Serveur d'exploration sur les relations entre la France et l'Australie

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Photograph Signatures for the Protection of Identification Documents

Identifieur interne : 001A84 ( Istex/Corpus ); précédent : 001A83; suivant : 001A85

Photograph Signatures for the Protection of Identification Documents

Auteurs : Bruno Bellamy ; John S. Mason ; Michael Ellis

Source :

RBID : ISTEX:8E0FE04B9611C159FD52364ABF7DC7869D225BBC

English descriptors

Abstract

Abstract: This paper investigates a photo-signature approach to protecting personal identification documents such as passports. The approach is based on that described in a recent publication by O’Gorman and Rabinovich [1] which uses encoded data derived from comparisons of image sub-blocks across the photograph of the document. The encoded data is generated and stored at the time of document creation, and used subsequently to test document authenticity. Here we report on experiments which corroborate the fundamental findings of [1], namely that it is possible to usefully encode the photograph information in only tens of bytes of data. Furthermore we show that new block structures can improve the efficiency of the encoded data. This is important since the encoding efficiency, measured in terms of number of bytes versus discriminating performance, is particularly important when storing data on a small document such as a passport or ID card. We show that a step structure is measurably better than the original octal structure used in [1] when there are only a small number of bytes (20 to 30) in the photo-signature.

Url:
DOI: 10.1007/3-540-46665-7_13

Links to Exploration step

ISTEX:8E0FE04B9611C159FD52364ABF7DC7869D225BBC

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Photograph Signatures for the Protection of Identification Documents</title>
<author>
<name sortKey="Bellamy, Bruno" sort="Bellamy, Bruno" uniqKey="Bellamy B" first="Bruno" last="Bellamy">Bruno Bellamy</name>
<affiliation>
<mods:affiliation>ENIB, Brest, France</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Mason, John S" sort="Mason, John S" uniqKey="Mason J" first="John S." last="Mason">John S. Mason</name>
<affiliation>
<mods:affiliation>Department of Electrical & Electronic Engineering, University of Wales Swansea, SA2 8PP, UK</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: J.S.D.Mason@swansea.ac.uk</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Ellis, Michael" sort="Ellis, Michael" uniqKey="Ellis M" first="Michael" last="Ellis">Michael Ellis</name>
<affiliation>
<mods:affiliation>Dynjab Technologies, Canberra, Australia</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:8E0FE04B9611C159FD52364ABF7DC7869D225BBC</idno>
<date when="1999" year="1999">1999</date>
<idno type="doi">10.1007/3-540-46665-7_13</idno>
<idno type="url">https://api.istex.fr/document/8E0FE04B9611C159FD52364ABF7DC7869D225BBC/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">001A84</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">001A84</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Photograph Signatures for the Protection of Identification Documents</title>
<author>
<name sortKey="Bellamy, Bruno" sort="Bellamy, Bruno" uniqKey="Bellamy B" first="Bruno" last="Bellamy">Bruno Bellamy</name>
<affiliation>
<mods:affiliation>ENIB, Brest, France</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Mason, John S" sort="Mason, John S" uniqKey="Mason J" first="John S." last="Mason">John S. Mason</name>
<affiliation>
<mods:affiliation>Department of Electrical & Electronic Engineering, University of Wales Swansea, SA2 8PP, UK</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: J.S.D.Mason@swansea.ac.uk</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Ellis, Michael" sort="Ellis, Michael" uniqKey="Ellis M" first="Michael" last="Ellis">Michael Ellis</name>
<affiliation>
<mods:affiliation>Dynjab Technologies, Canberra, Australia</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>1999</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>Algorithm</term>
<term>Bellamy</term>
<term>Block separation distance</term>
<term>Border control</term>
<term>Bruno</term>
<term>Bruno bellamy</term>
<term>Byte</term>
<term>Byte signature</term>
<term>Centre</term>
<term>Coding</term>
<term>Counterfeiter</term>
<term>Elli</term>
<term>Encoding</term>
<term>Encoding algorithm</term>
<term>Experimental results</term>
<term>Good discrimination</term>
<term>Good results</term>
<term>Grid</term>
<term>Grid centre</term>
<term>International border control</term>
<term>Michael ellis</term>
<term>Octal</term>
<term>Octal case</term>
<term>Octal coding</term>
<term>Octal coding structure</term>
<term>Octal form</term>
<term>Passport</term>
<term>Photograph signatures</term>
<term>Pixel</term>
<term>Rabinovich</term>
<term>Resolution levels</term>
<term>Signature</term>
<term>Spare capacity</term>
<term>Step structure</term>
</keywords>
<keywords scheme="Teeft" xml:lang="en">
<term>Algorithm</term>
<term>Bellamy</term>
<term>Block separation distance</term>
<term>Border control</term>
<term>Bruno</term>
<term>Bruno bellamy</term>
<term>Byte</term>
<term>Byte signature</term>
<term>Centre</term>
<term>Coding</term>
<term>Counterfeiter</term>
<term>Elli</term>
<term>Encoding</term>
<term>Encoding algorithm</term>
<term>Experimental results</term>
<term>Good discrimination</term>
<term>Good results</term>
<term>Grid</term>
<term>Grid centre</term>
<term>International border control</term>
<term>Michael ellis</term>
<term>Octal</term>
<term>Octal case</term>
<term>Octal coding</term>
<term>Octal coding structure</term>
<term>Octal form</term>
<term>Passport</term>
<term>Photograph signatures</term>
<term>Pixel</term>
<term>Rabinovich</term>
<term>Resolution levels</term>
<term>Signature</term>
<term>Spare capacity</term>
<term>Step structure</term>
</keywords>
</textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: This paper investigates a photo-signature approach to protecting personal identification documents such as passports. The approach is based on that described in a recent publication by O’Gorman and Rabinovich [1] which uses encoded data derived from comparisons of image sub-blocks across the photograph of the document. The encoded data is generated and stored at the time of document creation, and used subsequently to test document authenticity. Here we report on experiments which corroborate the fundamental findings of [1], namely that it is possible to usefully encode the photograph information in only tens of bytes of data. Furthermore we show that new block structures can improve the efficiency of the encoded data. This is important since the encoding efficiency, measured in terms of number of bytes versus discriminating performance, is particularly important when storing data on a small document such as a passport or ID card. We show that a step structure is measurably better than the original octal structure used in [1] when there are only a small number of bytes (20 to 30) in the photo-signature.</div>
</front>
</TEI>
<istex>
<corpusName>springer</corpusName>
<keywords>
<teeft>
<json:string>byte</json:string>
<json:string>octal</json:string>
<json:string>encoding</json:string>
<json:string>pixel</json:string>
<json:string>grid</json:string>
<json:string>counterfeiter</json:string>
<json:string>bruno bellamy</json:string>
<json:string>rabinovich</json:string>
<json:string>elli</json:string>
<json:string>michael ellis</json:string>
<json:string>photograph signatures</json:string>
<json:string>octal coding</json:string>
<json:string>step structure</json:string>
<json:string>grid centre</json:string>
<json:string>bruno</json:string>
<json:string>bellamy</json:string>
<json:string>coding</json:string>
<json:string>passport</json:string>
<json:string>encoding algorithm</json:string>
<json:string>international border control</json:string>
<json:string>spare capacity</json:string>
<json:string>good discrimination</json:string>
<json:string>resolution levels</json:string>
<json:string>border control</json:string>
<json:string>block separation distance</json:string>
<json:string>experimental results</json:string>
<json:string>octal coding structure</json:string>
<json:string>byte signature</json:string>
<json:string>good results</json:string>
<json:string>octal form</json:string>
<json:string>octal case</json:string>
<json:string>centre</json:string>
<json:string>algorithm</json:string>
<json:string>signature</json:string>
</teeft>
</keywords>
<author>
<json:item>
<name>Bruno Bellamy</name>
<affiliations>
<json:string>ENIB, Brest, France</json:string>
</affiliations>
</json:item>
<json:item>
<name>John S. Mason</name>
<affiliations>
<json:string>Department of Electrical & Electronic Engineering, University of Wales Swansea, SA2 8PP, UK</json:string>
<json:string>E-mail: J.S.D.Mason@swansea.ac.uk</json:string>
</affiliations>
</json:item>
<json:item>
<name>Michael Ellis</name>
<affiliations>
<json:string>Dynjab Technologies, Canberra, Australia</json:string>
</affiliations>
</json:item>
</author>
<arkIstex>ark:/67375/1BB-KCB11SZ4-1</arkIstex>
<language>
<json:string>eng</json:string>
</language>
<originalGenre>
<json:string>OriginalPaper</json:string>
</originalGenre>
<abstract>Abstract: This paper investigates a photo-signature approach to protecting personal identification documents such as passports. The approach is based on that described in a recent publication by O’Gorman and Rabinovich [1] which uses encoded data derived from comparisons of image sub-blocks across the photograph of the document. The encoded data is generated and stored at the time of document creation, and used subsequently to test document authenticity. Here we report on experiments which corroborate the fundamental findings of [1], namely that it is possible to usefully encode the photograph information in only tens of bytes of data. Furthermore we show that new block structures can improve the efficiency of the encoded data. This is important since the encoding efficiency, measured in terms of number of bytes versus discriminating performance, is particularly important when storing data on a small document such as a passport or ID card. We show that a step structure is measurably better than the original octal structure used in [1] when there are only a small number of bytes (20 to 30) in the photo-signature.</abstract>
<qualityIndicators>
<score>6.603</score>
<pdfWordCount>2467</pdfWordCount>
<pdfCharCount>14949</pdfCharCount>
<pdfVersion>1.3</pdfVersion>
<pdfPageCount>10</pdfPageCount>
<pdfPageSize>431 x 666 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<abstractWordCount>178</abstractWordCount>
<abstractCharCount>1129</abstractCharCount>
<keywordCount>0</keywordCount>
</qualityIndicators>
<title>Photograph Signatures for the Protection of Identification Documents</title>
<chapterId>
<json:string>13</json:string>
<json:string>Chap13</json:string>
</chapterId>
<genre>
<json:string>conference</json:string>
</genre>
<serie>
<title>Lecture Notes in Computer Science</title>
<language>
<json:string>unknown</json:string>
</language>
<copyrightDate>1999</copyrightDate>
<issn>
<json:string>0302-9743</json:string>
</issn>
<editor>
<json:item>
<name>G. Goos</name>
<affiliations>
<json:string>Karlsruhe University, Germany</json:string>
</affiliations>
</json:item>
<json:item>
<name>J. Hartmanis</name>
<affiliations>
<json:string>Cornell University, NY, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>J. van Leeuwen</name>
<affiliations>
<json:string>Utrecht University, The Netherlands</json:string>
</affiliations>
</json:item>
</editor>
</serie>
<host>
<title>Cryptography and Coding</title>
<language>
<json:string>unknown</json:string>
</language>
<copyrightDate>1999</copyrightDate>
<doi>
<json:string>10.1007/3-540-46665-7</json:string>
</doi>
<issn>
<json:string>0302-9743</json:string>
</issn>
<eisbn>
<json:string>978-3-540-46665-9</json:string>
</eisbn>
<bookId>
<json:string>3-540-46665-7</json:string>
</bookId>
<isbn>
<json:string>978-3-540-66887-9</json:string>
</isbn>
<volume>1746</volume>
<pages>
<first>119</first>
<last>128</last>
</pages>
<genre>
<json:string>book-series</json:string>
</genre>
<editor>
<json:item>
<name>Michael Walker</name>
<affiliations>
<json:string>Vodafone Limited, The Courtyard, 2-4 London Road Newbury, RG14 1JX, Berkshire, UK</json:string>
<json:string>E-mail: mike.walker@vf.vodafone.co.uk</json:string>
</affiliations>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Data Encryption</value>
</json:item>
<json:item>
<value>Coding and Information Theory</value>
</json:item>
<json:item>
<value>Discrete Mathematics in Computer Science</value>
</json:item>
<json:item>
<value>Computer Communication Networks</value>
</json:item>
</subject>
</host>
<namedEntities>
<unitex>
<date>
<json:string>1999</json:string>
</date>
<geogName></geogName>
<orgName>
<json:string>Dynjab Technologies, Canberra</json:string>
<json:string>University of Wales Swansea</json:string>
</orgName>
<orgName_funder></orgName_funder>
<orgName_provider></orgName_provider>
<persName>
<json:string>John S. Mason</json:string>
<json:string>J.S.D.Mason</json:string>
<json:string>Bruno Bellamy</json:string>
<json:string>O’Gorman</json:string>
<json:string>The</json:string>
<json:string>Ellis Given</json:string>
<json:string>Michael Ellis</json:string>
<json:string>M. Walker</json:string>
<json:string>Ellis Fig</json:string>
<json:string>Rabinovich</json:string>
</persName>
<placeName>
<json:string>Heidelberg</json:string>
<json:string>UK</json:string>
</placeName>
<ref_url></ref_url>
<ref_bibl>
<json:string>[1]</json:string>
</ref_bibl>
<bibl></bibl>
</unitex>
</namedEntities>
<ark>
<json:string>ark:/67375/1BB-KCB11SZ4-1</json:string>
</ark>
<categories>
<inist>
<json:string>1 - sciences appliquees, technologies et medecines</json:string>
<json:string>2 - sciences biologiques et medicales</json:string>
<json:string>3 - sciences biologiques fondamentales et appliquees. psychologie</json:string>
<json:string>4 - agronomie. sciences du sol et productions vegetales</json:string>
</inist>
</categories>
<publicationDate>1999</publicationDate>
<copyrightDate>1999</copyrightDate>
<doi>
<json:string>10.1007/3-540-46665-7_13</json:string>
</doi>
<id>8E0FE04B9611C159FD52364ABF7DC7869D225BBC</id>
<score>1</score>
<fulltext>
<json:item>
<extension>pdf</extension>
<original>true</original>
<mimetype>application/pdf</mimetype>
<uri>https://api.istex.fr/document/8E0FE04B9611C159FD52364ABF7DC7869D225BBC/fulltext/pdf</uri>
</json:item>
<json:item>
<extension>zip</extension>
<original>false</original>
<mimetype>application/zip</mimetype>
<uri>https://api.istex.fr/document/8E0FE04B9611C159FD52364ABF7DC7869D225BBC/fulltext/zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/document/8E0FE04B9611C159FD52364ABF7DC7869D225BBC/fulltext/tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Photograph Signatures for the Protection of Identification Documents</title>
<respStmt>
<resp>Références bibliographiques récupérées via GROBID</resp>
<name resp="ISTEX-API">ISTEX-API (INIST-CNRS)</name>
</respStmt>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<publisher scheme="https://publisher-list.data.istex.fr">Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<availability>
<licence>
<p>Springer-Verlag Berlin Heidelberg, 1999</p>
</licence>
<p scheme="https://loaded-corpus.data.istex.fr/ark:/67375/XBH-3XSW68JL-F">springer</p>
</availability>
<date>1999</date>
</publicationStmt>
<notesStmt>
<note type="conference" scheme="https://content-type.data.istex.fr/ark:/67375/XTP-BFHXPBJJ-3">conference</note>
<note type="book-series" scheme="https://publication-type.data.istex.fr/ark:/67375/JMC-0G6R5W5T-Z">book-series</note>
</notesStmt>
<sourceDesc>
<biblStruct type="inbook">
<analytic>
<title level="a" type="main" xml:lang="en">Photograph Signatures for the Protection of Identification Documents</title>
<author xml:id="author-0000">
<persName>
<forename type="first">Bruno</forename>
<surname>Bellamy</surname>
</persName>
<affiliation>ENIB, Brest, France</affiliation>
</author>
<author xml:id="author-0001">
<persName>
<forename type="first">John</forename>
<surname>Mason</surname>
</persName>
<email>J.S.D.Mason@swansea.ac.uk</email>
<affiliation>Department of Electrical & Electronic Engineering, University of Wales Swansea, SA2 8PP, UK</affiliation>
</author>
<author xml:id="author-0002">
<persName>
<forename type="first">Michael</forename>
<surname>Ellis</surname>
</persName>
<affiliation>Dynjab Technologies, Canberra, Australia</affiliation>
</author>
<idno type="istex">8E0FE04B9611C159FD52364ABF7DC7869D225BBC</idno>
<idno type="ark">ark:/67375/1BB-KCB11SZ4-1</idno>
<idno type="DOI">10.1007/3-540-46665-7_13</idno>
<idno type="ChapterID">13</idno>
<idno type="ChapterID">Chap13</idno>
</analytic>
<monogr>
<title level="m">Cryptography and Coding</title>
<title level="m" type="sub">7th IMA International Conference Cirencester, UK, December 20–22, 1999 Proceedings</title>
<idno type="DOI">10.1007/3-540-46665-7</idno>
<idno type="pISBN">978-3-540-66887-9</idno>
<idno type="eISBN">978-3-540-46665-9</idno>
<idno type="pISSN">0302-9743</idno>
<idno type="book-title-id">64249</idno>
<idno type="book-id">3-540-46665-7</idno>
<idno type="book-chapter-count">35</idno>
<idno type="book-volume-number">1746</idno>
<idno type="book-sequence-number">1746</idno>
<editor xml:id="book-author-0000">
<persName>
<forename type="first">Michael</forename>
<surname>Walker</surname>
</persName>
<email>mike.walker@vf.vodafone.co.uk</email>
<affiliation>Vodafone Limited, The Courtyard, 2-4 London Road Newbury, RG14 1JX, Berkshire, UK</affiliation>
</editor>
<imprint>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<date type="published" when="1999-11-19"></date>
<biblScope unit="volume">1746</biblScope>
<biblScope unit="page" from="119">119</biblScope>
<biblScope unit="page" to="128">128</biblScope>
</imprint>
</monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<editor xml:id="serie-author-0000">
<persName>
<forename type="first">G.</forename>
<surname>Goos</surname>
</persName>
<affiliation>Karlsruhe University, Germany</affiliation>
</editor>
<editor xml:id="serie-author-0001">
<persName>
<forename type="first">J.</forename>
<surname>Hartmanis</surname>
</persName>
<affiliation>Cornell University, NY, USA</affiliation>
</editor>
<editor xml:id="serie-author-0002">
<persName>
<forename type="first">J.</forename>
<surname>van Leeuwen</surname>
</persName>
<affiliation>Utrecht University, The Netherlands</affiliation>
</editor>
<biblScope>
<date>1999</date>
</biblScope>
<idno type="pISSN">0302-9743</idno>
<idno type="series-id">558</idno>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<creation>
<date>1999</date>
</creation>
<langUsage>
<language ident="en">en</language>
</langUsage>
<abstract xml:lang="en">
<p>Abstract: This paper investigates a photo-signature approach to protecting personal identification documents such as passports. The approach is based on that described in a recent publication by O’Gorman and Rabinovich [1] which uses encoded data derived from comparisons of image sub-blocks across the photograph of the document. The encoded data is generated and stored at the time of document creation, and used subsequently to test document authenticity. Here we report on experiments which corroborate the fundamental findings of [1], namely that it is possible to usefully encode the photograph information in only tens of bytes of data. Furthermore we show that new block structures can improve the efficiency of the encoded data. This is important since the encoding efficiency, measured in terms of number of bytes versus discriminating performance, is particularly important when storing data on a small document such as a passport or ID card. We show that a step structure is measurably better than the original octal structure used in [1] when there are only a small number of bytes (20 to 30) in the photo-signature.</p>
</abstract>
<textClass>
<keywords scheme="Book-Subject-Collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass>
<keywords scheme="Book-Subject-Group">
<list>
<label>I</label>
<label>I15033</label>
<label>I15041</label>
<label>I17028</label>
<label>I13022</label>
<item>
<term>Computer Science</term>
</item>
<item>
<term>Data Encryption</term>
</item>
<item>
<term>Coding and Information Theory</term>
</item>
<item>
<term>Discrete Mathematics in Computer Science</term>
</item>
<item>
<term>Computer Communication Networks</term>
</item>
</list>
</keywords>
</textClass>
</profileDesc>
<revisionDesc>
<change when="1999-11-19">Published</change>
<change xml:id="refBibs-istex" who="#ISTEX-API" when="2017-10-3">References added</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<extension>txt</extension>
<original>false</original>
<mimetype>text/plain</mimetype>
<uri>https://api.istex.fr/document/8E0FE04B9611C159FD52364ABF7DC7869D225BBC/fulltext/txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="Springer, Publisher found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo TocLevels="0" SeriesType="Series">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff1">
<EditorName DisplayOrder="Western">
<GivenName>G.</GivenName>
<FamilyName>Goos</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff2">
<EditorName DisplayOrder="Western">
<GivenName>J.</GivenName>
<FamilyName>Hartmanis</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff3">
<EditorName DisplayOrder="Western">
<GivenName>J.</GivenName>
<Particle>van</Particle>
<FamilyName>Leeuwen</FamilyName>
</EditorName>
</Editor>
<Affiliation ID="Aff1">
<OrgName>Karlsruhe University</OrgName>
<OrgAddress>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2">
<OrgName>Cornell University</OrgName>
<OrgAddress>
<State>NY</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff3">
<OrgName>Utrecht University</OrgName>
<OrgAddress>
<Country>The Netherlands</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo Language="En" TocLevels="0" NumberingStyle="Unnumbered" ContainsESM="No" BookProductType="Proceedings" MediaType="eBook">
<BookID>3-540-46665-7</BookID>
<BookTitle>Cryptography and Coding</BookTitle>
<BookSubTitle>7th IMA International Conference Cirencester, UK, December 20–22, 1999 Proceedings</BookSubTitle>
<BookVolumeNumber>1746</BookVolumeNumber>
<BookSequenceNumber>1746</BookSequenceNumber>
<BookDOI>10.1007/3-540-46665-7</BookDOI>
<BookTitleID>64249</BookTitleID>
<BookPrintISBN>978-3-540-66887-9</BookPrintISBN>
<BookElectronicISBN>978-3-540-46665-9</BookElectronicISBN>
<BookChapterCount>35</BookChapterCount>
<BookHistory>
<OnlineDate>
<Year>1999</Year>
<Month>11</Month>
<Day>19</Day>
</OnlineDate>
</BookHistory>
<BookCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>1999</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I15033" Priority="1" Type="Secondary">Data Encryption</BookSubject>
<BookSubject Code="I15041" Priority="2" Type="Secondary">Coding and Information Theory</BookSubject>
<BookSubject Code="I17028" Priority="3" Type="Secondary">Discrete Mathematics in Computer Science</BookSubject>
<BookSubject Code="I13022" Priority="4" Type="Secondary">Computer Communication Networks</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
<BookContext>
<SeriesID>558</SeriesID>
</BookContext>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff4">
<EditorName DisplayOrder="Western">
<GivenName>Michael</GivenName>
<FamilyName>Walker</FamilyName>
</EditorName>
<Contact>
<Email>mike.walker@vf.vodafone.co.uk</Email>
</Contact>
</Editor>
<Affiliation ID="Aff4">
<OrgName>Vodafone Limited</OrgName>
<OrgAddress>
<Street>The Courtyard, 2-4 London Road Newbury</Street>
<City>Berkshire</City>
<Postcode>RG14 1JX</Postcode>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</BookHeader>
<Chapter ID="Chap13" Language="En">
<ChapterInfo ChapterType="OriginalPaper" NumberingStyle="Unnumbered" Language="En" TocLevels="0" ContainsESM="No">
<ChapterID>13</ChapterID>
<ChapterDOI>10.1007/3-540-46665-7_13</ChapterDOI>
<ChapterSequenceNumber>13</ChapterSequenceNumber>
<ChapterTitle Language="En">Photograph Signatures for the Protection of Identification Documents</ChapterTitle>
<ChapterFirstPage>119</ChapterFirstPage>
<ChapterLastPage>128</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>1999</CopyrightYear>
</ChapterCopyright>
<ChapterHistory>
<RegistrationDate>
<Year>1999</Year>
<Month>11</Month>
<Day>18</Day>
</RegistrationDate>
<OnlineDate>
<Year>1999</Year>
<Month>11</Month>
<Day>19</Day>
</OnlineDate>
</ChapterHistory>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext>
<SeriesID>558</SeriesID>
<BookID>3-540-46665-7</BookID>
<BookTitle>Cryptography and Coding</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff5">
<AuthorName DisplayOrder="Western">
<GivenName>Bruno</GivenName>
<FamilyName>Bellamy</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff6">
<AuthorName DisplayOrder="Western">
<GivenName>John</GivenName>
<GivenName>S.</GivenName>
<FamilyName>Mason</FamilyName>
</AuthorName>
<Contact>
<Email>J.S.D.Mason@swansea.ac.uk</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff7">
<AuthorName DisplayOrder="Western">
<GivenName>Michael</GivenName>
<FamilyName>Ellis</FamilyName>
</AuthorName>
</Author>
<Affiliation ID="Aff5">
<OrgName>ENIB</OrgName>
<OrgAddress>
<City>Brest</City>
<Country>France</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff6">
<OrgDivision>Department of Electrical & Electronic Engineering</OrgDivision>
<OrgName>University of Wales Swansea</OrgName>
<OrgAddress>
<Postcode>SA2 8PP</Postcode>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff7">
<OrgName>Dynjab Technologies</OrgName>
<OrgAddress>
<City>Canberra</City>
<Country>Australia</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>This paper investigates a photo-signature approach to protecting personal identification documents such as passports. The approach is based on that described in a recent publication by O’Gorman and Rabinovich [1] which uses encoded data derived from comparisons of image sub-blocks across the photograph of the document. The encoded data is generated and stored at the time of document creation, and used subsequently to test document authenticity. Here we report on experiments which corroborate the fundamental findings of [1], namely that it is possible to usefully encode the photograph information in only tens of bytes of data.</Para>
<Para>Furthermore we show that new block structures can improve the efficiency of the encoded data. This is important since the encoding efficiency, measured in terms of number of bytes versus discriminating performance, is particularly important when storing data on a small document such as a passport or ID card. We show that a step structure is measurably better than the original octal structure used in [1] when there are only a small number of bytes (20 to 30) in the photo-signature.</Para>
</Abstract>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Photograph Signatures for the Protection of Identification Documents</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA" lang="en">
<title>Photograph Signatures for the Protection of Identification Documents</title>
</titleInfo>
<name type="personal">
<namePart type="given">Bruno</namePart>
<namePart type="family">Bellamy</namePart>
<affiliation>ENIB, Brest, France</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="given">S.</namePart>
<namePart type="family">Mason</namePart>
<affiliation>Department of Electrical & Electronic Engineering, University of Wales Swansea, SA2 8PP, UK</affiliation>
<affiliation>E-mail: J.S.D.Mason@swansea.ac.uk</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Michael</namePart>
<namePart type="family">Ellis</namePart>
<affiliation>Dynjab Technologies, Canberra, Australia</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre displayLabel="OriginalPaper" authority="ISTEX" authorityURI="https://content-type.data.istex.fr" type="conference" valueURI="https://content-type.data.istex.fr/ark:/67375/XTP-BFHXPBJJ-3">conference</genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">1999-11-19</dateIssued>
<copyrightDate encoding="w3cdtf">1999</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<abstract lang="en">Abstract: This paper investigates a photo-signature approach to protecting personal identification documents such as passports. The approach is based on that described in a recent publication by O’Gorman and Rabinovich [1] which uses encoded data derived from comparisons of image sub-blocks across the photograph of the document. The encoded data is generated and stored at the time of document creation, and used subsequently to test document authenticity. Here we report on experiments which corroborate the fundamental findings of [1], namely that it is possible to usefully encode the photograph information in only tens of bytes of data. Furthermore we show that new block structures can improve the efficiency of the encoded data. This is important since the encoding efficiency, measured in terms of number of bytes versus discriminating performance, is particularly important when storing data on a small document such as a passport or ID card. We show that a step structure is measurably better than the original octal structure used in [1] when there are only a small number of bytes (20 to 30) in the photo-signature.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Cryptography and Coding</title>
<subTitle>7th IMA International Conference Cirencester, UK, December 20–22, 1999 Proceedings</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Michael</namePart>
<namePart type="family">Walker</namePart>
<affiliation>Vodafone Limited, The Courtyard, 2-4 London Road Newbury, RG14 1JX, Berkshire, UK</affiliation>
<affiliation>E-mail: mike.walker@vf.vodafone.co.uk</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="book-series" displayLabel="Proceedings" authority="ISTEX" authorityURI="https://publication-type.data.istex.fr" valueURI="https://publication-type.data.istex.fr/ark:/67375/JMC-0G6R5W5T-Z">book-series</genre>
<originInfo>
<publisher>Springer</publisher>
<copyrightDate encoding="w3cdtf">1999</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book-Subject-Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book-Subject-Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I15033">Data Encryption</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I15041">Coding and Information Theory</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I17028">Discrete Mathematics in Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I13022">Computer Communication Networks</topic>
</subject>
<identifier type="DOI">10.1007/3-540-46665-7</identifier>
<identifier type="ISBN">978-3-540-66887-9</identifier>
<identifier type="eISBN">978-3-540-46665-9</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="BookTitleID">64249</identifier>
<identifier type="BookID">3-540-46665-7</identifier>
<identifier type="BookChapterCount">35</identifier>
<identifier type="BookVolumeNumber">1746</identifier>
<identifier type="BookSequenceNumber">1746</identifier>
<part>
<date>1999</date>
<detail type="volume">
<number>1746</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>119</start>
<end>128</end>
</extent>
</part>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 1999</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">G.</namePart>
<namePart type="family">Goos</namePart>
<affiliation>Karlsruhe University, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">J.</namePart>
<namePart type="family">Hartmanis</namePart>
<affiliation>Cornell University, NY, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">J.</namePart>
<namePart type="family">van Leeuwen</namePart>
<affiliation>Utrecht University, The Netherlands</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<publisher>Springer</publisher>
<copyrightDate encoding="w3cdtf">1999</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 1999</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">8E0FE04B9611C159FD52364ABF7DC7869D225BBC</identifier>
<identifier type="ark">ark:/67375/1BB-KCB11SZ4-1</identifier>
<identifier type="DOI">10.1007/3-540-46665-7_13</identifier>
<identifier type="ChapterID">13</identifier>
<identifier type="ChapterID">Chap13</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg, 1999</accessCondition>
<recordInfo>
<recordContentSource authority="ISTEX" authorityURI="https://loaded-corpus.data.istex.fr" valueURI="https://loaded-corpus.data.istex.fr/ark:/67375/XBH-3XSW68JL-F">springer</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 1999</recordOrigin>
</recordInfo>
</mods>
<json:item>
<extension>json</extension>
<original>false</original>
<mimetype>application/json</mimetype>
<uri>https://api.istex.fr/document/8E0FE04B9611C159FD52364ABF7DC7869D225BBC/metadata/json</uri>
</json:item>
</metadata>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Asie/explor/AustralieFrV1/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001A84 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 001A84 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Asie
   |area=    AustralieFrV1
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:8E0FE04B9611C159FD52364ABF7DC7869D225BBC
   |texte=   Photograph Signatures for the Protection of Identification Documents
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Tue Dec 5 10:43:12 2017. Site generation: Tue Mar 5 14:07:20 2024