Copy-evident document

Last updated

Copy-evident documents have features that make it detectable that a copy is not the original.

In security printing, various methods such as void pantograph are used to create patterns that are hard to copy exactly and when copied inexactly produces an easily detectable image. This can include halftone screens that are affected by the copying process, fine line patterns in different directions that are differently affected by copying and hence produce a mark, metallic inks causing diffraction or reflection. [1]

Copy-evident computer image files are also possible, for example by embedding a high-frequency pattern in a JPEG image that is imperceptible, but produces an obvious message when re-compressed with a different quality factor. [2]

Some forms of steganography, paper watermarking, and digital watermarking can be regarded as copy-evidence, although detecting that a document or file has been copied typically requires special inspection, tools or software. For example, 3D printed objects can be equipped with marks of genuinity that can be identified using a measurement device but are hard to deduce from sample objects; copies will lack these marks. [3] As another example, a copy detection pattern.

Related Research Articles

Steganography is the practice of concealing a message within another message or a physical object. In computing/electronic contexts, a computer file, message, image, or video is concealed within another file, message, image, or video. The word steganography comes from Greek steganographia, which combines the words steganós (στεγανός), meaning "covered or concealed", and -graphia (γραφή) meaning "writing".

Watermark

A watermark is an identifying image or pattern in paper that appears as various shades of lightness/darkness when viewed by transmitted light, caused by thickness or density variations in the paper. Watermarks have been used on postage stamps, currency, and other government documents to discourage counterfeiting. There are two main ways of producing watermarks in paper; the dandy roll process, and the more complex cylinder mould process.

Authentication Act of proving an assertion, often the identity of a computer system user

Authentication is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit.

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software. The term rootkit is a compound of "root" and the word "kit". The term "rootkit" has negative connotations through its association with malware.

EURion constellation Pattern of symbols incorporated into a number of banknote designs

The EURion constellation is a pattern of symbols incorporated into a number of secure documents such as banknotes and ownership title certificates designs worldwide since about 1996. It is added to help imaging software detect the presence of such a document in a digital image. Such software can then block the user from reproducing banknotes to prevent counterfeiting using colour photocopiers. According to research from 2004, the EURion constellation is used for colour photocopiers but probably not used in computer software. It has been reported that Adobe Photoshop will not allow editing of an image of a banknote, but in some versions this is believed to be due to a different, unknown digital watermark rather than the EURion constellation.

Security printing

Security printing is the field of the printing industry that deals with the printing of items such as banknotes, cheques, passports, tamper-evident labels, security tapes, product authentication, stock certificates, postage stamps and identity cards. The main goal of security printing is to prevent forgery, tampering, or counterfeiting. More recently many of the techniques used to protect these high-value documents have become more available to commercial printers, whether they are using the more traditional offset and flexographic presses or the newer digital platforms. Businesses are protecting their lesser-value documents such as transcripts, coupons and prescription pads by incorporating some of the features listed below to ensure that they cannot be forged or that alteration of the data cannot occur undetected.

Digital watermarking

A digital watermark is a kind of marker covertly embedded in a noise-tolerant signal such as audio, video or image data. It is typically used to identify ownership of the copyright of such signal. "Watermarking" is the process of hiding digital information in a carrier signal; the hidden information should, but does not need to, contain a relation to the carrier signal. Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. It is prominently used for tracing copyright infringements and for banknote authentication.

Tamper-evident describes a device or process that makes unauthorized access to the protected object easily detected. Seals, markings, or other techniques may be tamper indicating.

Identity document forgery fake IDs and their production

Identity document forgery is the process by which identity documents issued by governing bodies are copied and/or modified by persons not authorized to create such documents or engage in such modifications, for the purpose of deceiving those who would view the documents about the identity or status of the bearer. The term also encompasses the activity of acquiring identity documents from legitimate bodies by falsifying the required supporting documentation in order to create the desired identity.

Anti-computer forensics or counter-forensics are techniques used to obstruct forensic analysis.

Security paper

Security paper is a paper used in security printing that incorporates features that can be used to identify or authenticate a document as original, e.g., watermarks or invisible fibres in paper, or features that demonstrate tamper evidence when fraud is attempted, e.g., to remove or alter print such as amounts or signatures on a cheque. Examples of this kind of papers are those used for identification such as passports and certificates, such as birth certificates and different types of academic and qualification certificates, as well as government documents, e.g., voting ballots and tax strips. This also extends to personal and business checks, stock certificates, certificates issued by financial institutions and sensitive government-issued documents. The main use of security paper is to stop people from counterfeiting.

Photocopier Device for reproducing documents

A photocopier is a machine that makes copies of documents and other visual images onto paper or plastic film quickly and cheaply. Most modern photocopiers use a technology called xerography, a dry process that uses electrostatic charges on a light-sensitive photoreceptor to first attract and then transfer toner particles onto paper in the form of an image. The toner is then fused onto the paper using heat, pressure, or a combination of both. Copiers can also use other technologies, such as inkjet, but xerography is standard for office copying.

Computer virus Computer program that modifies other programs to replicate itself and spread

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.

File carving is the process of reassembling computer files from fragments in the absence of filesystem metadata.

A Hardware Trojan (HT) is a malicious modification of the circuitry of an integrated circuit. A hardware Trojan is completely characterized by its physical representation and its behavior. The payload of an HT is the entire activity that the Trojan executes when it is triggered. In general, Trojans try to bypass or disable the security fence of a system: for example, leaking confidential information by radio emission. HT's also could disable, derange or destroy the entire chip or components of it.

In security printing, void pantograph refers to a method of making copy-evident and tamper-resistant patterns in the background of a document. Normally these are invisible to the eye, but become obvious when the document is photocopied. Typically they spell out "void", "copy", "invalid" or some other indicator message.

ISO/IEC 20248Automatic Identification and Data Capture Techniques – Data Structures – Digital Signature Meta Structure is an international standard specification under development by ISO/IEC JTC1 SC31 WG2. This development is an extension of SANS 1368, which is the current published specification. ISO/IEC 20248 and SANS 1368 are equivalent standard specifications. SANS 1368 is a South African national standard developed by the South African Bureau of Standards.

Machine Identification Code Digital watermark which certain printers leave

A Machine Identification Code (MIC), also known as printer steganography, yellow dots, tracking dots or secret dots, is a digital watermark which certain color laser printers and copiers leave on every single printed page, allowing identification of the device with which a document was printed and giving clues to the originator. Developed by Xerox and Canon in the mid-1980s, its existence became public only in 2004. In 2018, scientists developed privacy software to anonymize prints in order to support whistleblowers publishing their work.

Hardware watermarking, also known as IP core watermarking is the process of embedding covert marks as design attributes inside a hardware or IP core design itself. Hardware Watermarking can represent watermarking of either DSP Cores or combinational/sequential circuits. Both forms of Hardware Watermarking are very popular. In DSP Core Watermarking a secret mark is embedded within the logic elements of the DSP Core itself. DSP Core Watermark usually implants this secret mark in the form of a robust signature either in the RTL design or during High Level Synthesis (HLS) design. The watermarking process of a DSP Core leverages on the High Level Synthesis framework and implants a secret mark in one of the high level synthesis phases such as scheduling, allocation and binding. DSP Core Watermarking is performed to protect a DSP core from hardware threats such as IP piracy, forgery and false claim of ownership. Some examples of DSP cores are FIR filter, IIR filter, FFT, DFT, JPEG, HWT etc. Few of the most important properties of a DSP core watermarking process are as follows: (a) Low embedding cost (b) Secret mark (c) Low creation time (d) Strong tamper tolerance (e) Fault tolerance.

A copy detection pattern (CDP), secure graphic or graphical code is a small random or pseudo-random digital image which is printed on documents, labels or products for counterfeit detection. Authentication is made by scanning the printed CDP using an image scanner or mobile phone camera. It is possible to store additional product-specific data into the CDP that will be decoded during the scanning process. A CDP can also be inserted into a 2D barcode to facilitate smartphone authentication and to connect with traceability data.

References

  1. George K. Phillips. New Digital Anti-Copy/Scan and Verification Technologies. In: Optical Security and Counterfeit Deterrence Techniques V, San Jose, California; June 3, 2004; p. 133-141; ISBN   0-8194-5213-0 http://www.verifyfirst.com/Documents/AntiCopy12-12-03.pdf Archived 2013-10-02 at the Wayback Machine
  2. Andrew B. Lewis, Markus G. Kuhn. Towards copy-evident JPEG images. Digitale Multimedia-Forensik, 39. Jahrestagung der Gesellschaft für Informatik 2009, Lübeck, Germany, GI-Edition: Lecture Notes in Informatics, Volume P154, pp 171;1582–91. http://www.cl.cam.ac.uk/~mgk25/informatik09-jpeg.pdf
  3. Daniel G. Aliaga, Mikhail J. Atallah. Genuinity Signatures: Designing Signatures for Verifying 3D Object Genuinity. Computer Graphics Forum Volume 28, Issue 2, pages 437–446, April 2009 http://www.cs.purdue.edu/cgvlab/papers/aliaga/eg2009.pdf