Printer and scanner forensics
Contrary to popular opinion, the use of paper in our society will not disappear during the foreseeable future. In fact, paper use continues to grow rather than decline. It is certainly true that as individuals, we may be printing less than we used to. And the role of paper has been transformed from...
Gespeichert in:
Veröffentlicht in: | IEEE signal processing magazine 2009-03, Vol.26 (2), p.72-83 |
---|---|
Hauptverfasser: | , , , , , , , |
Format: | Magazinearticle |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 83 |
---|---|
container_issue | 2 |
container_start_page | 72 |
container_title | IEEE signal processing magazine |
container_volume | 26 |
creator | Pei-Ju Chiang Khanna, N. Mikkilineni, A. Segovia, M.V.O. Sungjoo Suh Allebach, J. Chiu, G. Delp, E. |
description | Contrary to popular opinion, the use of paper in our society will not disappear during the foreseeable future. In fact, paper use continues to grow rather than decline. It is certainly true that as individuals, we may be printing less than we used to. And the role of paper has been transformed from the archival record of a document to a convenient and aesthetically appealing graphical user interface. The use of paper is now intimately linked to the electronic systems that capture, process, transmit, generate, and reproduce textual and graphic content. Paper can be thought of as an interface between humans and the digital world. If this interface is not secure, the entire system becomes vulnerable to attack and abuse. Although paper is read by humans in the same way that it has been for millennia and has had the same fundamental form and composition for almost that long, the technologies for printing and scanning documents and capturing their content have evolved tremendously, especially during the last 20 years. This has moved the capability to generate printed documents from the hands of a select few to anyone with access to low-cost scanners, printers, and personal computers. It has greatly broadened the opportunities for abuse of trust through the generation of fallacious documents and the tampering with existing documents, including the embedding of messages in these documents. |
doi_str_mv | 10.1109/MSP.2008.931082 |
format | Magazinearticle |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_861108093</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4806207</ieee_id><sourcerecordid>1019692149</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-b933a579e77dd8030e9f788166bac6e448f46ba44b3fb230585f1fd1a8b0525c3</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhoMoWKtnDyKIB_Gy7eRzJ0cpfkHFgnoO2WwCW9psTdqD_96UFQ8ePM17eN5h5iHknMKEUtDTl7fFhAHgRHMKyA7IiEqJFdSaHZYMklcSEY_JSc5LACqQ6xG5XKQubn26srG9ys7GWHLok4-5c_mUHAW7yv7sZ47Jx8P9--ypmr8-Ps_u5pXjvN5Wjebcylr7um5bBA5ehxqRKtVYp7wQGESJQjQ8NIyDRBloaKnFBiSTjo_JzbB3k_rPnc9bs-6y86uVjb7fZcMFAlUcCnj7L0iBaqUZFbqg13_QZb9LsbxhUBVjCOXqMZkOkEt9zskHs0nd2qavssnstZqi1ey1mkFraVwMjc57_0uX-xSDmn8D4zFwUA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype><pqid>861108093</pqid></control><display><type>magazinearticle</type><title>Printer and scanner forensics</title><source>IEEE Electronic Library (IEL)</source><creator>Pei-Ju Chiang ; Khanna, N. ; Mikkilineni, A. ; Segovia, M.V.O. ; Sungjoo Suh ; Allebach, J. ; Chiu, G. ; Delp, E.</creator><creatorcontrib>Pei-Ju Chiang ; Khanna, N. ; Mikkilineni, A. ; Segovia, M.V.O. ; Sungjoo Suh ; Allebach, J. ; Chiu, G. ; Delp, E.</creatorcontrib><description>Contrary to popular opinion, the use of paper in our society will not disappear during the foreseeable future. In fact, paper use continues to grow rather than decline. It is certainly true that as individuals, we may be printing less than we used to. And the role of paper has been transformed from the archival record of a document to a convenient and aesthetically appealing graphical user interface. The use of paper is now intimately linked to the electronic systems that capture, process, transmit, generate, and reproduce textual and graphic content. Paper can be thought of as an interface between humans and the digital world. If this interface is not secure, the entire system becomes vulnerable to attack and abuse. Although paper is read by humans in the same way that it has been for millennia and has had the same fundamental form and composition for almost that long, the technologies for printing and scanning documents and capturing their content have evolved tremendously, especially during the last 20 years. This has moved the capability to generate printed documents from the hands of a select few to anyone with access to low-cost scanners, printers, and personal computers. It has greatly broadened the opportunities for abuse of trust through the generation of fallacious documents and the tampering with existing documents, including the embedding of messages in these documents.</description><identifier>ISSN: 1053-5888</identifier><identifier>EISSN: 1558-0792</identifier><identifier>DOI: 10.1109/MSP.2008.931082</identifier><identifier>CODEN: ISPRE6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Conducting materials ; Digital images ; Electronic systems ; Forensics ; Graphical user interfaces ; Graphics ; Human ; Humans ; Internet ; Law enforcement ; Messages ; Printers ; Printing ; Scanners ; Scanning ; Signal processing</subject><ispartof>IEEE signal processing magazine, 2009-03, Vol.26 (2), p.72-83</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2009</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-b933a579e77dd8030e9f788166bac6e448f46ba44b3fb230585f1fd1a8b0525c3</citedby><cites>FETCH-LOGICAL-c337t-b933a579e77dd8030e9f788166bac6e448f46ba44b3fb230585f1fd1a8b0525c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4806207$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>780,784,796,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4806207$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Pei-Ju Chiang</creatorcontrib><creatorcontrib>Khanna, N.</creatorcontrib><creatorcontrib>Mikkilineni, A.</creatorcontrib><creatorcontrib>Segovia, M.V.O.</creatorcontrib><creatorcontrib>Sungjoo Suh</creatorcontrib><creatorcontrib>Allebach, J.</creatorcontrib><creatorcontrib>Chiu, G.</creatorcontrib><creatorcontrib>Delp, E.</creatorcontrib><title>Printer and scanner forensics</title><title>IEEE signal processing magazine</title><addtitle>MSP</addtitle><description>Contrary to popular opinion, the use of paper in our society will not disappear during the foreseeable future. In fact, paper use continues to grow rather than decline. It is certainly true that as individuals, we may be printing less than we used to. And the role of paper has been transformed from the archival record of a document to a convenient and aesthetically appealing graphical user interface. The use of paper is now intimately linked to the electronic systems that capture, process, transmit, generate, and reproduce textual and graphic content. Paper can be thought of as an interface between humans and the digital world. If this interface is not secure, the entire system becomes vulnerable to attack and abuse. Although paper is read by humans in the same way that it has been for millennia and has had the same fundamental form and composition for almost that long, the technologies for printing and scanning documents and capturing their content have evolved tremendously, especially during the last 20 years. This has moved the capability to generate printed documents from the hands of a select few to anyone with access to low-cost scanners, printers, and personal computers. It has greatly broadened the opportunities for abuse of trust through the generation of fallacious documents and the tampering with existing documents, including the embedding of messages in these documents.</description><subject>Conducting materials</subject><subject>Digital images</subject><subject>Electronic systems</subject><subject>Forensics</subject><subject>Graphical user interfaces</subject><subject>Graphics</subject><subject>Human</subject><subject>Humans</subject><subject>Internet</subject><subject>Law enforcement</subject><subject>Messages</subject><subject>Printers</subject><subject>Printing</subject><subject>Scanners</subject><subject>Scanning</subject><subject>Signal processing</subject><issn>1053-5888</issn><issn>1558-0792</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2009</creationdate><recordtype>magazinearticle</recordtype><sourceid>RIE</sourceid><recordid>eNp9kE1LAzEQhoMoWKtnDyKIB_Gy7eRzJ0cpfkHFgnoO2WwCW9psTdqD_96UFQ8ePM17eN5h5iHknMKEUtDTl7fFhAHgRHMKyA7IiEqJFdSaHZYMklcSEY_JSc5LACqQ6xG5XKQubn26srG9ys7GWHLok4-5c_mUHAW7yv7sZ47Jx8P9--ypmr8-Ps_u5pXjvN5Wjebcylr7um5bBA5ehxqRKtVYp7wQGESJQjQ8NIyDRBloaKnFBiSTjo_JzbB3k_rPnc9bs-6y86uVjb7fZcMFAlUcCnj7L0iBaqUZFbqg13_QZb9LsbxhUBVjCOXqMZkOkEt9zskHs0nd2qavssnstZqi1ey1mkFraVwMjc57_0uX-xSDmn8D4zFwUA</recordid><startdate>20090301</startdate><enddate>20090301</enddate><creator>Pei-Ju Chiang</creator><creator>Khanna, N.</creator><creator>Mikkilineni, A.</creator><creator>Segovia, M.V.O.</creator><creator>Sungjoo Suh</creator><creator>Allebach, J.</creator><creator>Chiu, G.</creator><creator>Delp, E.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20090301</creationdate><title>Printer and scanner forensics</title><author>Pei-Ju Chiang ; Khanna, N. ; Mikkilineni, A. ; Segovia, M.V.O. ; Sungjoo Suh ; Allebach, J. ; Chiu, G. ; Delp, E.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-b933a579e77dd8030e9f788166bac6e448f46ba44b3fb230585f1fd1a8b0525c3</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Conducting materials</topic><topic>Digital images</topic><topic>Electronic systems</topic><topic>Forensics</topic><topic>Graphical user interfaces</topic><topic>Graphics</topic><topic>Human</topic><topic>Humans</topic><topic>Internet</topic><topic>Law enforcement</topic><topic>Messages</topic><topic>Printers</topic><topic>Printing</topic><topic>Scanners</topic><topic>Scanning</topic><topic>Signal processing</topic><toplevel>online_resources</toplevel><creatorcontrib>Pei-Ju Chiang</creatorcontrib><creatorcontrib>Khanna, N.</creatorcontrib><creatorcontrib>Mikkilineni, A.</creatorcontrib><creatorcontrib>Segovia, M.V.O.</creatorcontrib><creatorcontrib>Sungjoo Suh</creatorcontrib><creatorcontrib>Allebach, J.</creatorcontrib><creatorcontrib>Chiu, G.</creatorcontrib><creatorcontrib>Delp, E.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE signal processing magazine</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Pei-Ju Chiang</au><au>Khanna, N.</au><au>Mikkilineni, A.</au><au>Segovia, M.V.O.</au><au>Sungjoo Suh</au><au>Allebach, J.</au><au>Chiu, G.</au><au>Delp, E.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Printer and scanner forensics</atitle><jtitle>IEEE signal processing magazine</jtitle><stitle>MSP</stitle><date>2009-03-01</date><risdate>2009</risdate><volume>26</volume><issue>2</issue><spage>72</spage><epage>83</epage><pages>72-83</pages><issn>1053-5888</issn><eissn>1558-0792</eissn><coden>ISPRE6</coden><abstract>Contrary to popular opinion, the use of paper in our society will not disappear during the foreseeable future. In fact, paper use continues to grow rather than decline. It is certainly true that as individuals, we may be printing less than we used to. And the role of paper has been transformed from the archival record of a document to a convenient and aesthetically appealing graphical user interface. The use of paper is now intimately linked to the electronic systems that capture, process, transmit, generate, and reproduce textual and graphic content. Paper can be thought of as an interface between humans and the digital world. If this interface is not secure, the entire system becomes vulnerable to attack and abuse. Although paper is read by humans in the same way that it has been for millennia and has had the same fundamental form and composition for almost that long, the technologies for printing and scanning documents and capturing their content have evolved tremendously, especially during the last 20 years. This has moved the capability to generate printed documents from the hands of a select few to anyone with access to low-cost scanners, printers, and personal computers. It has greatly broadened the opportunities for abuse of trust through the generation of fallacious documents and the tampering with existing documents, including the embedding of messages in these documents.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/MSP.2008.931082</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1053-5888 |
ispartof | IEEE signal processing magazine, 2009-03, Vol.26 (2), p.72-83 |
issn | 1053-5888 1558-0792 |
language | eng |
recordid | cdi_proquest_journals_861108093 |
source | IEEE Electronic Library (IEL) |
subjects | Conducting materials Digital images Electronic systems Forensics Graphical user interfaces Graphics Human Humans Internet Law enforcement Messages Printers Printing Scanners Scanning Signal processing |
title | Printer and scanner forensics |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T02%3A43%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Printer%20and%20scanner%20forensics&rft.jtitle=IEEE%20signal%20processing%20magazine&rft.au=Pei-Ju%20Chiang&rft.date=2009-03-01&rft.volume=26&rft.issue=2&rft.spage=72&rft.epage=83&rft.pages=72-83&rft.issn=1053-5888&rft.eissn=1558-0792&rft.coden=ISPRE6&rft_id=info:doi/10.1109/MSP.2008.931082&rft_dat=%3Cproquest_RIE%3E1019692149%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=861108093&rft_id=info:pmid/&rft_ieee_id=4806207&rfr_iscdi=true |