Printed Document Integrity Verification Using Barcode

Authors

  • Affandi Husain Faculty of Computing, Universiti Teknologi Malaysia, 81310 UTM Johor Bahru, Johor, Malaysia
  • Majid Bakhtiari Faculty of Computing, Universiti Teknologi Malaysia, 81310 UTM Johor Bahru, Johor, Malaysia
  • Anazida Zainal Faculty of Computing, Universiti Teknologi Malaysia, 81310 UTM Johor Bahru, Johor, Malaysia

DOI:

https://doi.org/10.11113/jt.v70.2857

Keywords:

Barcode, digital signature, printed documents, forgery, falsification, authenticity, integrity

Abstract

Printed documents are still relevant in our daily life and information in it must be protected from threats and attacks such as forgery, falsification or unauthorized modification. Such threats make the document lose its integrity and authenticity. There are several techniques that have been proposed and used to ensure authenticity and originality of printed documents. But some of the techniques are not suitable for public use due to its complexity, hard to obtain special materials to secure the document and expensive. This paper discuss several techniques for printed document security such as watermarking and barcode as well as the usability of two dimensional barcode in document authentication and data compression with the barcode. A conceptual solution that are simple and efficient to secure the integrity and document sender’s authenticity is proposed that uses two dimensional barcode to carry integrity and authenticity information in the document. The information stored in the barcode contains digital signature that provides sender’s authenticity and hash value that can ensure the integrity of the printed document.  

References

Oxford Dictionaries. Data: Definition of Data in Oxford Dictionary (British and World English). Retrieved on 26 January 2014 from http://www.oxforddictionaries.com/definition/english/data.

Netto, J. and Carter, C. J. 2013, October 18. Official: Forged Documents Used In Prison Break From Fla. Prison. Channel News Network (CNN). Retrieved on November 20, 2013 from http://edition.cnn.com/2013/10/16/us/florida-inmates-mistakenly-freed/v.

Kim, C. B. 2013, November 05. Johor Immigration Busts Syndicate Producing Fake Social Visit Passes. New Straits Times. Retrieved on November 22, 2013 from http://www.nst.com.my/latest/johor-immigration-busts-syndicate-producing-fake-social-visit-passes-1.392796.

Simborg, D. W. 2008. Healthcare Fraud: Whose Problem is it Anyway? Journal of the American Medical Informatics Association. 15: 278–280.

U.S. Department of Justice. 2013, July 8. Supervisor of $63 Million Health Care Fraud Scheme Sentenced in Florida to 10 Years in Prison. Official Press Release. Retrieved on November 20, 2013 from http://www.justice.gov/opa/ pr/2013/ July/13-crm-763.html.

Berita Harian. 2010, May 25. 45,000 Kakitangan Awam Tipu Sijil Cuti Sakit. Retrieved on November 20, 2013 from http://www.bharian.com.my/articles/45_000kakitanganawamtipusijil cutisakit/Article.

Consilium. 2009. The Council Of The EU Glossary Of Security Documents, Security Features And Other Related Technical Terms. Retrieved on 29 January 2014 from http://prado.consilium.europa.eu/en/glossarypopup.html.

Huang, S. and Wu, J. K. 2007. Optical Watermarking for Printed Document Authentication. IEEE Transactions on Information Forensics and Security. 2(2): 164–173.

Yew, T. C. 2008. Two-Dimensional Barcode For Printed Document Integrity Verification. Master, Universiti Teknologi Malaysia, Skudai.

Oliveira, A. L. 2001. Techniques For The Creation Of Digital Watermarks In Sequential Circuit Designs. Computer-Aided IEEE Transactions on Design of Integrated Circuits and Systems. 20(9): 1101–1117.

Yawai,W. and Hiransakolwong, N. 2013. Grid-Line Watermarking: A Novel Method For Creating A High-Performance Text-Image Watermark. Journal of Science Asia. 39(4): 423–435.

Biermann, C. 1996. Paper and Its Properties. Handbook of Pulping and Papermaking London : Elsevier. 158–189.

Renesse, R. L. V. 2002. Hidden And Scrambled Images: A Review. Proceedings of the 2002 SPIE Optical Security and Counterfeit Deterrence Techniques IV. 19 January 2002. San Jose, CA : SPIE, 333-348.

Daraee, F. and Mozaffari, S. 2014. Watermarking In Binary Document Images Using Fractal Codes. Journal of Pattern Recognition Letters. 35: 120–129. Elsevier.

Cox, I. J. et al. 1996. Secure Spread Spectrum Watermarking For Images, Audio And Video. International Conference on Image Processing. 16-19 September. Lausanne, Switzerland : IEEE, 243–246.

Mayer, J. and Simske, S. J. 2012. Modulation in the HVS Domain for Hardcopy Watermarking of Color Documents. Eighth International Conference on Signal Image Technology and Internet Based Systems. 25-29 November. Naples, Italy : IEEE, 188–194.

Agani, N. et al. 2013. Document Authentication Using Print-Scan Image Watermarking Based on DCT (Discrete Cosine Transform) Algorithm. Information Systems International Conference (ISICO). 2-4 December. Bali, Indonesia, 465–470.

Bharati, P. D. and Nitin, P. N. 2012. Text Watermarking Algorithm Using Structural Approach. World Congress on Information and Communication Technologies (WICT). 30 October-2 November. Trivandrum, India : IEEE, 629–633.

Jalil, Z. et al. 2010. A Zero-Watermarking Algorithm for Text Documents Based on Structural Components. International Conference on Information and Emerging Technologies (ICIET). 14-16 June. Karachi, Pakistan : IEEE, 1–5.

Brassil, J. T. et al. 1995. Electronic Marking and Identification Techniques to Discourage Document Copying. IEEE Journal On Selected Areas In Communications. 13(8): 1495–1504. IEEE.

Huang, D. and Yan, H. 2001. Inter-word Distance Changes Represented by Sine Waves for Watermarking Text Images. IEEE Transactions On Circuits And Systems For Video Technology. 11(12): 1237–1245. IEEE.

Shirali-Shahreza, M. H. and Shirali-Shahreza, M. 2006. A New Approach to Persian/Arabic Text Steganography. Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse (ICIS-COMSAR). 10-12 July. Honolulu, Hawaii : IEEE, 310–315.

Davarzani, R. and Yaghmaie, K. 2009. Farsi Text Watermarking Based on Character Coding. International Conference on Signal Processing Systems. 15-17 May. Singapore: IEEE, 152–156.

Atallah, M. J. et al. 2000. Natural Language Processing for Information Assurance and Security : An Overview and Implementations. 9th ACM/SIGSAC New Security Paradigms Workshop. September, 2000. Cork, Ireland : ACM Press, 51–56.

Liu, Y. et al. 2005. A Natural Language Watermarking Based on Chinese Syntax. In Wang, L., Chen, K. and Ong, Y. S. (Eds.). Advances in Natural Computation Berlin-Heidelberg: Springer. 958–961.

Wang, H. et al. 2008. Natural Language Watermarking Using Chinese Syntactic Transformation. Journal of Information Technology. 7(6): 904–910.

Meral, H. M. et al. 2008. Natural Language Watermarking Via Morphosyntactic Alterations. Journal of Computer Speech & Language. 23(1): 107–125. Elsevier.

Atallah, M. J. et al. 2002. Natural Language Watermarking and Tamperproofing. In Petitcolas, F. A. P. (Ed.). Information Hiding Berlin-Heidelberg: Springer. 196–212.

Vybornova, O. and Macq, B. 2007. Natural Language Watermarking and Robust Hashing Based on Presuppositional Analysis. IEEE International Conference on Information Reuse and Integration (IRI). 13-15 August. Las Vegas, United States : IEEE, 177–182.

Yu, Z. and Liu, X. 2009. A New Digital Watermarking Scheme Based on Text. International Conference on Multimedia Information Networking and Security (MINES). 18 - 20 November. Hubei, China: IEEE, 138–140.

Kim, M. 2009. Natural Language Watermarking by Morpheme Segmentation. First Asian Conference on Intelligent Information and Database Systems (ACIIDS). 1-3 April. Dong Hoi, Vietnam: IEEE, 144–149.

Bhambri, P. and Kaur, P. 2014. A Novel Approach of Zero Watermarking for Text Documents. International Journal of Ethics in Engineering & Management Education (IJEEE). 1(1): 34–38.

Miyatake, M. N. et al. 2012. Identity Document Authentication Based on VSS and QR Codes. The 2012 Iberoamerican Conference on Electronics Engineering and Computer Science. 16-18 May. Guadalajara, Mexico: 241–250.

Eldefrawy, M. H., Alghathbar, K. and Khan, M. K. 2012. Printed Document Authentication Based on Public Key Encryption and 2D Barcodes. 2012 International Symposium on Biometrics and Security Technologies. 26-29 March. Taipei, Taiwan: IEEE, 77–81.

Jain, P. et al. 2013. Data Compression Techniques: A Comparative Study. International Journal of Applied Research & Studies (IJARS). 2(2): 1–8.

Shanmugasundaram, S. and Lourdusamy, R. 2011. A Comparative Study Of Text Compression Algorithms. International Journal of Wisdom Based Computing. 1(3): 68–76.

Laine, M. and Nevalainen, O. S. 2006. A Standalone OCR System For Mobile Cameraphones. The 17th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. 11-14 September. Helsinki, Finland: IEEE, 1–5.

Preneel, B. 2003. Analysis and Design of Cryptographic Hash Functions. Doctor of Philosophy. Katholieke Universiteit Leuven, Belgium.

Gilbert, H. and Handschuh, H. 2004. Security Analysis of SHA-256 and Sisters.10th Annual International Workshop, SAC 2003. 14-15 August. Ottawa, Canada, 175–193.

Yoshida, H. and Biryukov, A. 2006. Analysis of a SHA-256 Variant. In Preneel, B. and Tavares, S. (Ed.) Selected Areas in Cryptography Berlin-Heidelberg: Springer. 245–260.

Forouzan, B. A. 2008. Cryptography and Network Security (InternationalAEdition).

Bertrand, R. et al. 2013. A System Based On Intrinsic Features for Fraudulent Document Detection. 12th International Conference on Document Analysis and Recognition (ICDAR). 25-28 August. Washington DC, United States : IEEE, 106–110.

Beusekom, J. v. et al. 2012. Text-Line Examination For Document Forgery Detection. International Journal on Document Analysis and Recognition (IJDAR). 16(2): 189–207. Springer-Verlag.

Downloads

Published

2014-08-27

Issue

Section

Science and Engineering

How to Cite

Printed Document Integrity Verification Using Barcode. (2014). Jurnal Teknologi, 70(1). https://doi.org/10.11113/jt.v70.2857