Skip to main content

A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4812))

Abstract

With the advent of modern scanning and printing technology, it is quite easy to make fraudulent copies of sensitive documents. It is very difficult to identify them in the conventional approach. In this work, we present a novel and structured scheme to detect the fake document and the printer-scanner used in generating the same.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Trans. on Information Forensics and Security (June 2006)

    Google Scholar 

  2. Fridrich, J.: Image watermarking for tamper detection. In: Proc. IEE Intl. Conf. on Image Processing, vol. 2, pp. 404–408 (1998)

    Google Scholar 

  3. Farid, H., Lyu, S.: Steganalysis using higher-order image statistics. IEEE Trans. on Information Forensics and Security 1(1), 111–119 (2006)

    Article  Google Scholar 

  4. Bayram, S., Sencar, H.T., Memon, N., Avcibas, I.: Source camera identification based on cfa interpolation. In: Proc. IEE Intl. Conf. on Image Processing (2005)

    Google Scholar 

  5. Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor noise. IEEE Trans. on Information Security and Forensics 1(2), 205–214 (2006)

    Article  Google Scholar 

  6. Gupta, G., Mazumdar, C., Rao, M.S., Bhosale, R.B.: Paradigm shift in document related frauds: Characteristics identification for development of a non-destructive automated system for printed documents. Digital Investigation 3, 43–55 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Patrick McDaniel Shyam K. Gupta

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gupta, G., Sultania, R., Mondal, S., Saha, S.K., Chanda, B. (2007). A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document. In: McDaniel, P., Gupta, S.K. (eds) Information Systems Security. ICISS 2007. Lecture Notes in Computer Science, vol 4812. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77086-2_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77086-2_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77085-5

  • Online ISBN: 978-3-540-77086-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics