Abstract
A growing concern emerges regarding the possibility of counterfeiting currencies using digital imaging technologies. In order to help developing resistance against this new type of fraud, this paper presents possible attacking scenarios against supposedly sophisticated document protection systems based on digital watermarking. These new attacks, which would allow even an average counterfeiter to reproduce banknotes or passports created using systems with built-in watermark detector.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
S. Carr B. Perry and P. Patterson. Digital watermarks as a security feature for identity documents. In R. van Renesse and W. Vliegenthart, editors, SPIE’s 12th Annual Symposium, Electronic Imaging 2000: Optical Seciruty and Counterfeit Deterrence Techniques III, volume 3973 of SPIE Proceedings, pages 80–87, San Jose, California USA, 27–28 January 2000.
A. Katsaggelos ed. Digital image restoration. Springer Verlag, 1991.
D. Geman and S. Geman. Stochastic relaxation, gibbs distributions and the bayesian restorations of images. IEEE Trans. on Pattern Analysis and Machine Intelligence, 14(6):367–383, 1984.
A. Herrigel, S. Voloshynovskiy, and Z. Hrytskiv. Optical/digital identification/verification system based on digital watermarking technology. In SPIE International Workshop on Optoelectronic and Hybrid Optical/Digital Systems for Image/Signal Processing ODS’99, SPIE Proceedings, Lviv, Ukraine, 20–24 sep 1999.
M. Kutter, S. Voloshynovskiy, and A. Herrigel. Watermark copy attack. In Ping Wah Wong and Edward J. Delp, editors, IS&T/SPIE’s 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, volume 3971 of SPIE Proceedings, San Jose, California USA, 23–28 jan 2000.
J. Liu and P. Moulin. Complexity-regularized image denoising. In Proc. of 4th IEEE International Conference on Image Processing ICIP97, pages 370–373, Santa-Barbara, CA, 1997.
F. A. P. Petitcolas and R. J. Anderson. Attacks on copyright marking systems. In 2nd International Information Hiding Workshop, pages 219–239, Portland, Oregon, USA, April 1998.
Fabien Petitcolas. http://www.cl.cam.ac.uk/fapp2/watermarking/.
European project Certimark. http://www.certimark.org/.
G. Rhoads. Digital watermarking and banknotes. European patent application # 0961239A2, 1999.
A. Jaffe S. Church, R. Fuller and L. Pagano. Counterfeit detterrence and digital imaging technology. In R. van Renesse and W. Vliegenthart, editors, SPIE’s 12th Annual Symposium, Electronic Imaging 2000: Optical Seciruty and Counterfeit Deterrence Techniques III, volume 3973 of SPIE Proceedings, pages 37–46, San Jose, California USA, 27–28 January 2000.
S. Spannenburg. Developments in digital document security. In R. van Renesse and W. Vliegenthart, editors, SPIE’s 12th Annual Symposium, Electronic Imaging 2000: Optical Seciruty and Counterfeit Deterrence Techniques III, volume 3973 of SPIE Proceedings, pages 88–98, San Jose, California USA, 27–28 January 2000.
S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun. Attack modelling: Towards a second generation watermarking benchmark. Signal Processing, accepted, Jauary 2001.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Voloshynovskiy, S., Herrigel, A., Pun, T. (2001). Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking. In: Moskowitz, I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45496-9_24
Download citation
DOI: https://doi.org/10.1007/3-540-45496-9_24
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42733-9
Online ISBN: 978-3-540-45496-0
eBook Packages: Springer Book Archive