HP Labs India's Technology to Make Printed Paper Documents Tamper-Proof
Keywords:paper document fraud, security of paper documents, document authentication
Proof “The objective of this paper is to discuss the cost-effective technologies developed at HP Labs India to make paper documents tamper-proof. We started with a real customer problem: to ensure that printed government land records should be tamper-proof. We first looked at existing techniques to see if they could address the problem but subsequently had to come up with our own technology. To address the problem, there was a need to identify good pilot customers to promote adoption of technology. Another challenge was around the customer's lack of awareness in terms of the impact of fraudulent documents on their business, and the difficulty of selling solutions versus selling products. Technology invention plays a small part in the final success of any customer-driven innovation, and so other factors should not be ignored. There were several other specific conclusions related to the innovator, the customer-facing staff and the customers. The key contributions of this work was starting with a real customer problem and dealing with end-to-end issues related to adoption of technology to make paper documents tamper-proof. “
International Organization for Standardization (2006) ISO/IEC 15438:2006: Information technology - Automatic identification and data capture techniques — PDF417 bar code symbology specification. Geneva, International Organization for Standardization (online) Available from <URL:http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=43816>
Moore, G.A. (1991) Crossing the Chasm, New York, Harper Perennial.
Reuters (2007) ‘MIT dean resigns after falsifying degrees’, Reuters, 26 April. (online) Available from <URL:http://www.reuters.com/article/domesticNews/idUSN2631144020070426>
Sankarasubramaniam, Y., Narayanan, B., Viswanathan, K., and Kuchibhotla, A. (2009) ‘Detecting Modifications in Paper Documents: A Coding Approach’, paper presented at Document Recognition and Retrieval XVII Conference (SPIE), 20-21 January 2010, San Jose, CA, USA.
Schneier, B. (2007) Applied Cryptography: Protocols, Algorithms, and Source Code in C, New Delhi, Wiley-India.
Times of India (2002) ‘Man obtains bank loans with forged documents’, The Times of India, 29 March (online). Available from <URL:http://timesofindia.indiatimes.com/news/city/hyderabad/Man-obtainsbank-loans-with-forged-documents/articleshow/5211893.cms>
US Patent and Trademark Office (2009) USPA 20090180698 Document Verification Method and System; 20090103803 Machine Readable Documents and Reading Methods, 20090059309 Document and Method of Producing a Document, 20080292136 Data Processing System and Method, 20080101601 Method and Apparatus for Preparing and Verifying Documents, New York, US Patent and Trademark Office