Fingerprinting Blank Paper Using Commodity Scanners

被引:50
作者
Clarkson, William [1 ]
Weyrich, Tim [1 ,2 ]
Finkelstein, Adam [1 ]
Heninger, Nadia [1 ]
Halderman, J. Alex [3 ]
Felten, Edward W. [1 ]
机构
[1] Princeton Univ, Dept Comp Sci, Princeton, NJ 08544 USA
[2] UCL, Dept Comp Sci, London WC1E 6BT, England
[3] Univ Michigan, Dept Elect Engn, Ann Arbor, MI 48109 USA
来源
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY | 2009年
关键词
D O I
10.1109/SP.2009.7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a novel technique for authenticating physical documents based on random, naturally occurring imperfections in paper texture. We introduce a new method for measuring the three-dimensional surface of a page using only a commodity, scanner and without modifying the document in any way. From this physical feature, we generate a concise fingerprint that uniquely identifies the document. Our technique is secure against counterfeiting and robust to harsh handling; it can be used even before any content is printed on a page. It has a wide range of applications, including detecting forged currency and tickets, authenticating passports, and halting counterfeit goods. Document identification could also be applied maliciously to de-anonymize printed surveys and to compromise the secrecy of paper ballots.
引用
收藏
页码:301 / +
页数:4
相关论文
共 21 条
[1]  
Amine LynS., 2007, Multinational Business Review, V15, P1
[2]  
[Anonymous], BBC NEWS 1021
[3]  
[Anonymous], 2003, User's Guide to Principal Components
[4]  
[Anonymous], 2000, Spatial Tesselations: Concepts and Applications of Voronoi Diagrams
[5]  
BALMER C, 2008, REUTERS 0804
[6]  
BROWN B, 2008, ACM T GRAPH P SIGGRA, P84
[7]   Fingerprinting' documents and packaging [J].
Buchanan, JDR ;
Cowburn, RP ;
Jausovec, AV ;
Petit, D ;
Seem, P ;
Xiong, G ;
Atkinson, D ;
Fenton, K ;
Allwood, DA ;
Bryan, MT .
NATURE, 2005, 436 (7050) :475-475
[8]  
COWBURN RP, 2007, Patent No. 20070028093
[9]   Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [J].
Dodis, Yevgeniy ;
Ostrovsky, Rafail ;
Reyzin, Leonid ;
Smith, Adam .
SIAM JOURNAL ON COMPUTING, 2008, 38 (01) :97-139
[10]  
Juels A, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P28, DOI 10.1145/319709.319714