Skip to main content
Top
Published in: International Journal on Document Analysis and Recognition (IJDAR) 1/2020

14-10-2019 | Special Issue Paper

Even big data is not enough: need for a novel reference modelling for forensic document authentication

Authors: Utpal Garain, Biswajit Halder

Published in: International Journal on Document Analysis and Recognition (IJDAR) | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the emergence of big data, deep learning (DL) approaches are becoming quite popular in many branches of science. Forensic science is no longer an exception. However, there are certain problems in forensic science where the solutions would hardly benefit from the recent advances in DL algorithms. Document authentication is one such problem where we can have many reference samples, and with the big data scenario probably we would have even more number of reference samples but number of defective or forged samples will remain an issue. Experts often encounter situations where there is no or hardly a scanty number of forged samples available. In such situation, employment of data-hungry algorithms would be inefficient as they will not be able to learn the forged samples properly. This paper addresses this problem and proposes a novel reference modelling framework for forensic document authentication. The approach is based on Mahalanobis space. Two questioned document examination problems have been studied to show the effectiveness of our reference modelling algorithm which has also been compared to a commonly used learning approach, namely neural network-based classification.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Abdi, L., Hashemi, S.: To combat multi-class imbalanced problems by means of over-sampling techniques. IEEE Trans. Knowl. Data Eng. 28, 238–251 (2016)CrossRef Abdi, L., Hashemi, S.: To combat multi-class imbalanced problems by means of over-sampling techniques. IEEE Trans. Knowl. Data Eng. 28, 238–251 (2016)CrossRef
2.
go back to reference Artaud, C., Sidere, N., Doucet, A., Ogier, J., D’Andecy, V.: Find it! Fraud detection contest report. In: Proceedings ICPR, pp. 13–18 (2018) Artaud, C., Sidere, N., Doucet, A., Ogier, J., D’Andecy, V.: Find it! Fraud detection contest report. In: Proceedings ICPR, pp. 13–18 (2018)
3.
go back to reference Baldi, P.: Autoencoders. Unsupervised learning, and deep architectures. In: Workshop on Unsupervised and Transfer Learning, JMLR: Workshop and Conference Proceedings Vol. 27, pp. 37–50 (2012) Baldi, P.: Autoencoders. Unsupervised learning, and deep architectures. In: Workshop on Unsupervised and Transfer Learning, JMLR: Workshop and Conference Proceedings Vol. 27, pp. 37–50 (2012)
4.
go back to reference Centeno, A., Terrades, O., Lladós, J., Morales, C.: Evaluation of texture descriptors for validation of counterfeit documents. In: Proceedings ICDAR, pp. 1237–1242 (2017) Centeno, A., Terrades, O., Lladós, J., Morales, C.: Evaluation of texture descriptors for validation of counterfeit documents. In: Proceedings ICDAR, pp. 1237–1242 (2017)
5.
go back to reference Chambers, J., Yan, W., Garhwal, A., Kankanhalli, M.: Currency security and forensics: a survey. Multimed. Tools Appl. 74(11), 4013–4043 (2015)CrossRef Chambers, J., Yan, W., Garhwal, A., Kankanhalli, M.: Currency security and forensics: a survey. Multimed. Tools Appl. 74(11), 4013–4043 (2015)CrossRef
6.
go back to reference Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1–58 (2009)CrossRef Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1–58 (2009)CrossRef
7.
go back to reference Cozzolino, D., Poggi, G., Verdoliva, L.: Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 10(11), 2284–2297 (2015)CrossRef Cozzolino, D., Poggi, G., Verdoliva, L.: Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 10(11), 2284–2297 (2015)CrossRef
8.
go back to reference Cruz, F., Sidere, N., Coustaty, M., Poulain d’Andecy, V., Ogier, J.: Local binary patterns for document forgery detection. In: Proceedings ICDAR, pp. 1223–1228 (2017) Cruz, F., Sidere, N., Coustaty, M., Poulain d’Andecy, V., Ogier, J.: Local binary patterns for document forgery detection. In: Proceedings ICDAR, pp. 1223–1228 (2017)
9.
go back to reference Cruz, F., Sidère, N., Coustaty, M., Poulain d’Andecy, V., Ogier, J.M.: Categorization of document image tampering techniques and how to identify them. In: 7th IAPR International Workshop on Computational Forensics, Proceedings ICPR (2018) Cruz, F., Sidère, N., Coustaty, M., Poulain d’Andecy, V., Ogier, J.M.: Categorization of document image tampering techniques and how to identify them. In: 7th IAPR International Workshop on Computational Forensics, Proceedings ICPR (2018)
10.
go back to reference Cudney, E.A., Drain, D., Paryani, K., Sharma, N.: A comparison of the Mahalanobis-Taguchi system to a standard statistical method for defect detection. J. Ind. Syst. Eng. 2(4), 250–258 (2009) Cudney, E.A., Drain, D., Paryani, K., Sharma, N.: A comparison of the Mahalanobis-Taguchi system to a standard statistical method for defect detection. J. Ind. Syst. Eng. 2(4), 250–258 (2009)
11.
go back to reference Duda, R.O., Hart, P.E.: Use of the Hough transformation to detect lines and curves in pictures. Commun. ACM 15, 11–15 (1972)MATHCrossRef Duda, R.O., Hart, P.E.: Use of the Hough transformation to detect lines and curves in pictures. Commun. ACM 15, 11–15 (1972)MATHCrossRef
12.
go back to reference Garain, U., Halder, B.: On automatic authenticity verification of printed security documents. In: Proceedings of Indian Conference on Computer Vision, Graphics and Image processing (ICVGIP), Bhubaneswar, India, pp. 706–713 (2008) Garain, U., Halder, B.: On automatic authenticity verification of printed security documents. In: Proceedings of Indian Conference on Computer Vision, Graphics and Image processing (ICVGIP), Bhubaneswar, India, pp. 706–713 (2008)
13.
go back to reference Garain, U., Halder, B.: Machine authentication of security documents. In: Proceedings of International Conference on Document Analysis and Recognition (ICDAR), Bacelona, Spain, pp. 718–722 (2009) Garain, U., Halder, B.: Machine authentication of security documents. In: Proceedings of International Conference on Document Analysis and Recognition (ICDAR), Bacelona, Spain, pp. 718–722 (2009)
14.
go back to reference Geradts, Z., Franke, K. (Eds.): Special issue: big data and intelligent data analysis. Digit. Investig. 15, 1–124 (2015) Geradts, Z., Franke, K. (Eds.): Special issue: big data and intelligent data analysis. Digit. Investig. 15, 1–124 (2015)
15.
go back to reference Girard, N., Trullo, R., Barrat, S., Ragot, N., Ramel, J.: Interactive definition and tuning of one-class classifiers for document image classification. In: Proceedings of 12th IAPR Workshop on Document Analysis Systems (DAS) (2016). https://doi.org/10.1109/DAS.2016.46 Girard, N., Trullo, R., Barrat, S., Ragot, N., Ramel, J.: Interactive definition and tuning of one-class classifiers for document image classification. In: Proceedings of 12th IAPR Workshop on Document Analysis Systems (DAS) (2016). https://​doi.​org/​10.​1109/​DAS.​2016.​46
16.
go back to reference Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial networks. In: Proceedings of International Conference on Neural Information Processing Systems (NIPS), pp. 2672–2680 (2014) Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial networks. In: Proceedings of International Conference on Neural Information Processing Systems (NIPS), pp. 2672–2680 (2014)
17.
go back to reference Halder, B., Garain, U.: Color feature based approach for determining ink age in printed documents. In: Proceedings of International Conference on Patter Recognition (ICPR), Istanbul, Turkey, pp. 3212–3215 (2010) Halder, B., Garain, U.: Color feature based approach for determining ink age in printed documents. In: Proceedings of International Conference on Patter Recognition (ICPR), Istanbul, Turkey, pp. 3212–3215 (2010)
18.
go back to reference Halder, B., Darbar, R., Garain, U., Mondal, A.C.: Analysis of fluorescent paper pulps for detecting counterfeit Indian paper money. In: Proceedings of 10th International Conference on Information Systems Security (ICISS). Hyderabad, India, pp. 411–424 (2014) Halder, B., Darbar, R., Garain, U., Mondal, A.C.: Analysis of fluorescent paper pulps for detecting counterfeit Indian paper money. In: Proceedings of 10th International Conference on Information Systems Security (ICISS). Hyderabad, India, pp. 411–424 (2014)
19.
go back to reference Haralick, R.M., Shanmugam, K.S., Dinstein, I.: Textural features for image classification. IEEE Trans. Syst. Man Cybern. 3(6), 610–621 (1973)CrossRef Haralick, R.M., Shanmugam, K.S., Dinstein, I.: Textural features for image classification. IEEE Trans. Syst. Man Cybern. 3(6), 610–621 (1973)CrossRef
20.
go back to reference Harrison, W.R.: Suspect Documents: Their Scientific Examination. Praeger, New York (1958) Harrison, W.R.: Suspect Documents: Their Scientific Examination. Praeger, New York (1958)
21.
go back to reference Hilton, O.: Scientific Examination of Questioned Documents. Elsevier Science Publishing Co., New York (1982) Hilton, O.: Scientific Examination of Questioned Documents. Elsevier Science Publishing Co., New York (1982)
22.
go back to reference Huang, C., Li, Y., Change Loy, C., Tang, X.: Learning deep representation for imbalanced classification. In: CVPR (2016) Huang, C., Li, Y., Change Loy, C., Tang, X.: Learning deep representation for imbalanced classification. In: CVPR (2016)
23.
go back to reference Khan, S.H., Hayat, M., Bennamoun, M., Sohel, F.A., Togneri, R.: Cost-sensitive learning of deep feature representations from imbalanced data. IEEE TNNLS 29(8), 3573–3587 (2018) Khan, S.H., Hayat, M., Bennamoun, M., Sohel, F.A., Togneri, R.: Cost-sensitive learning of deep feature representations from imbalanced data. IEEE TNNLS 29(8), 3573–3587 (2018)
24.
go back to reference Lampert, C.H., Mei, L., Breuel, T.M.: Printing technique classification for document counterfeit detection. In: Proceedings of International Conference on Computational Intelligence and Security, pp. 639–644 (2006) Lampert, C.H., Mei, L., Breuel, T.M.: Printing technique classification for document counterfeit detection. In: Proceedings of International Conference on Computational Intelligence and Security, pp. 639–644 (2006)
25.
go back to reference Mahalanobis, P.C.: On the generalised distance in statistics. J. Multimed. Proc. Natl. Inst. Sci. India 2(1), 49–55 (1936)MathSciNetMATH Mahalanobis, P.C.: On the generalised distance in statistics. J. Multimed. Proc. Natl. Inst. Sci. India 2(1), 49–55 (1936)MathSciNetMATH
26.
go back to reference Mena, J.: Machine Learning Forensics for Law Enforcement, Security, and Intelligence. Auerbach Publications, Boca Raton (2011) Mena, J.: Machine Learning Forensics for Law Enforcement, Security, and Intelligence. Auerbach Publications, Boca Raton (2011)
27.
go back to reference Mikkilineni, K., Chiang, P.J., Ali, G.N., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Printer identification based on graylevel co-occurrence features for security and forensic applications. In: Proceedings of the SPIE 7th International Conference on Security, Steganography and Watermarking of Multimedia Contents, Vol. 5681, pp. 430–440 (2005) Mikkilineni, K., Chiang, P.J., Ali, G.N., Chiu, G.T.C., Allebach, J.P., Delp, E.J.: Printer identification based on graylevel co-occurrence features for security and forensic applications. In: Proceedings of the SPIE 7th International Conference on Security, Steganography and Watermarking of Multimedia Contents, Vol. 5681, pp. 430–440 (2005)
28.
go back to reference Mitchell, F.: The use of artificial intelligence in digital forensics: an introduction. Digit. Evid. Electron. Signat. Law Rev. 7, 35–41 (2010) Mitchell, F.: The use of artificial intelligence in digital forensics: an introduction. Digit. Evid. Electron. Signat. Law Rev. 7, 35–41 (2010)
29.
go back to reference Moya, M., Hush, D.: Network constraints and multi-objective optimization for one-class classification. Neural Netw. 9(3), 463–474 (1996)CrossRef Moya, M., Hush, D.: Network constraints and multi-objective optimization for one-class classification. Neural Netw. 9(3), 463–474 (1996)CrossRef
30.
go back to reference Osborn, A.S.: Questioned Documents, 2nd edn. Boyd Printing Company, Albany, NY (1929) Osborn, A.S.: Questioned Documents, 2nd edn. Boyd Printing Company, Albany, NY (1929)
31.
go back to reference Otsu, N.: A threshold selection method from gray-level histograms. IEEE Trans. Syst. 9(1), 62–66 (1979) Otsu, N.: A threshold selection method from gray-level histograms. IEEE Trans. Syst. 9(1), 62–66 (1979)
32.
go back to reference Raudys, S.J., Jain, A.K.: Small sample size effects in statistical pattern recognition: recommendations for practitioners. IEEE Trans. Pattern Anal. Mach. Intell. 3, 252–264 (1991)CrossRef Raudys, S.J., Jain, A.K.: Small sample size effects in statistical pattern recognition: recommendations for practitioners. IEEE Trans. Pattern Anal. Mach. Intell. 3, 252–264 (1991)CrossRef
33.
go back to reference Roy, A., Halder, B., Garain, U.: Authentication of currency notes through printing technique verification. In: Proceedings of ACM, Indian Conference on Computer Vision, Graphics and Image processing (ICVGIP), Chennai, India, pp. 383–390 (2010) Roy, A., Halder, B., Garain, U.: Authentication of currency notes through printing technique verification. In: Proceedings of ACM, Indian Conference on Computer Vision, Graphics and Image processing (ICVGIP), Chennai, India, pp. 383–390 (2010)
34.
go back to reference Roy, A., Halder, B., Garain, U., Doermann, D.: Machine-assisted authentication of paper currency: an experiment on Indian banknotes. Springer. Int. J. Doc. Anal. Recognit. (IJDAR) 18(3), 271–285 (2015)CrossRef Roy, A., Halder, B., Garain, U., Doermann, D.: Machine-assisted authentication of paper currency: an experiment on Indian banknotes. Springer. Int. J. Doc. Anal. Recognit. (IJDAR) 18(3), 271–285 (2015)CrossRef
35.
go back to reference Taguchi, G., Rajesh, J.: New trends in multivariate diagnosis. Sankhya Indian J. Stat. Ser. B 62(2), 233–248 (2000)MathSciNetMATH Taguchi, G., Rajesh, J.: New trends in multivariate diagnosis. Sankhya Indian J. Stat. Ser. B 62(2), 233–248 (2000)MathSciNetMATH
36.
go back to reference Taguchi, G., Jugulam, R.: The Mahalanobis Taguchi Strategy: A Pattern Technology System. Wiley, New York (2002)CrossRef Taguchi, G., Jugulam, R.: The Mahalanobis Taguchi Strategy: A Pattern Technology System. Wiley, New York (2002)CrossRef
37.
go back to reference Thompson, T.: Growing societal impact of digital forensics and incident response. Digit. Investig. 11(1), 1–2 (2014)CrossRef Thompson, T.: Growing societal impact of digital forensics and incident response. Digit. Investig. 11(1), 1–2 (2014)CrossRef
39.
go back to reference Verdoliva, L.: Handbook of digital forensics of multimedia data and devices [book reviews]. IEEE Signal Process. Mag. 33(1), 164–165 (2016)CrossRef Verdoliva, L.: Handbook of digital forensics of multimedia data and devices [book reviews]. IEEE Signal Process. Mag. 33(1), 164–165 (2016)CrossRef
Metadata
Title
Even big data is not enough: need for a novel reference modelling for forensic document authentication
Authors
Utpal Garain
Biswajit Halder
Publication date
14-10-2019
Publisher
Springer Berlin Heidelberg
Published in
International Journal on Document Analysis and Recognition (IJDAR) / Issue 1/2020
Print ISSN: 1433-2833
Electronic ISSN: 1433-2825
DOI
https://doi.org/10.1007/s10032-019-00345-w

Other articles of this Issue 1/2020

International Journal on Document Analysis and Recognition (IJDAR) 1/2020 Go to the issue

Premium Partner