Skip to main content

Stamp Verification for Automated Document Authentication

  • Conference paper
  • First Online:
Computational Forensics (IWCF 2012, IWCF 2014)

Abstract

Stamps, along with signatures, can be considered as the most widely used extrinsic security feature in paper documents. In contrast to signatures, however, for stamps little work has been done to automatically verify their authenticity. In this paper, an approach for verification of color stamps is presented. We focus on photocopied stamps as non-genuine stamps. Our previously presented stamp detection method is improved and extended to verify that the stamp is genuine and not a copy. Using a variety of features, a classifier is trained that allows successful separation between genuine stamps and copied stamps. Sensitivity and specificity of up to \(95\,\%\) could be obtained on a data set that is publicly available.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The data set is available at http://madm.dfki.de/downloads-ds-staver.

  2. 2.

    This project was partially funded by the Rheinland-Palatinate Foundation for Innovation, project AnDruDok (961-38 6261 / 1039).

References

  1. van Renesse, R.: Paper based document security - a review. In: European Conference on Security and Detection, London, UK, pp. 75–80 (1997)

    Google Scholar 

  2. Pu, D., Ball, G.R., Srihari, S.N.: A machine learning approach to off-line signature verification using Bayesian inference. In: Geradts, Z.J.M.H., Franke, K.Y., Veenman, C.J. (eds.) IWCF 2009. LNCS, vol. 5718, pp. 125–136. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  3. van Beusekom, J., Shafait, F., Breuel, T.M.: Automatic authentication of color laser print-outs using machine identification codes. Pattern Anal. Appl. 16(4), 663–678 (2013)

    Article  MathSciNet  Google Scholar 

  4. Micenková, B., van Beusekom, J.: Stamp detection in color document images. In: Proceedings of the 11th International Conference on Document Analysis and Recognition, Beijing, China, September 2011

    Google Scholar 

  5. Nagy, G., Seth, S.C.: Hierarchical representation of optically scanned documents. In: Proceedings of the 7th International Conference on Pattern Recognition, Montreal, Canada, pp. 347–349. July 1984

    Google Scholar 

  6. Forczmański, P., Frejlichowski, D.: Robust stamps detection and classification by means of general shape analysis. In: Proceedings of the International Conference on Computer Vision and Graphics, Warsaw, Poland, pp. 360–367. September 2010

    Google Scholar 

  7. Ueda, K.: Extraction of signature and seal imprint from bankchecks by using color information. In: Proceedings of the 3rd International Conference on Document Analysis and Recognition, Montreal, Canada, vol. 2, pp. 665–668. August 1995

    Google Scholar 

  8. Cai, L., Mei, L.: A robust registration and detection method for color seal verification. In: Procedings of the International Conference on Intelligent Computing, Hefei, China, pp. 97–106. August 2005

    Google Scholar 

  9. Soria-Frisch, A.: The fuzzy integral for color seal segmentation on document images. In: Proceedings of the 13th International Conference on Image Processing, Barcelona, Spain, pp. 157–160. September 2003

    Google Scholar 

  10. Chen, L., Liu, T., Chen, J., Zhu, J., Deng, J., Ma, S.: Location algorithm for seal imprints on Chinese bank-checks based on region growing. Optoelectron. Lett. 2(2), 155–157 (2006)

    Article  Google Scholar 

  11. Zhu, G., Jaeger, S., Doermann, D.: A robust stamp detection framework on degraded documents. In: Proceedings of SPIE Document Recognition and Retrieval XIII, San Jose, CA, USA, vol. 6067, pp. 1–9. January 2006

    Google Scholar 

  12. Tsuji, S., Matsumoto, F.: Detection of ellipses by a modified Hough transformation. IEEE Trans. Comput. 27(8), 777–781 (1978)

    Article  Google Scholar 

  13. Ahmed, S., Shafait, F., Liwicki, M., Dengel, A.: A generic method for stamp segmentation using part-based features. In: Proceedings of 12th International Conference on Document Analysis and Recognition, pp. 708–712 (2013)

    Google Scholar 

  14. Delalandre, M., Valveny, E., Lladós, J.: Performance evaluation of symbol recognition and spotting systems: An overview. In: Proceedings of the 8th IAPR Workshop on Document Analysis Systems, Nara, Japan, pp. 497–505. September 2008

    Google Scholar 

  15. Roy, P.P., Pal, U., Lladós, J.: Seal object detection in document images using GHT of local component shapes. In: Proceedings of the 25th ACM Symposium on Applied Computing, March 2010

    Google Scholar 

  16. Lampert, C.H., Mei, L., Breuel, T.M.: Printing technique classification for document counterfeit detection. In: Proceedings of the International Conference on Computational Intelligence and Security, Ghuangzhou, China, pp. 639–644. November 2006

    Google Scholar 

  17. Gebhardt, J., Goldstein, M., Shafait, F., Dengel, A.: Document authentication using printing technique features and unsupervised anomaly detection. In: Proceedings of the 12th International Conference on Document Analysis and Recognition, pp. 479–483. IEEE (2013)

    Google Scholar 

  18. Schulze, C., Schreyer, M., Stahl, A., Breuel, T.M.: Using DCT features for printing technique and copy detection. In: Proceedings of the 5th International Conference on Digital Forensics, Orlando, FL, USA, pp. 95–106. January 2009

    Google Scholar 

  19. Tchan, J.: The development of an image analysis system that can detect fraudulent alterations made to printed images. In: Proceedings of SPIE Optical Security and Counterfeit Deterrence Techniques V, San Jose, CA, USA, vol. 5310, pp. 151–159. January 2004

    Google Scholar 

  20. Berger, C.E., Koeijer, J.A., Glas, W., Madhuizen, H.T.: Color separation in forensic image processing. J. Forensic Sci. 51(1), 100–102 (2006)

    Article  Google Scholar 

  21. Cheng, H.D., Jiang, X.H., Sun, Y., Wang, J.: Color image segmentation: advances and prospects. Pattern Recognit. 34(12), 2259–2281 (2001)

    Article  MATH  Google Scholar 

  22. Haralick, R.M., Shanmugan, K., Dinstein, I.: Textural features for image classification. IEEE Trans. Syst. Man Cybern. 3(6), 610–621 (1973)

    Article  Google Scholar 

  23. Schreyer, M.: Intelligent printing technique recognition and photocopy detection for forensic document examination. In: Proceedings of Informatiktage 2009, Bonn, Germany, vol. S-8, pp.39–42 (2009)

    Google Scholar 

  24. Schulze, C., Schereyer, M., Stahl, A., Breuel, T.M.: Evaluation of graylevel-features for printing technique classification in high-throughput document management systems. In: Srihari, S.N., Franke, K. (eds.) IWCF 2008. LNCS, vol. 5158, pp. 35–46. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  25. Rosenfeld, A., Pfaltz, J.L.: Distance functions on digital pictures. Pattern Recogn. 1(1), 33–61 (1968)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Barbora Micenková .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Micenková, B., van Beusekom, J., Shafait, F. (2015). Stamp Verification for Automated Document Authentication. In: Garain, U., Shafait, F. (eds) Computational Forensics. IWCF IWCF 2012 2014. Lecture Notes in Computer Science(), vol 8915. Springer, Cham. https://doi.org/10.1007/978-3-319-20125-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-20125-2_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-20124-5

  • Online ISBN: 978-3-319-20125-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics