Information Hiding by Stochastic Diffusion and its Application to Printed Document Authentication

The approach discussed in this paper is robust to a wide variety of attacks including geometric attacks, drawing, crumpling and print/scan attacks, details of which lie beyond the scope of the paper. The method is relatively insensitive to lossy compression, itering, amplitude adjustments, additive noise and thresholding (for a binary input). The principal weakness of the system is its sensitivity to rotation and cropping. This can be minimized by orienting the document correctly and accurately before scanning and using automatic cropping software which is available with selected scanners (e.g. cannon scanners).

Provided by: Dublin Institute of Technology Topic: Security Date Added: May 2009 Format: PDF

Download Now

Find By Topic