ABSTRACT
Contrary to popular belief, the paperless office has not yet established itself. Printer forensics is therefore still an important field today to protect the reliability of printed documents or to track criminals. An important task of this is to identify the source device of a printed document. There are many forensic approaches that try to determine the source device automatically and with commercially available recording devices. However, it is difficult to find intrinsic signatures that are robust against a variety of influences of the printing process and at the same time can identify the specific source device. In most cases, the identification rate only reaches up to the printer model. For this reason we reviewed document colour tracking dots, an extrinsic signature embedded in nearly all modern colour laser printers. We developed a refined and generic extraction algorithm, found a new tracking dot pattern and decoded pattern information. Through out we propose to reuse document colour tracking dots, in combination with passive printer forensic methods. From privacy perspective we additional investigated anonymization approaches to defeat arbitrary tracking. Finally we propose our toolkitdeda which implements the entire workflow of extracting, analysing and anonymisation of a tracking dot pattern.
- Gazi N Ali, Aravind K Mikkilineni, Jan P Allebach, Edward J Delp, Pei-Ju Chiang, and George T Chiu. 2003. Intrinsic and extrinsic signatures for information hiding and secure printing with electrophotographic devices. In NIP & Digit Fabrication Conference, Vol. 2003. Society for Imaging Science and Technology, 511--515.Google Scholar
- Orhan Bulan, Junwen Mao, and Gaurav Sharma. 2009. Geometric distortion signatures for printer identification. In Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. IEEE, 1401--1404. Google ScholarDigital Library
- Pei-Ju Chiang, N. Khanna, A. Mikkilineni, M.V.O. Segovia, Sungjoo Suh, J. Allebach, G. Chiu, and E. Delp. 2009. Printer and scanner forensics. IEEE Signal Processing Magazine 26, 2 (March 2009), 72--83.Google Scholar
- Jung-Ho Choi, Hae-Yeoun Lee, and Heung-Kyu Lee. 2013. Color laser printer forensic based on noisy feature and support vector machine classifier. Multimedia Tools and Applications 67, 2 (Nov. 2013), 363--382. Google ScholarDigital Library
- M. Uma Devi, C. Raghvendra Rao, and M. Jayaram. 2014. Statistical Measures for Differentiation of Photocopy from Print technology Forensic Perspective. International Journal of Computer Applications 105, 15 (2014). http://search.proquest.com/openview/5acf04697ebccb072c71b71e5ab30c47/1? pq-origsite=gscholarGoogle Scholar
- DFKI. 2015. Datasets for Document Analysis. (2015). http://madm.dfki.de/ downloads 03/08/2017.Google Scholar
- Electronic Frontier Foundation. 2005. DocuColor Tracking Dot Decoding Guide. (2005). https://w2.eff.org/Privacy/printers/docucolor/index.php#program 21/07/2017.Google Scholar
- Sara Elkasrawi and Faisal Shafait. 2014. Printer Identification Using Supervised Learning for Document Forgery Detection. IEEE, 146--150.Google Scholar
- Maya Embar, Louis F. McHugh IV, and William R. Wesselman. 2014. Printer watermark obfuscation.. In RIIT, Becky Rutherfoord, Lei Li, Susan Van de Ven, Amber Settle, and Terry Steinbach (Eds.). ACM, 15--20. http://dblp.uni-trier.de/db/ conf/riit/riit2014.html#EmbarMW14; Google ScholarDigital Library
- Stephan Escher and Thorsten Strufe. 2017. Robustness Analysis of a passive printer identification scheme for halftone images. In IEEE International Conference on Image Processing (ICIP).Google ScholarCross Ref
- Anselmo Ferreira, Luiz C. Navarro, Giuliano Pinheiro, Jefersson A. dos Santos, and Anderson Rocha. 2015. Laser printer attribution: Exploring new features and beyond. Forensic Science International 247 (Feb. 2015), 105--125.Google Scholar
- Lukas Gal, Michaela Belovi?ová, Michal Ceppan, Michal Oravec, and Miroslava Palková. 2013. Analysis of Laser and Inkjet Prints Using Spectroscopic Methods for Forensic Identification of Questioned Documents. In Symposium on Graphic Arts, Vol. 10.Google Scholar
- Matthew D. Gaubatz and Steven J. Simske. 2009. Printer-scanner identification via analysis of structured security deterrents. In Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on. IEEE, 151--155. http: //ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5386463Google Scholar
- Johann Gebhardt, Markus Goldstein, Faisal Shafait, and Andreas Dengel. 2013. Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection. IEEE, 479--483. Google ScholarDigital Library
- Hardik Jain, Gaurav Gupta, Sharad Joshi, and Nitin Khanna. 2017. Passive Classification of Source Printer using Text-line-level Geometric Distortion Signatures from Scanned Images of Printed Documents. arXiv preprint arXiv:1706.06651 (2017).Google Scholar
- Weina Jiang, Anthony TS Ho, Helen Treharne, and Yun Q Shi. 2010. A novel multi-size block Benford's law scheme for printer identification. In Pacific-Rim Conference on Multimedia. Springer, 643--652. Google ScholarDigital Library
- Do-Guk Kim, Jong-Uk Hou, and Heung-Kyu Lee. 2017. Learning deep features for source color laser printer identification based on cascaded learning. arXiv preprint arXiv:1711.00207 (2017).Google Scholar
- Do-Guk Kim and Heung-Kyu Lee. 2014. Color laser printer identification using photographed halftone images. In Signal Processing Conference (EUSIPCO), 2014 Proceedings of the 22nd European. IEEE, 795--799. http://ieeexplore.ieee.org/ xpls/abs_all.jsp?arnumber=6952258Google Scholar
- Herbert Klimant, Rudi Piotraschke, and Dagmar Schönfeld. 2006. Informations- und Kodierungstheorie (3 ed.). Teubner.Google Scholar
- Aravind K. Mikkilineni, Pei-Ju Chiang, George TC Chiu, Jan P. Allebach, and Edward J. Delp. 2007. Channel model and operational capacity analysis of printed text documents. In Electronic Imaging 2007. International Society for Optics and Photonics, 65051U--65051U. http://proceedings.spiedigitallibrary.org/proceeding. aspx?articleid=1298973Google Scholar
- CNN Money. {n. d.}. Fortune Global 500. ({n. d.}). http://fortune.com/global500/ list 31/08/2017.Google Scholar
- Thong Q. Nguyen, Yves Delignon, Lionel Chagas, and François Septier. 2014. Printer identification from micro-metric scale printing. In 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 6236-- 6239.Google ScholarCross Ref
- John Oliver and Joyce Chen. 2002. Use of signature analysis to discriminate digital printing technologies. In NIP & Digital Fabrication Conference, Vol. 2002. Society for Imaging Science and Technology, 218--222.Google Scholar
- Ricoh. {n. d.}. Going global, Company History about Ricoh. ({n. d.}). http: //www.ricoh.com/about/company/history/2000_2009; http://www.ricoh.com/ about/company/history/1985_1999 31/08/2017.Google Scholar
- Marco Schreyer, Christian Schulze, Armin Stahl, and Wolfgang Effelsberg. 2009. Intelligent Printing Technique Recognition and Photocopy Detection for Forensic Document Examination.. In Informatiktage, Vol. 8. 39--42. https://www.researchgate.net/profile/Sebastian_Magnus/ publication/221388729_Ein_Rahmenwerk_fur_Genetische_Algorithmen_ zur_Losung_erweiterter_Vehicle_Routing_Problems_VRPSPDMUTW/links/ 0a85e52fca0dcedffb000000.pdf#page=40Google Scholar
- Shize Shang, Nasir Memon, and Xiangwei Kong. 2014. Detecting documents forged by printing and copying. EURASIP Journal on Advances in Signal Processing 2014, 1 (2014), 1--13. http://link.springer.com/article/10.1186/ 1687--6180--2014--140Google ScholarCross Ref
- S. Suzuki and K. Abe. 1985. Topological Structural Analysis of Digitized Binary Images by Border Following. CVGIP 30, 1 (1985), 32--46.Google ScholarCross Ref
- Ma?gorzata Szafarska, Renata Wietecha-Pos?uszny, Micha? Wo?niakiewicz, and Pawe? Ko?cielniak. 2011. Application of capillary electrophoresis to examination of color inkjet printing inks for forensic purposes. Forensic Science International 212, 1--3 (Oct. 2011), 78--85.Google Scholar
- Min-Jen Tsai, Chien-Lun Hsu, Jin-Sheng Yin, and Imam Yuadi. 2016. Digital forensics for printed character source identification. In Multimedia and Expo (ICME), 2016 IEEE International Conference on. IEEE, 1--6. http://ieeexplore.ieee. org/abstract/document/7552892/Google ScholarCross Ref
- Min-Jen Tsai, Jung Liu, Chen-Sheng Wang, and Ching-Hua Chuang. 2011. Source color laser printer identification using discrete wavelet transform and feature selection algorithms. In Circuits and Systems (ISCAS), 2011 IEEE International Symposium on. IEEE, 2633--2636. http://ieeexplore.ieee.org/xpls/abs_all.jsp? arnumber=5938145Google ScholarCross Ref
- Jason Tuohey. 2004. Government Uses Color Laser Printer Technology to Track Documents. PCWorld (nov 2004). https://www.pcworld.com/article/118664/ article.html 25/09/2017.Google Scholar
- United States Secret Service. 2012. Re: Freedom of Information Act Appeal. (Feb. 2012). https://www.scribd.com/doc/81897582/microdots-pdf 25/09/2017.Google Scholar
- Joost van Beusekom, Faisal Shafait, and Thomas M. Breuel. 2013. Automatic authentication of color laser print-outs using machine identification codes. Pattern Analysis and Applications 16, 4 (Nov 2013), 663--678. Google ScholarDigital Library
- Changyou Wang, Xiangwei Kong, Shize Shang, and Xin'gang You. 2013. Photocopier forensics based on arbitrary text characters, Adnan M. Alattar, Nasir D. Memon, and Chad D. Heitzenrater (Eds.). 86650G.Google Scholar
- Yubao Wu, Xiangwei Kong, Xin'gang You, and Yiping Guo. 2009. Printer forensics based on page document's geometric distortion. In Image Processing (ICIP), 2009 16th IEEE International Conference on. IEEE, 2909--2912. Google ScholarDigital Library
- Luo Xiao, Qinghu Chen, and Yuchen Yan. 2015. Printed Characters Texture Identification Based on Two-factor Analysis. Journal of Computational Information Systems 14, 11 (2015), 5199--5207.Google Scholar
Index Terms
- Forensic Analysis and Anonymisation of Printed Documents
Recommendations
Printer watermark obfuscation
RIIT '14: Proceedings of the 3rd annual conference on Research in information technologyMost color laser printers manufactured and sold today add "invisible" information to make it easier to determine when a particular document was printed and exactly which printer was used. Some manufacturers have acknowledged the existence of the ...
A novel multi-size block benford's law scheme for printer identification
PCM'10: Proceedings of the 11th Pacific Rim conference on Advances in multimedia information processing: Part IIdentifying the originating device for a given media, i.e. the type, brand, model and other characteristics of the device, is currently one of the important fields of digital forensics. This paper proposes a forensic technique based on the Benford's law ...
Criminal investigation and forensic tools for smartphones
The technological capability of mobile devices, in particular Smartphones, makes their use valuable to the criminal community as a data terminal in the facilitation of organised crime or terrorism. The provision of best evidence admissible in a Court of ...
Comments