SlideShare a Scribd company logo
1 of 49
Download to read offline
Module XL - Printer Forensics
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News: Inkjet Research Could Aid
Forensics
Source: http://www.pcworld.com/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News: Particulate Emissions From
Laser Printers
Source: http://www.sciencedaily.com/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Objective
• Introduction to Printer Forensics
• Different Printing Modes
• Methods of Image Creation
• Printer Forensics Process
• Digital Image Analysis
• Document Examination
• Phidelity
• Cryptoglyph Digital Security Solutions
• DocuColor Tracking Dot Decoding
This module will familiarize you with:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Introduction to Printer Forensics
Printer Forensics Process Methods of Image Creation
Cryptoglyph Digital Security
Solutions
Phidelity
Document ExaminationDigital Image Analysis
Different Printing Modes
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Printer Forensics
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Introduction to Printer Forensics
Printer forensics refer to the investigation done on any printed document or the printer
used to print the document
Investigation of the documents and printers will provide valuable information of crime to
the law enforcement agencies and intelligence agencies
• Examples include forgery or alteration of documents used for purposes of identity, security, or
recording transactions
• Printed material may be used in the course of conducting illicit or terrorist activities
In several cases, printed material is a direct accessory to criminal acts
• Examples include instruction manuals, team rosters, meeting notes, and correspondence
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Different Printing Modes
• A monochrome printer can only produce an image
consisting of one color, usually black
Monochrome:
• A color printer can produce images of multiple colors
Color printer:
• A photo printer is a color printer that can produce images
that mimic the color range and resolution of photographic
methods of printing
Photo printer:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Methods of Image Creation
• Toner based printers adhere toners to a light sensitive
print drum
• It uses static electricity to transfer the toner to the
printing medium to which it is fused with heat and
pressure
• Different toner based printers are:
• Laser printers uses precise lasers to cause adherence
• LED printer uses an array of LEDs to cause toner adhesion
Toner-based printers:
• Inkjet printers spray small, precise amounts of ink onto
the media
Inkjet printers:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Methods of Image Creation
(cont’d)
• Impact printers rely on a forcible impact to transfer ink
to the media, similar to typewriters, that are typically
limited to the reproducing text
• A daisy wheel printer is a specific type of impact printer
where the type is molded around the edge of a wheel
Impact printers:
• Printers rely on a matrix of pixels, or dots, that together
form the larger image
• It is specifically used for impact printers that use a matrix
of small pins to create precise dots
• It can produce graphical images in addition to text
Dot-matrix printers:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Methods of Image Creation
(cont’d)
Line printers print an entire line of text at a time
The two principle designs of Line printers:
• Drum printers: A drum carries the entire character set of the
printer repeated in each column that is to be printed
• Chain printers or train printers: The character set is arranged
multiple times around a chain that travels horizontally past
the print line
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Methods of Image Creation
(cont’d)
• A digital minilab is a computer printer that uses traditional chemical
photographic processes to make prints of digital images
• Photographs are input to the digital minilab using a built-in film scanner
that captures images from negative and positive photographic films
Digital Minilab:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Methods of Image Creation
(cont’d)
• Dye-sublimation printer uses heat to transfer dye to the
medium such as poster paper, plastic card, etc.
• It lays one color at a time with the help of a ribbon which
has color panels
Dye-sublimation printer:
• A spark printer uses a special paper coated with a layer of
aluminum over a black backing, which is printed on by
using a pulsing current onto the paper via two styli that
move across on a moving belt at high speed
Spark printer:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Printers with Toner Levels
Make/Model Toner
HP LaserJet 4300 72%
HP LaserJet 4350 72%
HP LaserJet 4350 72%
Xerox Phaser 5500DN 94%
Xerox Phaser 5500DN 31%
Xerox Phaser 5500DN 60%
Xerox Phaser 8550DP -
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Parts of a Printer
• A print head with a print head connector
• A carriage with a carriage connector, which can detach the print head from
the print head connector
• A driver for driving the print head
• A microprocessor for controlling the driver in accordance with an N-bit
print head identification signal, wherein N is a positive integer
• A plurality of signal lines for connecting the microprocessor to the carriage
connector
• A parallel-to-serial converter, which is disposed on the print head, for
converting N parallel inputs into an N-bit print head identification signal
A printer is comprised of:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Printer Identification Strategy
• Passive strategy involves characterizing the printer by finding intrinsic
features in the printed document that are characteristic of that particular
printer, model, or manufacturer's products
• This is referred as intrinsic signature
Passive:
• In active strategy, extrinsic signature is embedded in a printed page
• The extrinsic signature is obtained by modulating the process parameters
in the printer mechanism to encode identifying information such as the
printer serial number and date of printing
Active:
Two strategies to identify a printer that was used to print a document:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Printer Identification
Unknown
Document
Extra
Characters
Extra
Features
Variance/
Entropy
GLCM
Features
SVM Classifier
Majority Vote
Output class
Individual
Characters
Feature Vector per Character
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Printer Forensics Process
Pre-processing
Printer Profile
Forensics
Ballistics
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Pre-Processing
A printed document is first digitally scanned and saved in an uncompressed format
In the first stage, multiple copies of the same character are located in a scanned
document
A user first selects a bounding box around a character of interest to serve as a template
To minimize the effect of luminance variations across printers, the intensity histograms
of the characters are matched as follows:
• Select a random set of characters and average their intensity histograms to create a reference
histogram so that the luminance variations across printers is minimized
• Each character’s intensity histogram is then matched to this reference histogram
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Printer Profile
Once the characters are aligned properly, a profile is constructed based on
the degradation introduced by the printer
Based on the complex nature of degradation, a data driven approach is
used to characterize the degradation
A principal components analysis is applied to the aligned characters to
create a new linear basis that embodies the printer degradation
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Forensics
• Splicing in portions from a different document
• Digitally editing a previously printed and scanned document
and then printing the result
In a forensics setting, determine if a part of
the document has been manipulated:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Ballistics
In a ballistics setting, determine if a document was
printed from a specific printer
A printer profile is generated from a printer to determine
if the document in question was printed from this printer
Assume that the printer profile is constructed from the
same font family and size as the document to be analyzed
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
A Clustering Result of a Printed
Page
HP
LaserJet
Xerox
Phaser
The printed page shows a clustered result of the
HP LaserJet and Xerox Phaser
The top part of the page is printed with HP
LaserJet 4350 and the bottom half was printed
on a Xerox Phaser 5500DN
These documents are scanned, combined and
printed on a HP LaserJet 4300 printer
A printer profile was created from 200 copies
of the letter ‘a’
Printer profile is effective in detecting fakes
composed of parts initially printed on different
printers
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Digital Image Analysis
Digital Image Analysis technique is used to analyze patterns
generated in the printed document due to irregular movements by the
print engine
The irregular movement cause lines to be printed across a page
instead of solid smooth print which is known as banding
Banding effect has been attributed to two causes:
• Fine banding is due to the imbalance of the rotor component of the polygon
mirror or mechanical weaknesses of the laser scanning unit
• Rough banding caused by unsteady motion of the photoconductor drum or
the fuser unit
This banding can be used to link a document to the printer that
produced it
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Printout Bins
Printout Bins are a staging area after a document has been printed
Each printout consists the information of the related project and the user who printed the
document
The bin consists of the information that uniquely identifies the user by name, PIN
number, the user project number, and the date and/or time the printout was prepared,
etc.
The bin access is allowed only if:
• Acceptable confidential user identification is presented
• Atleast one printout for that user is presently contained in the locked bin
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Document Examination
• Find genuine or counterfeit of the document
• Determine the way document is generated
• Examine the machines used to print the document
Printed documents can be examined to:
• The paper type (physical properties, optical properties)
• Security features of the paper (e.g. watermark)
• Printing process used
• Verifying of other digital evidence such as perforations
• Microscopic analysis reveal tiny imperfections which links documents
from one to another
The various factors considered by the
document examiner:
Document examination is an important aspect in printer forensics to analyze
the documents
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Document Examination (cont’d)
• The presence of physical alterations or obliterated writing can
sometimes be determined, and the writing can sometimes be
deciphered
• The manufacturer can sometimes be determined if a watermark is
present
Altered or Obliterated Writing:
• Paper examination - the letterheads and watermarks of business or
personal stationery will be modified from time to time by the
manufacturer
• Typescript - comparison of typewritten documents produced by an
organization over a period of time
Examining date of document:
The different aspects of examination:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Document Examination (cont’d)
• Signature examinations generally involve the comparison of signatures which are
specimen (provable) against questioned (disputed) signatures
• In signature comparison, the features of the questioned signature(s) -
construction, shape, proportions and fluency - are assessed and then compared
with the same features in the specimen signatures
Signature Examination
• Spur marks are tool marks created by the spur gears in the paper conveyance
system of many inkjet printers
• The spur marks on the printed document is compared with the spur marks of
known printers to know the relationship between them
• The comparison of two spur marks is based on the characteristics: pitch and
mutual distance
Examining spur marks found on inkjet-printed
documents
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Services of a Document Examiner
The document examiner examines the document for any
alterations, counterfeiting of document, and substitutions
The examiner conducts research related to the document
• The research includes finding of comparable documents to verify
authenticity, paper used, type of printer, etc.
Examiner conducts tests on the documents to find the conclusions
Examiner prepares a review based on the outcome of the tested
documents
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tamper-Proofing of Electronic and
Printed Text Documents
Text document should be tamper-proofed and authenticated to
distribute them in electronic or printed forms
A text document authentication system aims at deciding whether a
given text document is authentic or not
Text document tamper-proofing system aims at verifying the
authenticity of a text document and indicating the local modifications,
if the document is suspected to be a fake
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tamper-Proofing of Electronic and
Printed Text Documents (cont’d)
There are three approaches to hash-based document authentication based
on where the hash is stored:
• Hash storage in an electronic database
• Hash storage onto the document itself using auxiliary special means such as 2D bar
codes, special inks or crystals, magnetic stripes, memory chips, etc.
• Hash storage onto the document's content itself using data-hiding techniques
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Phidelity
Phidelity is a technology used to enhance the security of printed
documents by providing layers of protection
Phidelity's Optical Watermark makes innovative use of normal
printers to print visual covert and overt watermarks
It generates secure optical watermarks against various types of
possible attacks while only using common desktop printers,
eliminating the need of special inks or papers
Phidelity's Microprint is the creative use of printer capabilities to
print small fonts
By printing important document information as Microprint, any
casual copying of the original document will result in highly
distorted text in the duplicates
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Zebra Printer Labels to Fight
Against Crime
Law enforcement agencies rely on Zebra printer labels for
accurate and confidential printing needs when collecting
important criminal evidence
Zebra printer labels help to identify criminal evidence more
quickly with Zebra bar code printers
The labels can also produce ID badges (both for criminals and
law enforcement) and keep track of criminal records
confidentially and safely
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Cryptoglyph Digital Security
Solution
Cryptoglyph security process provides an invisible marking with
standard ink and standard printing processes
It can be easily integrated into any current packaging production line or
any document processing workflow before printing
Embed the invisible Cryptoglyph file in the prepress digital packaging
image file or generate it before printing it with your document
processing system
Cryptoglyph requires no packaging design or any page template
modification
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Case Study: Dutch Track Counterfeits
via Printer Serial Numbers
Wilbert de Vries (WebWereld Netherlands) 26/10/2004 08:39:31
It appears that although consumers aren't aware of the hidden code on their color prints, government agencies are. And they are
using this knowledge in their battle against counterfeiters -- with help from well-known printer manufacturers.
Security
Sources familiar with the printer industry confirm this built-in security is in fact a unique number that is printed on every color
page. The code, in yellow, can be printed on a line as thin as 0.1 millimeter.
With help from manufacturers like Canon, authorities can gather information about the printer used in counterfeit crimes. The
number tells them in which country a specific printer has been delivered, and to what dealer. The dealer then can lead them to
the local computer store where the printer was sold.
Success
"We are familiar with this research method," said Ed Kraszewski of the Dutch national police agency KLPD. "We are using it in
our research and it has proven to be successful in the past."
Even though the spokesman cannot detail what kind of successes or in what cases the agency is using this method now,
anonymous sources confirm that the Dutch Railway Police, part of the KLPD, is investigating a gang that could be
counterfeiting tickets on a large scale.
As part of the research in this case, officers have tracked down the printer used to print the fake tickets. They are now trying to
get the name of the person who bought the printer. A local distributor in the Netherlands was visited by two officers with
specific questions about the printer.
"Their research led them to our company," said the director of the big Dutch distributor, who wants to remain anonymous. "It
concerned an investigation about counterfeit tickets. With the number they apparently found, they could see what engine was
used. They knew exactly what printer was used and wanted to know to whom I had sold that specific printer."
The company's records only revealed in what batch the printer had arrived. The police left the building with specific sales
information about that batch, which contained about a hundred printers. The investigation is still running, according to a
spokesman for the team investigating this matter.
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Is Your Printer Spying On You?
Imagine that every time you printed a document, it automatically
included a secret code that could be used to identify the printer - and
potentially, the person who used it
In a purported effort to identify currency counterfeiters, the US
government has succeeded in persuading some color laser printer
manufacturers to encode each page with identifying information
For a list of printers with this tracking capability, please visit:
• http://www.eff.org/Privacy/printers/list.php
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
DocuColor Tracking Dot
Decoding
The yellow dots are visible after the dot grid are magnified under 60x
magnification
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
DocuColor Tracking Dot
Decoding (cont’d)
A computer graphics software is used to overlay the black dots in the
microscope image with a larger yellow dots for clear visibility
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
DocuColor Tracking Dot
Decoding (cont’d)
The topmost row and the left
column are the parity row and
column for error correction
It helps to verify the forensic
information for correctness
The rows and columns has odd
parity
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
DocuColor Tracking Dot
Decoding (cont’d)
Columns are read from top to bottom as a single byte of seven
bits, the bytes are then read from right-to-left. Columns from left
to right have the following meanings:
15
Unknown (often zero; constant for each individual printer; may
convey some non-user-visible fact about the printer's model or
configuration)
14, 13, 12, 11
Printer serial number in binary-coded-decimal, two digits per
byte (constant for each individual printer; see below)
10
Separator (typically all ones; does not appear to code
information)
9 Unused
8 Year that page was printed (without century; 2005 is coded as 5)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
DocuColor Tracking Dot
Decoding (cont’d)
Column are read from top to bottom as a single byte of seven bits,
the bytes are then read from right-to-left. Columns from left to
right have the following meanings:
7 Month that page was printed
6 Day that page was printed
5
Hour that page was printed (may be UTC time zone, or
may be set inaccurately within printer)
4,3 Unused
2 Minute that page was printed
1
Row parity bit (set to guarantee an odd number of dots
present per row)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tools
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Print Spooler Software
Print Spooler prints the document to the intended printer when
the printer is ready
It allows system resources to perform other tasks, where Line
Printer Requester (LPR) print spooler performs the printing
process
It sends the job to print queue for processing
It manages the printing process
Spooling prepared a file for printing, emailing, and sending to a
device or system which is presently being occupied by other tasks
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigating Print Spooler
For each print job on Windows XP, the files found in
C:WindowsSystem32spoolPrinters folder are:
• .SPL – the spool file consists of print job’s spool data
• .SHD - shadow file consists of job settings
To view the metadata of the print job use PA Spool View tool
To view the spooled pages , use EMF Spool View tool
Enhanced metafiles provide true device independence
Enhanced metafiles are standardized, that allows pictures stored in this format to copy
from one application to other
Check the spool folder location of a specific printer by opening the registry key:
• HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlPrintPrinters <printer>
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Printer Tools
iDetector is an effective tool to
visually compare inspected documents
and products with genuine ones
Print Inspector lets you manage the
print jobs queued to any shared printer
and provides easy access to the printer
and print server settings
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tool: EpsonNet Job Tracker
http://www.business-solutions.epson.co.uk/
• Monitors and analyzes network printer activity
• Controls access to color, keep costs down
• Manages print resources, improves network traffic
• Defines printer activity, calculates, assigns and recovers
costs
• Sends reports automatically to departments and managers
• Controls by time of day, type of printing, number of pages
Benefits of Epson NetJob Tracker:
EpsonNet Job Tracker is a web-based application software
It gives a clear picture of what is being printed, where and by whom, thereby helping
you control your printing costs
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
Printer forensics refers to the investigation done on any printed document or the printer used to
print the document
Investigation of the documents and printers will provide valuable information for the law
enforcement agencies and intelligence agencies
Different Printing Modes are Monochrome , Color Printer, and Photo printer
Methods used for Image Creation are: Toner-based printers, Inkjet printers, Impact printers, Dot-
matrix printers, Line printers, Digital Minilab, Dye-sublimation printer, and Spark printer
A printed document is first digitally scanned and saved in an uncompressed format
Method and system for identifying and facilitating access to computer printouts contained in an
array of printout bins
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

More Related Content

Viewers also liked

Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimesModule 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimessagaroceanic11
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseMercury Solutions Limited
 
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.cnetworks
 
CEH - Module 5 : System Hacking
CEH - Module 5 : System HackingCEH - Module 5 : System Hacking
CEH - Module 5 : System HackingAvirot Mitamura
 

Viewers also liked (6)

File000120
File000120File000120
File000120
 
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimesModule 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) Course
 
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
 
CEH - Module 5 : System Hacking
CEH - Module 5 : System HackingCEH - Module 5 : System Hacking
CEH - Module 5 : System Hacking
 
File000159
File000159File000159
File000159
 

Similar to File000153

A+ cheat sheet
A+ cheat sheetA+ cheat sheet
A+ cheat sheetabnmi
 
Output devices-of-computer-system
Output devices-of-computer-systemOutput devices-of-computer-system
Output devices-of-computer-systemparag dhok
 
Output Devices
Output Devices Output Devices
Output Devices MiXvideos
 
Computer presentation : Output Devices
Computer presentation : Output DevicesComputer presentation : Output Devices
Computer presentation : Output DevicesIBA, sukkur
 
Ink jet and thermal printers
Ink jet and thermal printersInk jet and thermal printers
Ink jet and thermal printersHarshita Ved
 
Output Devices.pptx
Output Devices.pptxOutput Devices.pptx
Output Devices.pptxSanthiNivas
 
Printer & scanner by sanyam s.saini (me regular)
Printer & scanner by sanyam s.saini (me regular)Printer & scanner by sanyam s.saini (me regular)
Printer & scanner by sanyam s.saini (me regular)Sanyam Singh
 
Devices that output Hardcopy
Devices that output HardcopyDevices that output Hardcopy
Devices that output HardcopyMaryam Fida
 
• Output Devices • Types of Output Devices • Dual Input– Output Devices
• Output Devices • Types of Output Devices • Dual Input– Output Devices• Output Devices • Types of Output Devices • Dual Input– Output Devices
• Output Devices • Types of Output Devices • Dual Input– Output DevicesThe University of Lahore
 
BAIT1003 Chapter 4
BAIT1003 Chapter 4BAIT1003 Chapter 4
BAIT1003 Chapter 4limsh
 
Output devices of Computer
Output devices of ComputerOutput devices of Computer
Output devices of ComputerImtiAz Karim
 

Similar to File000153 (20)

File000094
File000094File000094
File000094
 
A+ cheat sheet
A+ cheat sheetA+ cheat sheet
A+ cheat sheet
 
Output devices-of-computer-system
Output devices-of-computer-systemOutput devices-of-computer-system
Output devices-of-computer-system
 
Output Devices
Output Devices Output Devices
Output Devices
 
Computer presentation : Output Devices
Computer presentation : Output DevicesComputer presentation : Output Devices
Computer presentation : Output Devices
 
Ink jet and thermal printers
Ink jet and thermal printersInk jet and thermal printers
Ink jet and thermal printers
 
Output Devices.pptx
Output Devices.pptxOutput Devices.pptx
Output Devices.pptx
 
Concept modellers
Concept modellersConcept modellers
Concept modellers
 
Output
OutputOutput
Output
 
Dsar ti ke 4
Dsar ti ke 4Dsar ti ke 4
Dsar ti ke 4
 
Printer & scanner by sanyam s.saini (me regular)
Printer & scanner by sanyam s.saini (me regular)Printer & scanner by sanyam s.saini (me regular)
Printer & scanner by sanyam s.saini (me regular)
 
Input output device
Input output deviceInput output device
Input output device
 
Devices that output Hardcopy
Devices that output HardcopyDevices that output Hardcopy
Devices that output Hardcopy
 
printer
printerprinter
printer
 
• Output Devices • Types of Output Devices • Dual Input– Output Devices
• Output Devices • Types of Output Devices • Dual Input– Output Devices• Output Devices • Types of Output Devices • Dual Input– Output Devices
• Output Devices • Types of Output Devices • Dual Input– Output Devices
 
BAIT1003 Chapter 4
BAIT1003 Chapter 4BAIT1003 Chapter 4
BAIT1003 Chapter 4
 
Input output devices
Input output devicesInput output devices
Input output devices
 
Output devices of Computer
Output devices of ComputerOutput devices of Computer
Output devices of Computer
 
Output devices
Output devicesOutput devices
Output devices
 
Output Device.pptx
Output Device.pptxOutput Device.pptx
Output Device.pptx
 

More from Desmond Devendran (20)

Siam key-facts
Siam key-factsSiam key-facts
Siam key-facts
 
Siam foundation-process-guides
Siam foundation-process-guidesSiam foundation-process-guides
Siam foundation-process-guides
 
Siam foundation-body-of-knowledge
Siam foundation-body-of-knowledgeSiam foundation-body-of-knowledge
Siam foundation-body-of-knowledge
 
Enterprise service-management-essentials
Enterprise service-management-essentialsEnterprise service-management-essentials
Enterprise service-management-essentials
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
 
Diagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_enDiagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_en
 
CHFI 1
CHFI 1CHFI 1
CHFI 1
 
File000176
File000176File000176
File000176
 
File000175
File000175File000175
File000175
 
File000174
File000174File000174
File000174
 
File000173
File000173File000173
File000173
 
File000172
File000172File000172
File000172
 
File000171
File000171File000171
File000171
 
File000170
File000170File000170
File000170
 
File000169
File000169File000169
File000169
 
File000168
File000168File000168
File000168
 
File000167
File000167File000167
File000167
 
File000166
File000166File000166
File000166
 
File000165
File000165File000165
File000165
 
File000164
File000164File000164
File000164
 

Recently uploaded

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 

Recently uploaded (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 

File000153

  • 1. Module XL - Printer Forensics
  • 2. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News: Inkjet Research Could Aid Forensics Source: http://www.pcworld.com/
  • 3. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News: Particulate Emissions From Laser Printers Source: http://www.sciencedaily.com/
  • 4. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Objective • Introduction to Printer Forensics • Different Printing Modes • Methods of Image Creation • Printer Forensics Process • Digital Image Analysis • Document Examination • Phidelity • Cryptoglyph Digital Security Solutions • DocuColor Tracking Dot Decoding This module will familiarize you with:
  • 5. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow Introduction to Printer Forensics Printer Forensics Process Methods of Image Creation Cryptoglyph Digital Security Solutions Phidelity Document ExaminationDigital Image Analysis Different Printing Modes
  • 6. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Printer Forensics
  • 7. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Introduction to Printer Forensics Printer forensics refer to the investigation done on any printed document or the printer used to print the document Investigation of the documents and printers will provide valuable information of crime to the law enforcement agencies and intelligence agencies • Examples include forgery or alteration of documents used for purposes of identity, security, or recording transactions • Printed material may be used in the course of conducting illicit or terrorist activities In several cases, printed material is a direct accessory to criminal acts • Examples include instruction manuals, team rosters, meeting notes, and correspondence
  • 8. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Different Printing Modes • A monochrome printer can only produce an image consisting of one color, usually black Monochrome: • A color printer can produce images of multiple colors Color printer: • A photo printer is a color printer that can produce images that mimic the color range and resolution of photographic methods of printing Photo printer:
  • 9. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Methods of Image Creation • Toner based printers adhere toners to a light sensitive print drum • It uses static electricity to transfer the toner to the printing medium to which it is fused with heat and pressure • Different toner based printers are: • Laser printers uses precise lasers to cause adherence • LED printer uses an array of LEDs to cause toner adhesion Toner-based printers: • Inkjet printers spray small, precise amounts of ink onto the media Inkjet printers:
  • 10. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Methods of Image Creation (cont’d) • Impact printers rely on a forcible impact to transfer ink to the media, similar to typewriters, that are typically limited to the reproducing text • A daisy wheel printer is a specific type of impact printer where the type is molded around the edge of a wheel Impact printers: • Printers rely on a matrix of pixels, or dots, that together form the larger image • It is specifically used for impact printers that use a matrix of small pins to create precise dots • It can produce graphical images in addition to text Dot-matrix printers:
  • 11. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Methods of Image Creation (cont’d) Line printers print an entire line of text at a time The two principle designs of Line printers: • Drum printers: A drum carries the entire character set of the printer repeated in each column that is to be printed • Chain printers or train printers: The character set is arranged multiple times around a chain that travels horizontally past the print line
  • 12. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Methods of Image Creation (cont’d) • A digital minilab is a computer printer that uses traditional chemical photographic processes to make prints of digital images • Photographs are input to the digital minilab using a built-in film scanner that captures images from negative and positive photographic films Digital Minilab:
  • 13. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Methods of Image Creation (cont’d) • Dye-sublimation printer uses heat to transfer dye to the medium such as poster paper, plastic card, etc. • It lays one color at a time with the help of a ribbon which has color panels Dye-sublimation printer: • A spark printer uses a special paper coated with a layer of aluminum over a black backing, which is printed on by using a pulsing current onto the paper via two styli that move across on a moving belt at high speed Spark printer:
  • 14. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Printers with Toner Levels Make/Model Toner HP LaserJet 4300 72% HP LaserJet 4350 72% HP LaserJet 4350 72% Xerox Phaser 5500DN 94% Xerox Phaser 5500DN 31% Xerox Phaser 5500DN 60% Xerox Phaser 8550DP -
  • 15. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Parts of a Printer • A print head with a print head connector • A carriage with a carriage connector, which can detach the print head from the print head connector • A driver for driving the print head • A microprocessor for controlling the driver in accordance with an N-bit print head identification signal, wherein N is a positive integer • A plurality of signal lines for connecting the microprocessor to the carriage connector • A parallel-to-serial converter, which is disposed on the print head, for converting N parallel inputs into an N-bit print head identification signal A printer is comprised of:
  • 16. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Printer Identification Strategy • Passive strategy involves characterizing the printer by finding intrinsic features in the printed document that are characteristic of that particular printer, model, or manufacturer's products • This is referred as intrinsic signature Passive: • In active strategy, extrinsic signature is embedded in a printed page • The extrinsic signature is obtained by modulating the process parameters in the printer mechanism to encode identifying information such as the printer serial number and date of printing Active: Two strategies to identify a printer that was used to print a document:
  • 17. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Printer Identification Unknown Document Extra Characters Extra Features Variance/ Entropy GLCM Features SVM Classifier Majority Vote Output class Individual Characters Feature Vector per Character
  • 18. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Printer Forensics Process Pre-processing Printer Profile Forensics Ballistics
  • 19. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Pre-Processing A printed document is first digitally scanned and saved in an uncompressed format In the first stage, multiple copies of the same character are located in a scanned document A user first selects a bounding box around a character of interest to serve as a template To minimize the effect of luminance variations across printers, the intensity histograms of the characters are matched as follows: • Select a random set of characters and average their intensity histograms to create a reference histogram so that the luminance variations across printers is minimized • Each character’s intensity histogram is then matched to this reference histogram
  • 20. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Printer Profile Once the characters are aligned properly, a profile is constructed based on the degradation introduced by the printer Based on the complex nature of degradation, a data driven approach is used to characterize the degradation A principal components analysis is applied to the aligned characters to create a new linear basis that embodies the printer degradation
  • 21. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Forensics • Splicing in portions from a different document • Digitally editing a previously printed and scanned document and then printing the result In a forensics setting, determine if a part of the document has been manipulated:
  • 22. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Ballistics In a ballistics setting, determine if a document was printed from a specific printer A printer profile is generated from a printer to determine if the document in question was printed from this printer Assume that the printer profile is constructed from the same font family and size as the document to be analyzed
  • 23. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited A Clustering Result of a Printed Page HP LaserJet Xerox Phaser The printed page shows a clustered result of the HP LaserJet and Xerox Phaser The top part of the page is printed with HP LaserJet 4350 and the bottom half was printed on a Xerox Phaser 5500DN These documents are scanned, combined and printed on a HP LaserJet 4300 printer A printer profile was created from 200 copies of the letter ‘a’ Printer profile is effective in detecting fakes composed of parts initially printed on different printers
  • 24. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Digital Image Analysis Digital Image Analysis technique is used to analyze patterns generated in the printed document due to irregular movements by the print engine The irregular movement cause lines to be printed across a page instead of solid smooth print which is known as banding Banding effect has been attributed to two causes: • Fine banding is due to the imbalance of the rotor component of the polygon mirror or mechanical weaknesses of the laser scanning unit • Rough banding caused by unsteady motion of the photoconductor drum or the fuser unit This banding can be used to link a document to the printer that produced it
  • 25. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Printout Bins Printout Bins are a staging area after a document has been printed Each printout consists the information of the related project and the user who printed the document The bin consists of the information that uniquely identifies the user by name, PIN number, the user project number, and the date and/or time the printout was prepared, etc. The bin access is allowed only if: • Acceptable confidential user identification is presented • Atleast one printout for that user is presently contained in the locked bin
  • 26. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Document Examination • Find genuine or counterfeit of the document • Determine the way document is generated • Examine the machines used to print the document Printed documents can be examined to: • The paper type (physical properties, optical properties) • Security features of the paper (e.g. watermark) • Printing process used • Verifying of other digital evidence such as perforations • Microscopic analysis reveal tiny imperfections which links documents from one to another The various factors considered by the document examiner: Document examination is an important aspect in printer forensics to analyze the documents
  • 27. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Document Examination (cont’d) • The presence of physical alterations or obliterated writing can sometimes be determined, and the writing can sometimes be deciphered • The manufacturer can sometimes be determined if a watermark is present Altered or Obliterated Writing: • Paper examination - the letterheads and watermarks of business or personal stationery will be modified from time to time by the manufacturer • Typescript - comparison of typewritten documents produced by an organization over a period of time Examining date of document: The different aspects of examination:
  • 28. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Document Examination (cont’d) • Signature examinations generally involve the comparison of signatures which are specimen (provable) against questioned (disputed) signatures • In signature comparison, the features of the questioned signature(s) - construction, shape, proportions and fluency - are assessed and then compared with the same features in the specimen signatures Signature Examination • Spur marks are tool marks created by the spur gears in the paper conveyance system of many inkjet printers • The spur marks on the printed document is compared with the spur marks of known printers to know the relationship between them • The comparison of two spur marks is based on the characteristics: pitch and mutual distance Examining spur marks found on inkjet-printed documents
  • 29. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Services of a Document Examiner The document examiner examines the document for any alterations, counterfeiting of document, and substitutions The examiner conducts research related to the document • The research includes finding of comparable documents to verify authenticity, paper used, type of printer, etc. Examiner conducts tests on the documents to find the conclusions Examiner prepares a review based on the outcome of the tested documents
  • 30. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Tamper-Proofing of Electronic and Printed Text Documents Text document should be tamper-proofed and authenticated to distribute them in electronic or printed forms A text document authentication system aims at deciding whether a given text document is authentic or not Text document tamper-proofing system aims at verifying the authenticity of a text document and indicating the local modifications, if the document is suspected to be a fake
  • 31. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Tamper-Proofing of Electronic and Printed Text Documents (cont’d) There are three approaches to hash-based document authentication based on where the hash is stored: • Hash storage in an electronic database • Hash storage onto the document itself using auxiliary special means such as 2D bar codes, special inks or crystals, magnetic stripes, memory chips, etc. • Hash storage onto the document's content itself using data-hiding techniques
  • 32. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Phidelity Phidelity is a technology used to enhance the security of printed documents by providing layers of protection Phidelity's Optical Watermark makes innovative use of normal printers to print visual covert and overt watermarks It generates secure optical watermarks against various types of possible attacks while only using common desktop printers, eliminating the need of special inks or papers Phidelity's Microprint is the creative use of printer capabilities to print small fonts By printing important document information as Microprint, any casual copying of the original document will result in highly distorted text in the duplicates
  • 33. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Zebra Printer Labels to Fight Against Crime Law enforcement agencies rely on Zebra printer labels for accurate and confidential printing needs when collecting important criminal evidence Zebra printer labels help to identify criminal evidence more quickly with Zebra bar code printers The labels can also produce ID badges (both for criminals and law enforcement) and keep track of criminal records confidentially and safely
  • 34. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Cryptoglyph Digital Security Solution Cryptoglyph security process provides an invisible marking with standard ink and standard printing processes It can be easily integrated into any current packaging production line or any document processing workflow before printing Embed the invisible Cryptoglyph file in the prepress digital packaging image file or generate it before printing it with your document processing system Cryptoglyph requires no packaging design or any page template modification
  • 35. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Case Study: Dutch Track Counterfeits via Printer Serial Numbers Wilbert de Vries (WebWereld Netherlands) 26/10/2004 08:39:31 It appears that although consumers aren't aware of the hidden code on their color prints, government agencies are. And they are using this knowledge in their battle against counterfeiters -- with help from well-known printer manufacturers. Security Sources familiar with the printer industry confirm this built-in security is in fact a unique number that is printed on every color page. The code, in yellow, can be printed on a line as thin as 0.1 millimeter. With help from manufacturers like Canon, authorities can gather information about the printer used in counterfeit crimes. The number tells them in which country a specific printer has been delivered, and to what dealer. The dealer then can lead them to the local computer store where the printer was sold. Success "We are familiar with this research method," said Ed Kraszewski of the Dutch national police agency KLPD. "We are using it in our research and it has proven to be successful in the past." Even though the spokesman cannot detail what kind of successes or in what cases the agency is using this method now, anonymous sources confirm that the Dutch Railway Police, part of the KLPD, is investigating a gang that could be counterfeiting tickets on a large scale. As part of the research in this case, officers have tracked down the printer used to print the fake tickets. They are now trying to get the name of the person who bought the printer. A local distributor in the Netherlands was visited by two officers with specific questions about the printer. "Their research led them to our company," said the director of the big Dutch distributor, who wants to remain anonymous. "It concerned an investigation about counterfeit tickets. With the number they apparently found, they could see what engine was used. They knew exactly what printer was used and wanted to know to whom I had sold that specific printer." The company's records only revealed in what batch the printer had arrived. The police left the building with specific sales information about that batch, which contained about a hundred printers. The investigation is still running, according to a spokesman for the team investigating this matter.
  • 36. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Is Your Printer Spying On You? Imagine that every time you printed a document, it automatically included a secret code that could be used to identify the printer - and potentially, the person who used it In a purported effort to identify currency counterfeiters, the US government has succeeded in persuading some color laser printer manufacturers to encode each page with identifying information For a list of printers with this tracking capability, please visit: • http://www.eff.org/Privacy/printers/list.php
  • 37. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited DocuColor Tracking Dot Decoding The yellow dots are visible after the dot grid are magnified under 60x magnification
  • 38. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited DocuColor Tracking Dot Decoding (cont’d) A computer graphics software is used to overlay the black dots in the microscope image with a larger yellow dots for clear visibility
  • 39. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited DocuColor Tracking Dot Decoding (cont’d) The topmost row and the left column are the parity row and column for error correction It helps to verify the forensic information for correctness The rows and columns has odd parity
  • 40. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited DocuColor Tracking Dot Decoding (cont’d) Columns are read from top to bottom as a single byte of seven bits, the bytes are then read from right-to-left. Columns from left to right have the following meanings: 15 Unknown (often zero; constant for each individual printer; may convey some non-user-visible fact about the printer's model or configuration) 14, 13, 12, 11 Printer serial number in binary-coded-decimal, two digits per byte (constant for each individual printer; see below) 10 Separator (typically all ones; does not appear to code information) 9 Unused 8 Year that page was printed (without century; 2005 is coded as 5)
  • 41. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited DocuColor Tracking Dot Decoding (cont’d) Column are read from top to bottom as a single byte of seven bits, the bytes are then read from right-to-left. Columns from left to right have the following meanings: 7 Month that page was printed 6 Day that page was printed 5 Hour that page was printed (may be UTC time zone, or may be set inaccurately within printer) 4,3 Unused 2 Minute that page was printed 1 Row parity bit (set to guarantee an odd number of dots present per row)
  • 42. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Tools
  • 43. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Print Spooler Software Print Spooler prints the document to the intended printer when the printer is ready It allows system resources to perform other tasks, where Line Printer Requester (LPR) print spooler performs the printing process It sends the job to print queue for processing It manages the printing process Spooling prepared a file for printing, emailing, and sending to a device or system which is presently being occupied by other tasks
  • 44. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating Print Spooler For each print job on Windows XP, the files found in C:WindowsSystem32spoolPrinters folder are: • .SPL – the spool file consists of print job’s spool data • .SHD - shadow file consists of job settings To view the metadata of the print job use PA Spool View tool To view the spooled pages , use EMF Spool View tool Enhanced metafiles provide true device independence Enhanced metafiles are standardized, that allows pictures stored in this format to copy from one application to other Check the spool folder location of a specific printer by opening the registry key: • HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlPrintPrinters <printer>
  • 45. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Printer Tools iDetector is an effective tool to visually compare inspected documents and products with genuine ones Print Inspector lets you manage the print jobs queued to any shared printer and provides easy access to the printer and print server settings
  • 46. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Tool: EpsonNet Job Tracker http://www.business-solutions.epson.co.uk/ • Monitors and analyzes network printer activity • Controls access to color, keep costs down • Manages print resources, improves network traffic • Defines printer activity, calculates, assigns and recovers costs • Sends reports automatically to departments and managers • Controls by time of day, type of printing, number of pages Benefits of Epson NetJob Tracker: EpsonNet Job Tracker is a web-based application software It gives a clear picture of what is being printed, where and by whom, thereby helping you control your printing costs
  • 47. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Summary Printer forensics refers to the investigation done on any printed document or the printer used to print the document Investigation of the documents and printers will provide valuable information for the law enforcement agencies and intelligence agencies Different Printing Modes are Monochrome , Color Printer, and Photo printer Methods used for Image Creation are: Toner-based printers, Inkjet printers, Impact printers, Dot- matrix printers, Line printers, Digital Minilab, Dye-sublimation printer, and Spark printer A printed document is first digitally scanned and saved in an uncompressed format Method and system for identifying and facilitating access to computer printouts contained in an array of printout bins
  • 48. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 49. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited