Regular Articles

Content authentication for printed images utilizing high capacity data hiding

[+] Author Affiliations
Orhan Bulan

University of Rochester, Department of Electrical and Computer Engineering, Rochester, New York 14627-0126

Gaurav Sharma

University of Rochester, Department of Electrical and Computer Engineering, Rochester, New York 14627-0126

University of Rochester, Medical Center, Department of Biostatistics and Computational Biology, Rochester, New York 14630

J. Electron. Imaging. 22(3), 033006 (Jul 26, 2013). doi:10.1117/1.JEI.22.3.033006
History: Received November 18, 2012; Revised May 16, 2013; Accepted June 24, 2013
Text Size: A A A

Abstract.  Authentication of content in printed images poses a challenge that cannot be addressed by conventional digital signature schemes because under the analog transport provided by the printing channel the verifier does not have access to the original digital content in pristine form. We present a method for cryptography-based authentication of the content in printed images that also provides the capability for identifying localized changes made by informed malicious attackers—key functionality that is missing in print scan robust hashes that have traditionally been used for print content authentication. The proposed method operates by embedding, within the printed image, an authentication signature that consists of an encrypted thumbnail of the image using a high capacity data hiding method for halftone images. To authenticate the content, the embedded signature is extracted from a scan of the printed image and, after decryption, compared with the printed content. An implementation of the method that incorporates human or automated verification and identifies potential local tampering by informed malicious attackers is developed and successfully demonstrated.

Figures in this Article
© 2013 SPIE and IS&T

Citation

Orhan Bulan and Gaurav Sharma
"Content authentication for printed images utilizing high capacity data hiding", J. Electron. Imaging. 22(3), 033006 (Jul 26, 2013). ; http://dx.doi.org/10.1117/1.JEI.22.3.033006


Tables

Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging & repositioning the boxes below.

Related Proceedings Articles

Related Book Chapters

Topic Collections

Advertisement
  • Don't have an account?
  • Subscribe to the SPIE Digital Library
  • Create a FREE account to sign up for Digital Library content alerts and gain access to institutional subscriptions remotely.
Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).
Access This Proceeding
Sign in or Create a personal account to Buy this article ($15 for members, $18 for non-members).
Access This Chapter

Access to SPIE eBooks is limited to subscribing institutions and is not available as part of a personal subscription. Print or electronic versions of individual SPIE books may be purchased via SPIE.org.