Traitor-Proof PDF Watermarking

09/20/2021
by   Fabrizio d'Amore, et al.
0

This paper presents a traitor-tracing technique based on the watermarking of digital documents ( files in particular). The watermarking algorithm uses a chain of three separate techniques that work in synergy. The embedded payload can withstand a wide range of attacks and cannot be removed without invalidating the credibility of the document. We will present an implementation of the approach and discuss its limitations with respect to documents that can be watermarked and quality of the watermarked documents. We will also analyse two payload alternatives and how the encryption scheme may alleviate the chilling effect on whistle-blowing.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/07/2019

IDStack - The Common Protocol for Document Verification built on Digital Signatures

The use of physical documents is inconvenient and inefficient in today's...
research
09/07/2021

Multi-Level Quickening: Ten Years Later

This paper presents important performance improvements for interpreters,...
research
03/07/2015

An Improved Image Mosaicing Algorithm for Damaged Documents

It is a common phenomenon in day to day life; where in some of the docum...
research
03/30/2023

Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations

Crypto-ransomware attacks have been a growing threat over the last few y...
research
10/16/2018

A Retrieval Framework and Implementation for Electronic Documents with Similar Layouts

As the number of digital documents requiring investigation increases, it...
research
10/14/2022

SealClub: Computer-aided Paper Document Authentication

Digital authentication is a mature field, offering a range of solutions ...
research
10/20/2019

Identity Document and banknote security forensics: a survey

Counterfeiting and piracy are a form of theft that has been steadily gro...

Please sign up or login with your details

Forgot password? Click here to reset