• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar

DigiBanker

Bringing you cutting-edge new technologies and disruptive financial innovations.

  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In
  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In

New technique for detecting tampering in PDF documents uses Python to generate hashes and access intricate PDF structures such as metadata and images, embedding them as hidden key in the relevant file’s page objects

July 9, 2025 //  by Finnovate

Researchers from the University of Pretoria have developed a new technique for detecting tampering in PDF documents by analyzing the file’s page objects. The new prototype uses Python to detect changes to a PDF document, such as text, images, or metadata. PDFs are increasingly used in various industries and are a target for criminals who want to affect contracts or aid in misinformation. Current techniques for detecting changes in PDFs rely on watermarking and hashing, which can only detect visible parts of a PDF. However, these methods do not analyze hidden elements like metadata or background data, making it difficult to identify exactly where or what was changed. The new prototype uses the hashlib, Merkly, and PDFRW libraries to generate hashes and access intricate PDF structures. It performs two primary functions: protecting a PDF and assessing a PDF for forgery. To protect a PDF, the prototype reads the PDF document and calculates unique digital fingerprints, known as hashes, from various elements. These hashes are secretly embedded as new, hidden keys into the relevant file page object and the PDF’s main “root” object. The PDF tampering prototype works well with Adobe Acrobat, but it does not yet detect all possible PDF changes, such as altering a document’s font without changing the actual content or adding JavaScript code.

Read Article

Category: Innovation Topics, User Interface

Previous Post: « Naext’s indoor spatial computing enables people with visual impairments to navigate large-scale, complex buildings independently through smartphones and smart glasses
Next Post: Truv, a provider income, employment, and asset verification solutions integrates with Blue Sage Solutions, a cloud-based digital lending platform for mortgage originators; of direct-to-source verification improves processing turn times and reduces time to close »

Copyright © 2025 Finnovate Research · All Rights Reserved · Privacy Policy
Finnovate Research · Knyvett House · Watermans Business Park · The Causeway Staines · TW18 3BA · United Kingdom · About · Contact Us · Tel: +44-20-3070-0188

We use cookies to provide the best website experience for you. If you continue to use this site we will assume that you are happy with it.