Share Email Print

Proceedings Paper

Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding
Author(s): R. Villán; S. Voloshynovskiy; O. Koval; F. Deguillaume; T. Pun
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

In this paper, we deal with the problem of authentication and tamper-proofing of text documents that can be distributed in electronic or printed forms. We advocate the combination of robust text hashing and text data-hiding technologies as an efficient solution to this problem. First, we consider the problem of text data-hiding in the scope of the Gel'fand-Pinsker data-hiding framework. For illustration, two modern text data-hiding methods, namely color index modulation (CIM) and location index modulation (LIM), are explained. Second, we study two approaches to robust text hashing that are well suited for the considered problem. In particular, both approaches are compatible with CIM and LIM. The first approach makes use of optical character recognition (OCR) and a classical cryptographic message authentication code (MAC). The second approach is new and can be used in some scenarios where OCR does not produce consistent results. The experimental work compares both approaches and shows their robustness against typical intentional/unintentional document distortions including electronic format conversion, printing, scanning, photocopying, and faxing.

Paper Details

Date Published: 1 March 2007
PDF: 12 pages
Proc. SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX, 65051T (1 March 2007); doi: 10.1117/12.704097
Show Author Affiliations
R. Villán, Univ. of Geneva (Switzerland)
S. Voloshynovskiy, Univ. of Geneva (Switzerland)
O. Koval, Univ. of Geneva (Switzerland)
F. Deguillaume, Univ. of Geneva (Switzerland)
T. Pun, Univ. of Geneva (Switzerland)

Published in SPIE Proceedings Vol. 6505:
Security, Steganography, and Watermarking of Multimedia Contents IX
Edward J. Delp III; Ping Wah Wong, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?