Document authentication scheme using characters metrics

M. García-Horta, M. González-Lee, M. Nakano-Miyatake, H. Pérez-Meana

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we propose a document authentication scheme, in which the document data has PDF format. The proposed scheme is an improved version of Zhu's document protection scheme. In Zhu's scheme, the render sequence is encoded, such that a predefined character of the render sequence is permuted by secret key. This permutation is then used as authentication code. Their scheme has two inconveniences for practical applications: The first one is that the file size of encoded document is considerably increased compared with the original one, the second one is that the structure of encoded render sequence is unnatural, and as consequence, it can be detected easily by third party and reverse engineering can be applied to tamper the document. To solve these problems, this paper propose a document authentication scheme, in which the encoded sequence is kept in its natural structure and the file size of the encoded document is not increased.

Original languageEnglish
Title of host publicationCONIELECOMP 2009 - 19th International Conference on Electronics Communications and Computers
Pages148-152
Number of pages5
DOIs
StatePublished - 2009
Event19th International Conference on Electronics Communications and Computers, CONIELECOMP 2009 - Cholula, Puebla, Mexico
Duration: 26 Feb 200928 Feb 2009

Publication series

NameCONIELECOMP 2009 - 19th International Conference on Electronics Communications and Computers

Conference

Conference19th International Conference on Electronics Communications and Computers, CONIELECOMP 2009
Country/TerritoryMexico
CityCholula, Puebla
Period26/02/0928/02/09

Keywords

  • Document authentication
  • Document description language
  • Document rendering

Fingerprint

Dive into the research topics of 'Document authentication scheme using characters metrics'. Together they form a unique fingerprint.

Cite this