A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document
With the advent of modern scanning and printing technology, it is quite easy to make fraudulent copies of sensitive documents. It is very difficult to identify them in the conventional approach. In this work, we present a novel and structured scheme to detect the fake document and the printer-scanner used in generating the same.
Keywordsdigital forensic fake document printer detection scanner detection
Unable to display preview. Download preview PDF.
- 1.Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Trans. on Information Forensics and Security (June 2006)Google Scholar
- 2.Fridrich, J.: Image watermarking for tamper detection. In: Proc. IEE Intl. Conf. on Image Processing, vol. 2, pp. 404–408 (1998)Google Scholar
- 4.Bayram, S., Sencar, H.T., Memon, N., Avcibas, I.: Source camera identification based on cfa interpolation. In: Proc. IEE Intl. Conf. on Image Processing (2005)Google Scholar