Technology for the protection of confidential data in traditional data carriers on paper and plastic based on digital holography
M.V. Smirnov, Saint-Petrsburg, Russua.
smirnoff04@mail.ru
Russian
PROBLEM. In recent years, both in our country and abroad, the development and implementation of electronic documents, in particular documents with microchips, has been successfully carried out. Digital presentation of data provides convenient data entry and editing, high noise immunity of the recording, ease of reading and viewing data. However, this simplicity is attractive to crackers. There are plenty of examples of hacking digital data.
The falsification and falsification of such documents as a passport, driver’s license, bank or identification plastic cards, medical insurance, certificates of conformity, etc. causes tangible
economic, legal and moral harm.
At the same time, the main obstacle to digital hacking is the analog representation of the hidden data in the photo carrier.
Visually observed documents and photographs, in any case, are analog regardless of whether the picture was taken with a digital camera or film. The last statement is also true for viewing photographs on a monitor screen.
SOLUTION. The presented Holographic WaterMark (HWM) technology is designed to conceal and protect confidential data in traditional storage media using digital holography techniques to provide comprehensive information security.
HWM technology enables the implementation and storage of hidden data in photographic media on paper or plastic basis.
Unlike well-known technologies, the identification object and the security tool form a single conditionally dependent object.
A combination of the steganographic concealment approach and cryptographic data encryption is provided.
The decision on the ownership of the document is based on the visual perception of the recovered hidden data.
The application of the technology is not associated with a change in existing technologies for the production of documents and plastic cards.
HWM technology is based on the use of standard office equipment.
SHORT DESCRIPTION. The work is devoted to the creation of technology and software for analog-to-digital data hiding and protection in traditional storage media, as well as electronic documents to ensure integrated information security. The module package is implemented in the C ++ programming language in the environment of Borland Builder.
Methodologically, HWM technology and software are two independent processes for the synthesis and restoration of digital Fourier holograms.
The first process is intended for the synthesis of digital Fourier holograms of hidden data (identifiers, labels), and their integration into analog data carriers.
The second process is the reverse and consists in restoring a hologram of hidden data.
A hidden data detection event is used to decide on the authenticity of a document or the rights of the owner.
The holographic approach and theoretical justification are presented in [1], which established that embedding hidden data in the image spectrum
equivalent to embedding the Fourier hologram of this data in the image.
HOW IT WORKS.
Example I. Embedding hidden identities in printed matter.
In the example, the initial data for protection is a digital magazine layout made programmatically for subsequent printing on a printer. This procedure, in accordance with the elements of the conversion path, is called «print-scan».
The print-scan conversion diagram. In the diagram, paragraph a) is the process of embedding a hidden identifier in a digital layout and printing the resulting image, b) is the process
scanning an image with a built-in hidden identifier and performing a two-dimensional Fourier transform in the program unit for restoring the hologram of the desired object.
1) Original image for printing (digital layout)
Fig.1.1. Digital magazine cover layout with text, graphics, and photo content
A copy of the original Atlas for Men magazine cover text is presented.
1.2) Luminance histogram of the original container image
Figure 1.2. The histogram of the image in Fig. 1.1 and a schematic representation of the process of embedding the hologram of the hidden identifier in the image container in Fig. 1.1.
1.3) Image container after embedding the identification code
Fig. 1.3. Enlarged fragment (300%) of the container image after embedding the identifier in the form of a hieroglyph in the digital layout
Fig. 1.4. Enlarged fragment (300%) of the container image with a built-in identifier after printing and subsequent scanning (“print-scan” process)
1.4) Result of restoring a hologram of a hidden identification code
Fig.1.5. Result of hologram recovery of a hidden identifier in the form of a hieroglyph image. The result of the restoration is shown in the console of the HWM software package.
Example II. Embed Holograms of Hidden Identifiers in High-Quality Art Reproductions
Fig.2.1. Art reproduction on canvas with embedded hidden data in the form of alphanumeric characters. The size of the original digital layout is 9040x4064 pixels. The resolution of photo registration is 600 dpi. Process "print-cam", Samsung S8 Smartphone SM-G920F Digital Camera.
Fig.2.2. Hologram recovery options for hidden data. The size of the embedded data embedding area is 128x128 pixels.
Пример III. Embedding holograms of hidden identifiers in images on a monitor screen
Fig. 3.1. A photo image with a built-in hologram of hidden data obtained when photographing the screen using a smartphone. The image size is 4208x3120 pixels.
The shot was taken with the LG-E975w digital camera directly from the PC monitor screen. This is «screen-cam» process
Fig. 3.2. The figure shows the console of the HWM software package with the result of restoring a hologram of hidden data in the form of a set of Latin characters of 128x128 pixels in size.
Пример IV. Embedding holograms of hidden identifiers in plastic images
Fig. 4.1. Photo of a plastic card with a built-in hologram of hidden data in the form of a copyright sign ©. The full size of the container image is 1026x1029 pixels with a spatial recording density of 600dpi.
Scanning was performed on a standard device with dpi equal to 1200. The process of «print-scan».
Fig.4.2. Enlarged fragment (400%) of the container portrait with integrated hologram.
Fig.4.3. Result of recovering hidden data from an image on a plastic card.
Example V. Protection of documents in DOC, PDF, HTML and other electronic documents with hidden identifiers
Fig.5.1. Document in DOC format with a background in the form of a hologram of hidden data (identifier).
Fig.5.2. A photo from the monitor screen of a DOC document with a built-in hologram of a hidden identifier. The photo was taken using a smartphone
with a digital resolution of 3120x4208 pixels.
Fig.5.3. The result of detecting hidden data when photographing a DOC document from a monitor screen. The recovery result is shown in the console of the HWM software package.
Example VI. Transmission of cipherograms in container-images
The combination of encryption (cryptography) and data hiding in container images provides high security for the transmission of confidential information over open communication channels. Encryption is performed by methods of permutation of elements of a binary image of a text message.
Fig.6.1. Example of permutation of elements of a binary image. Permutation Key (private key): [28 1 19 3 22 5 18 7 11 9 10 4 12 31 14 26 24 17 6 2 20 21 8 23 16 25 15 27 0 29 30 13].
Fig.6.2. On the left, the image is a container (public key) and its brightness histogram.
On the right is an image and a histogram with a built-in hologram of a text message.
The open communication channel receives an image with a built-in hologram (the picture on the right in Fig.6.2.). On the recipient's side, the hologram is detected (the picture on the left in Fig.6.3.).
Fig.6.3. On the left is a hologram of a text message after decryption.
On the right is the result of restoring a hologram of a text message.
COMPETITION.
a) Manufacturers of protective optical holograms that are applied over documents. Conceptually, this technology
differs little from applying a conventional printing stamp on top of a document. The technology does not have a conditional dependence according to the scheme "security element - protected document".
Replacing a document with a protective element applied over it will not indicate falsification.
b) Manufacturers of intelligent micro-chips that can be implanted, for example, into credit cards.
The cost of such micro-chips exceeds the cost of embedded hidden data in plastic by HWM technology by 2-3 orders of magnitude.
There is a high probability of hacking.
MARKET.
a). Provision of printing services for paper and photographic materials with hidden identification data
b) Provision of services for identification of the owner of printing products
c) Gos. orders for the production of certificates, diplomas, certificates, passports, documents on plastic with embedded hidden data
d) HWM Software Product License Selling
HWM Software Partners
the production of modern household digital equipment:
- digital cameras
- scanners and printers
- digital signal processors
- printing manufacturers
PAM market model. Global market not limited by geography or other factors.
CONTACTS. LEGAL STATUS.
Michael Smirnov
E-mail: smirnoff04@mail.ru
http://smirnov.spb.su
Saint-Petersburg, Russia
[1]
Голографический подход к встраиванию скрытых водяных знаков в фотографии
[2] M.V. Smirnov. Holographic approach to embedding hidden watermarks in a photographic image - Journal of Optical Technology Vol. 72, Issue 6, pp. 464-468 (2005)