{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T06:30:26Z","timestamp":1757572226661,"version":"3.41.0"},"reference-count":33,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T00:00:00Z","timestamp":1502409600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2017,8,31]]},"abstract":"<jats:p>In this article, we propose a novel paper fingerprinting technique based on analyzing the translucent patterns revealed when a light source shines through the paper. These patterns represent the inherent texture of paper, formed by the random interleaving of wooden particles during the manufacturing process. We show that these patterns can be easily captured by a commodity camera and condensed into a compact 2,048-bit fingerprint code. Prominent works in this area (Nature 2005, IEEE S8P 2009, CCS 2011) have all focused on fingerprinting paper based on the paper \u201csurface.\u201d We are motivated by the observation that capturing the surface alone misses important distinctive features such as the noneven thickness, random distribution of impurities, and different materials in the paper with varying opacities. Through experiments, we demonstrate that the embedded paper texture provides a more reliable source for fingerprinting than features on the surface. Based on the collected datasets, we achieve 0% false rejection and 0% false acceptance rates. We further report that our extracted fingerprints contain 807 degrees of freedom (DoF), which is much higher than the 249 DoF with iris codes (that have the same size of 2,048 bits). The high amount of DoF for texture-based fingerprints makes our method extremely scalable for recognition among very large databases; it also allows secure usage of the extracted fingerprint in privacy-preserving authentication schemes based on error correction techniques.<\/jats:p>","DOI":"10.1145\/3092816","type":"journal-article","created":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T12:17:17Z","timestamp":1502453837000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Texture to the Rescue"],"prefix":"10.1145","volume":"20","author":[{"given":"Ehsan","family":"Toreini","sequence":"first","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]},{"given":"Siamak F.","family":"Shahandashti","sequence":"additional","affiliation":[{"name":"University of York, York, United Kingdom"}]},{"given":"Feng","family":"Hao","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2017,8,11]]},"reference":[{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the SPIE 6819","author":"Beekhof Fokko","year":"2008","unstructured":"Fokko Beekhof , Sviatoslav Voloshynovskiy , Oleksiy Koval , Renato Vill\u00e1n , and Thierry Pun . 2008 . Secure surface identification codes . Proceedings of the SPIE 6819 , Article No. 68190D. Fokko Beekhof, Sviatoslav Voloshynovskiy, Oleksiy Koval, Renato Vill\u00e1n, and Thierry Pun. 2008. Secure surface identification codes. Proceedings of the SPIE 6819, Article No. 68190D."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1360612.1360683"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1038\/436475a"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2009.0032"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1120680.1120685"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_5"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.7"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.244676"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00030-4"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.2.001160"},{"key":"e_1_2_1_14_1","volume-title":"Retrieved","author":"Goyal Hari","year":"2015","unstructured":"Hari Goyal . 2015 . Properties of Paper . Retrieved May 24, 2017, from http:\/\/www.paperonweb.com\/paperpro.htm. Hari Goyal. 2015. Properties of Paper. Retrieved May 24, 2017, from http:\/\/www.paperonweb.com\/paperpro.htm."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0030-4018(97)00546-4"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1950.tb00463.x"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.138"},{"key":"e_1_2_1_18_1","first-page":"2008","article-title":"Paper and Board Determination of Opacity (Paper Backing) Diffuse Reflectance Method","volume":"2471","author":"ISO.","year":"2008","unstructured":"ISO. 2008 . Paper and Board Determination of Opacity (Paper Backing) Diffuse Reflectance Method . ISO 2471 : 2008 . International Organization for Standardization, Geneva, Switzerland. ISO. 2008. Paper and Board Determination of Opacity (Paper Backing) Diffuse Reflectance Method. ISO 2471:2008. International Organization for Standardization, Geneva, Switzerland.","journal-title":"ISO"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.59"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/988772.988797"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:19990213"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.999679"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41395-7"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1362-2_11"},{"volume-title":"Proceedings of the 3rd Workshop on Automatic Identification. 147--154","author":"M\u00e9tois Eric","key":"e_1_2_1_27_1","unstructured":"Eric M\u00e9tois , Paul Yarin , Noah Salzman , and Joshua R. Smith . 2002. FiberFingerprint identification . In Proceedings of the 3rd Workshop on Automatic Identification. 147--154 . Eric M\u00e9tois, Paul Yarin, Noah Salzman, and Joshua R. Smith. 2002. FiberFingerprint identification. In Proceedings of the 3rd Workshop on Automatic Identification. 147--154."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(75)90044-8"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cvi.2010.0037"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACT.2010.15"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046721"},{"volume-title":"Proceedings of the 2nd Workshop on Automatic Identification Advanced Technologies. 79--83","author":"Joshua","key":"e_1_2_1_34_1","unstructured":"Joshua R. Smith and Andrew V. Sutherland. 1999. Microstructure based indicia . In Proceedings of the 2nd Workshop on Automatic Identification Advanced Technologies. 79--83 . Joshua R. Smith and Andrew V. Sutherland. 1999. Microstructure based indicia. In Proceedings of the 2nd Workshop on Automatic Identification Advanced Technologies. 79--83."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1364\/JOSA.70.000920"},{"key":"e_1_2_1_36_1","unstructured":"F. van Beijnum E. G. van Putten K. L. van der Molen and A. P. Mosk. 2006. Recognition of paper samples by correlation of their speckle patterns. arXiv:0610089.  F. van Beijnum E. G. van Putten K. L. van der Molen and A. P. Mosk. 2006. Recognition of paper samples by correlation of their speckle patterns. arXiv:0610089."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp:19950467"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3092816","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3092816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:27Z","timestamp":1750217847000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3092816"}},"subtitle":["Practical Paper Fingerprinting Based on Texture Patterns"],"short-title":[],"issued":{"date-parts":[[2017,8,11]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8,31]]}},"alternative-id":["10.1145\/3092816"],"URL":"https:\/\/doi.org\/10.1145\/3092816","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2017,8,11]]},"assertion":[{"value":"2016-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-08-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}