
www.rsisinternational.org
INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XV, Issue IV, April 2026
Table 4. Comparison performance of the proposed method.
CONCLUSION
This research presented a CNN-based approach for identifying laser printer models using printed character
images. The experimental results demonstrate that the CNN model can effectively capture intrinsic printer
signatures, such as texture patterns and toner distribution characteristics, and classify printers with high accuracy.
The proposed method enhances forensic document authentication by providing an automated and reliable system
for identifying the source printer of a document. For future work, the study can be extended by including inkjet
and dot-matrix printers, utilizing word-level and line-level features, and increasing the dataset size to improve
model generalization. In addition, advanced transfer learning models such as ResNet and VGG can be applied
to further improve performance, while efforts can be made to reduce computational complexity for faster
processing. Overall, CNN-based printer identification systems can assist forensic experts in efficiently detecting
forged documents and determining document ownership, making them valuable tools in the field of digital
forensics.
REFERENCES
1. Hilton, O. (1992). Scientific examination of questioned documents. CRC press.
2. Schreyer, M., Schulze, C., Stahl, A., &Effelsberg, W. (2009, March). Intelligent Printing Technique
Recognition and Photocopy Detection for Forensic Document Examination. In Informatiktage (Vol. 8,
pp. 39-42).
3. Elkasrawi, S., &Shafait, F. (2014, April). Printer identification using supervised learning for document
forgery detection. In 2014 11th IAPR International Workshop on Document Analysis Systems (pp. 146
150). IEEE.
4. Tsai, M. J., & Liu, J. (2013, May). Digital forensics for printed source identification. In 2013 IEEE
International Symposium on Circuits and Systems (ISCAS) (pp. 2347-2350). IEEE.
5. Lampert, C. H., Mei, L., &Breuel, T. M. (2006, November). Printing technique classification for
document counterfeit detection. In 2006 International Conference on Computational Intelligence and
Security (Vol. 1, pp. 639-644). IEEE.
6. Mikkilineni, A. K., Arslan, O., Chiang, P. J., Kumontoy, R. M., Allebach, J. P., Chiu, G. T. C., &Delp,
E. J. (2005, January). Printer forensics using svm techniques. In NIP & Digital Fabrication Conference
(Vol. 2005, No. 1, pp. 223-226). Society for Imaging Science and Technology.
7. Wu, Y., Kong, X., & Guo, Y. (2009, November). Printer forensics based on page document's geometric
distortion. In 2009 16th IEEE International Conference on Image Processing (ICIP) (pp. 2909-2912).
IEEE.
8. Ferreira, A., Bondi, L., Baroffio, L., Bestagini, P., Huang, J., Dos Santos, J. A., ... & Rocha, A. (2017).
Data-driven feature characterization techniques for laser printer attribution. IEEE Transactions on
Information Forensics and Security, 12(8), 1860-1873.
9. Jain, H., Joshi, S., Gupta, G., & Khanna, N. (2020). Passive classification of source printer using text
line-level geometric distortion signatures from scanned images of printed documents. Multimedia Tools
and Applications, 79(11), 7377-7400.
10. Shang, S., Memon, N., & Kong, X. (2014). Detecting documents forged by printing and copying.
EURASIP Journal on Advances in Signal Processing, 2014(1), 1-13.