FAU > Technische Fakultät > Informatik > Lehrstuhl 15 (Digital Reality)
William Clarkson1, Tim Weyrich1,2, Adam Finkelstein1, Nadia Heninger1, J. Alex Halderman3, Edward W. Felten1
1 Princeton University
2 University College London
3 The University of Michigan
This paper presents a novel technique for authenticating physical documents based on random, naturally occurring imperfections in paper texture. We introduce a new method for measuring the three-dimensional surface of a page using only a commodity scanner and without modifying the document in any way. From this physical feature, we generate a concise fingerprint that uniquely identifies the document. Our technique is secure against counterfeiting and robust to harsh handling; it can be used even before any content is printed on a page. It has a wide range of applications, including detecting forged currency and tickets, authenticating passports, and halting counterfeit goods. Document identification could also be applied maliciously to de-anonymize printed surveys and to compromise the secrecy of paper ballots.
William Clarkson, Tim Weyrich, Adam Finkelstein, Nadia Heninger, J. Alex Halderman, Edward W. Felten. In Proc. of IEEE Symposium on Security and Privacy, 17–20 May 2009, Berkeley, CA.William Clarkson, Tim Weyrich, Adam Finkelstein, Nadia Heninger, J. Alex Halderman, and Edward W. Felten. Fingerprinting blank paper using commodity scanners. In SP ’09: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, pages 301–314, Washington, DC, USA, 2009. IEEE Computer Society.Clarkson, W., Weyrich, T., Finkelstein, A., Heninger, N., Halderman, J. A., and Felten, E. W. 2009. Fingerprinting blank paper using commodity scanners. In SP ’09: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA, 301–314.W. Clarkson, T. Weyrich, A. Finkelstein, N. Heninger, J. A. Halderman, and E. W. Felten, “Fingerprinting blank paper using commodity scanners,” inSP ’09: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2009, pp. 301–314. |
We thank Andrew Appel, Victoria Hill, Andrew Moore, N. J. A. Sloane, Joshua R. Smith, and the anonymous reviewers for their invaluable suggestions and assistance.