Machine Identification Code

From Wikipedia, the free encyclopedia

Yellow dots on white paper, produced by color laser printer (enlarged, dot diameter about 0.1 mm)

A Machine Identification Code (MIC), also known as printer steganography, yellow dots, tracking dots or secret dots, is a digital watermark which certain color laser printers and copiers leave on every printed page, allowing identification of the device which was used to print a document and giving clues to the originator. Developed by Xerox and Canon in the mid-1980s, its existence became public only in 2004. In 2018, scientists developed privacy software to anonymize prints in order to support whistleblowers publishing their work.[1][2][3]

History[edit]

In the mid-1980s Xerox pioneered an encoding mechanism for a unique number represented by tiny dots spread over the entire print area. Xerox developed this machine identification code (MIC) "to assuage fears that their color copiers could be used to counterfeit bills"[4] and received U.S. Patent No 5515451 describing the use of the yellow dots to identify the source of a copied or printed document.[5][6]

The public first became aware of MIC in October 2004, when it was used by Dutch authorities to track counterfeiters who had used a Canon color laser printer.[7] In November 2004, PC World reported the machine identification code had been used for decades in some printers, allowing law enforcement to identify and track counterfeiters.[4] The Central Bank Counterfeit Deterrence Group (CBCDG) has denied that it developed the feature.[5]

The decoding process discovered by the EFF.

In 2005, the civil rights group Electronic Frontier Foundation (EFF) encouraged the public to send in sample printouts and subsequently decoded the pattern.[8] The pattern has been demonstrated on a wide range of printers from different manufacturers and models.[9] The EFF stated in 2015 that the documents that they previously received through the FOIA[10] suggested that all major manufacturers of color laser printers entered a secret agreement with governments to ensure that the output of those printers is forensically traceable.[11]

In 2007, the European Parliament was asked about the question of invasion of privacy.[12][5]

Technical aspects[edit]

Yellow dots produced by an HP Color LaserJet CP1515n

The pattern consists of a dot-matrix spread of yellow dots, which can barely be seen with the naked eye. The dots have a diameter of a tenth of a millimeter (0.004") and a spacing of about one millimeter (0.039"). Their arrangement encodes the serial number of the device, date and time of the printing, and is repeated several times across the printing area in case of errors. For example, if the code consists of 8 × 16 dots in a square or hexagonal pattern, it spreads over a surface of about 4 square centimetres (0.62 sq in) and appears on a sheet of size A4 paper about 150 times. Thus, it can be analyzed even if only fragments or excerpts are available. Some printers arrange yellow dots in seemingly random point clouds.

According to the Chaos Computer Club in 2005, color printers leave the code in a matrix of 32 × 16 dots and thus can store 64 bytes of data (64×8).[13]

As of 2011, Xerox was one of the few manufacturers to draw attention to the marked pages, stating in a product description, "The digital color printing system is equipped with an anti-counterfeit identification and banknote recognition system according to the requirements of numerous governments. Each copy shall be marked with a label which, if necessary, allows identification of the printing system with which it was created. This code is not visible under normal conditions."[14]

In 2018, scientists at the TU Dresden analyzed the patterns of 106 printer models from 18 manufacturers and found four different encoding schemes.[2]

Visibility[edit]

Yellow Dots: tiny yellow dots on the print-out representing the hidden code of an HP Color LaserJet 3700.

The Machine Identification Code can be made visible by printing or copying a page and subsequently scanning a small section with a high-resolution scanner. The yellow color channel can then be enhanced with an image processing program, to make any dots of the MIC clearly visible. Under good lighting conditions, a magnifying glass may be enough to see the pattern. Under UV-light the yellow dots are clearly recognizable.[15]

Machine Identification Code (MIC, yellow dots, tracking dots, secret dots) under UV-light in regular (red and blue markings) and irregular arrangement (green).

Using this steganographic process, high-quality copies of an original (e.g. a bank note) under blue light can be made identifiable. Using this process, even shredded prints can be identified: the 2011 "Shredder Challenge" initiated by the DARPA was solved by a team called "All Your Shreds Are Belong To U.S." consisting of Otavio Good and two colleagues.[16][17]

Practical application[edit]

Both journalists and security experts have suggested that The Intercept's handling of the leaks by whistleblower Reality Winner, which included publishing secret NSA documents unredacted and including the printer tracking dots, was used to identify Winner as the leaker, leading to her arrest in 2017 and conviction.[18][19]

Protection of privacy and circumvention[edit]

Copies or printouts of documents with confidential personal information, for example health care information, account statements, tax declaration or balance sheets, can be traced to the owner of the printer and the inception date of the documents can be revealed. This traceability is unknown to many users and inaccessible, as manufacturers do not publicize the code that produces these patterns. It is unclear which data may be unintentionally passed on with a copy or printout. In particular, there are no mentions of the technique in the support materials of most affected printers. In 2005 the Electronic Frontier Foundation (EFF) sought a decoding method and made available a Python script for analysis.[20]

In 2018, scientists from TU Dresden developed and published a tool to extract and analyze the steganographic codes of a given color printer and subsequently to anonymize prints from that printer. The anonymization works by printing additional yellow dots on top of the Machine Identification Code.[1][2][3] The scientists made the software available to support whistleblowers in their efforts to publicize grievances.[21]

Comparable processes[edit]

Other methods of identification are not as easily recognizable as yellow dots. For example, a modulation of laser intensity and a variation of shades of grey in texts are already feasible. As of 2006, it was unknown whether manufacturers were also using these techniques.[22]

See also[edit]

References[edit]

  1. ^ a b DEDA - tracking Dots Extraction, Decoding and Anonymisation toolkit: deda on GitHub
  2. ^ a b c Richter, Timo; Escher, Stephan; Schönfeld, Dagmar; Strufe, Thorsten (June 14, 2018). "Forensic Analysis and Anonymisation of Printed Documents". Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security. ACM. pp. 127–138. doi:10.1145/3206004.3206019. ISBN 9781450356251. S2CID 49345609.
  3. ^ a b "Dresdner Forscher überlisten Tracking-Punkte bei Laserdruckern". heise online (in German). June 25, 2018.
  4. ^ a b Tuohey, Jason (November 22, 2004). "Government Uses Color Laser Printer Technology to Track Documents". PC World. Archived from the original on August 8, 2019. Retrieved December 3, 2019.
  5. ^ a b c Escher, Stephan (June 28, 2018). "Tracking Dots unlesbar machen: Interview mit Uli Blumenthal". Deutschlandfunk (in German).
  6. ^ US5515451A, Tsuji, Masato; Seki, Masao & Leng, Svay et al., "Image processing system for selectively reproducing documents", issued 1996-05-07 
  7. ^ de Vries, Wilbert (October 26, 2004). "Dutch track counterfeits via printer serial numbers". PC World. Archived from the original on June 24, 2009.
  8. ^ "DocuColor Tracking Dot Decoding Guide". Electronic Frontier Foundation. 2005. Archived from the original on March 5, 2018. Retrieved July 5, 2018.
  9. ^ "Electronic Frontier Foundation". Electronic Frontier Foundation. Archived from the original on June 29, 2010. Retrieved June 9, 2017.
  10. ^ Lee, Robert (July 27, 2005). "Freedom of Information Act (FOIA) request" (PDF). Letter to Latita M. Huff. Electronic Frontier Foundation. Retrieved November 7, 2016.
  11. ^ "List of Printers Which Do or Do Not Display Tracking Dots". Electronic Frontier Foundation. September 20, 2007. Retrieved December 10, 2018.
  12. ^ "Tracking codes in photocopiers and colour laser printers". Parliamentary questions. European Parliament. November 20, 2007.
  13. ^ Frank Rosengart (2005). "Datenspur Papier" (PDF). Die Datenschleuder, Das wissenschaftliche Fachblatt für Datenreisende [technical factsheet]. Hamburg: Chaos Computer Club. pp. 19–21. ISSN 0930-1054. Retrieved February 27, 2011. {{cite book}}: |journal= ignored (help)
  14. ^ "Abschnitt „Technische Daten des Digitalen Farbdrucksystems Xerox DocuColor 6060"" (PDF; 1,4 MB). Xerox DocuColor® 6060 Digitales Farbdrucksystem (Prospectus). Neuss: Xerox GmbH. p. 8. Retrieved February 27, 2011.
  15. ^ "Beitrag bei Druckerchannel: Big Brother is watching you: Code bei Farblasern entschlüsselt". Druckerchannel.de. October 26, 2005.
  16. ^ "CONGRATULATIONS to "All Your Shreds Are Belong To U.S."!". Defense Advanced Research Projects Agency. November 21, 2011. Archived from the original on August 25, 2016. Retrieved June 12, 2014.
  17. ^ "Tip for Bad Guys: Burn, Don't Shred". Bloomberg Businessweek. December 15, 2011. Retrieved June 12, 2014.
  18. ^ Anderson, L.V. (June 6, 2017). "Did The Intercept Betray Its NSA Source With Sloppy Reporting?". Digg. Archived from the original on January 1, 2019.
  19. ^ Wemple, Erik (June 6, 2017). "Did the Intercept bungle the NSA leak?". The Washington Post. Archived from the original on July 13, 2018.
  20. ^ "docucolor.cgi - CGI script to interpret Xerox DocuColor forensic dot pattern". Electronic Frontier Foundation. 2005. Archived from the original on May 8, 2017. Retrieved October 3, 2018.
  21. ^ "So verpfeift dich dein Drucker nicht". Deutschlandfunk Nova (in German). June 26, 2018.
  22. ^ Printer Characterization and Signature Embedding for Security and Forensic Applications Pei-Ju Chiang, Aravind K. Mikkilineni, Sungjoo Suh, Jan P. Allebach, George T.-C. Chiu, Edward J. Delp., Purdue University, 2006 (poster)

External links[edit]