for printed character source identification. In Multimedia and Expo (ICME), 2016 IEEE International Conference on. IEEE, 1--6. http://ieeexplore.ieee. org/abstract/document/7552892/Google ScholarGoogle ScholarCross RefCross Ref
  30. Min-Jen Tsai, Jung Liu, Chen-Sheng Wang, and Ching-Hua Chuang. 2011. Source color laser printer identification using discrete wavelet transform and feature selection algorithms. In Circuits and Systems (ISCAS), 2011 IEEE International Symposium on. IEEE, 2633--2636. http://ieeexplore.ieee.org/xpls/abs_all.jsp? arnumber=5938145Google ScholarGoogle ScholarCross RefCross Ref
  31. Jason Tuohey. 2004. Government Uses Color Laser Printer Technology to Track Documents. PCWorld (nov 2004). https://www.pcworld.com/article/118664/ article.html 25/09/2017.Google ScholarGoogle Scholar
  32. United States Secret Service. 2012. Re: Freedom of Information Act Appeal. (Feb. 2012). https://www.scribd.com/doc/81897582/microdots-pdf 25/09/2017.Google ScholarGoogle Scholar
  33. Joost van Beusekom, Faisal Shafait, and Thomas M. Breuel. 2013. Automatic authentication of color laser print-outs using machine identification codes. Pattern Analysis and Applications 16, 4 (Nov 2013), 663--678. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Changyou Wang, Xiangwei Kong, Shize Shang, and Xin'gang You. 2013. Photocopier forensics based on arbitrary text characters, Adnan M. Alattar, Nasir D. Memon, and Chad D. Heitzenrater (Eds.). 86650G.Google ScholarGoogle Scholar
  35. Yubao Wu, Xiangwei Kong, Xin'gang You, and Yiping Guo. 2009. Printer forensics based on page document's geometric distortion. In Image Processing (ICIP), 2009 16th IEEE International Conference on. IEEE, 2909--2912. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Luo Xiao, Qinghu Chen, and Yuchen Yan. 2015. Printed Characters Texture Identification Based on Two-factor Analysis. Journal of Computational Information Systems 14, 11 (2015), 5199--5207.Google ScholarGoogle Scholar

Index Terms

  1. Forensic Analysis and Anonymisation of Printed Documents

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          IH&MMSec '18: Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security
          June 2018
          152 pages
          ISBN:9781450356251
          DOI:10.1145/3206004

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 June 2018

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          IH&MMSec '18 Paper Acceptance Rate18of40submissions,45%Overall Acceptance Rate128of318submissions,40%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader