Joshi et al., 2017 - Google Patents
Source classification using document images from smartphones and flatbed scannersJoshi et al., 2017
- Document ID
- 5925491881539031153
- Author
- Joshi S
- Gupta G
- Khanna N
- Publication year
- Publication venue
- National Conference on Computer Vision, Pattern Recognition, Image Processing, and Graphics
External Links
Snippet
With technological advancements, digital scans of printed documents are increasingly used in many systems in place of the original hard copy documents. This convenience to use digital scans comes at increased risk of potentially fraudulent and criminal activities due to …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
- G06K9/52—Extraction of features or characteristics of the image by deriving mathematical or geometrical properties from the whole image
- G06K9/527—Scale-space domain transformation, e.g. with wavelet analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/38—Quantising the analogue image signal, e.g. histogram thresholding for discrimination between background and foreground patterns
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
- G06K9/32—Aligning or centering of the image pick-up or image-field
- G06K9/3233—Determination of region of interest
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
- G06K9/2054—Selective acquisition/locating/processing of specific regions, e.g. highlighted text, fiducial marks, predetermined fields, document type identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00442—Document analysis and understanding; Document recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30244—Information retrieval; Database structures therefor; File system structures therefor in image databases
- G06F17/30247—Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K2209/00—Indexing scheme relating to methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/40—Picture signal circuits
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Meena et al. | Image forgery detection: survey and future directions | |
Goel et al. | Dual branch convolutional neural network for copy move forgery detection | |
Joshi et al. | Single classifier-based passive system for source printer classification using local texture features | |
Ferreira et al. | Data-driven feature characterization techniques for laser printer attribution | |
Ferreira et al. | Laser printer attribution: Exploring new features and beyond | |
Shang et al. | Detecting documents forged by printing and copying | |
Khanna et al. | A survey of forensic characterization methods for physical devices | |
Mishra et al. | Region duplication forgery detection technique based on SURF and HAC | |
US9311531B2 (en) | Systems and methods for classifying objects in digital images captured using mobile devices | |
Jain et al. | Passive classification of source printer using text-line-level geometric distortion signatures from scanned images of printed documents | |
Choi et al. | Color laser printer forensic based on noisy feature and support vector machine classifier | |
Kumar et al. | A computational approach for printed document forensics using SURF and ORB features. | |
Joshi et al. | Source printer classification using printer specific local texture descriptor | |
Tsai et al. | Digital forensics of printed source identification for Chinese characters | |
Micenková et al. | Stamp verification for automated document authentication | |
Tsai et al. | Digital forensics of microscopic images for printed source identification | |
Zenati et al. | A new digital steganography system based on hiding online signature within document image data in YUV color space | |
US10867170B2 (en) | System and method of identifying an image containing an identification document | |
Joshi et al. | Source classification using document images from smartphones and flatbed scanners | |
Bibi et al. | Document forgery detection using source printer identification: A comparative study of text‐dependent versus text‐independent analysis | |
Sukhija et al. | Document forgery detection: a comprehensive review | |
Cu et al. | A robust watermarking approach for security issue of binary documents using fully convolutional networks | |
Joshi et al. | Source printer identification from document images acquired using smartphone | |
Wang et al. | Anti-counterfeiting textured pattern | |
Taran et al. | Mobile authentication of copy detection patterns |