Amjed et al., 2021 - Google Patents
Approaches for forgery detection of documents in digital forensics: A reviewAmjed et al., 2021
- Document ID
- 16464090861300688066
- Author
- Amjed A
- Mahmood B
- Almukhtar K
- Publication year
- Publication venue
- International conference on emerging technology trends in internet of things and computing
External Links
Snippet
The current technological era is witnessing a great revolution in the development of online applications. They are used for a variety of purposes when it comes to processing documents. A vast amount of online software applications is currently available for …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
- G06K9/2018—Identifying/ignoring parts by sensing at different wavelengths
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00127—Acquiring and recognising microscopic objects, e.g. biological cells and cellular parts
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
- G07D7/06—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency using wave or particle radiation, e.g. radiating waves onto the banknote
- G07D7/12—Visible light, infra-red or ultra violet radiation
- G07D7/122—Spectral properties
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
- G07D7/20—Testing patterns thereon, e.g. recognition of patterns, image processing, comparing to a reference in a memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K2209/00—Indexing scheme relating to methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
- G06F17/30799—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/10—Image acquisition modality
- G06T2207/10024—Color image
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Qureshi et al. | Hyperspectral document image processing: Applications, challenges and future prospects | |
Abdelmounaime et al. | New Brodatz‐Based Image Databases for Grayscale Color and Multiband Texture Analysis | |
Polak et al. | Hyperspectral imaging combined with data classification techniques as an aid for artwork authentication | |
Khan et al. | Automated forgery detection in multispectral document images using fuzzy clustering | |
Khan et al. | Hyperspectral imaging for ink mismatch detection | |
Venkatesh et al. | Morphed face detection based on deep color residual noise | |
Abbas et al. | Towards automated ink mismatch detection in hyperspectral document images | |
Pereira et al. | Projection pursuit and PCA associated with near and middle infrared hyperspectral images to investigate forensic cases of fraudulent documents | |
Amjed et al. | Approaches for forgery detection of documents in digital forensics: A review | |
Gorai et al. | Document fraud detection by ink analysis using texture features and histogram matching | |
Pasquini et al. | Trembling triggers: exploring the sensitivity of backdoors in DNN-based face recognition | |
Lotter et al. | Identifying plastics with photoluminescence spectroscopy and machine learning | |
Wang et al. | Anti-counterfeiting textured pattern | |
Jia et al. | Face morphing attack detection based on high-frequency features and progressive enhancement learning | |
Lamsal et al. | Counterfeit paper banknote identification based on color and texture | |
Tyagi et al. | Forged document detection and writer identification through unsupervised deep learning approach | |
Nasir et al. | A hyperspectral unmixing approach for ink mismatch detection in unbalanced clusters | |
Lee et al. | Classification algorithm using halftone features of counterfeit bills and CNN | |
Dansena et al. | Pen ink discrimination in handwritten documents using statistical and motif texture analysis: A classification based approach | |
Rastogi et al. | Detecting document forgery using hyperspectral imaging and machine learning | |
Carrière et al. | Beyond Human Forgeries: An Investigation into Detecting Diffusion-Generated Handwriting | |
Peng et al. | POSTER: non-intrusive face spoofing detection based on guided filtering and image quality analysis | |
Lubna et al. | Detecting Fake Image: A Review for Stopping Image Manipulation | |
Amged et al. | A Spectroscopy-Network-Based Method for Forgery Detection of Documents | |
Mengi et al. | S p S i S b: The Technique to Identify Forgery in Legal Handwritten Documents |