Serveur d'exploration sur l'OCR

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Document Signature Using Intrinsic Features for Counterfeit Detection

Identifieur interne : 000886 ( Istex/Corpus ); précédent : 000885; suivant : 000887

Document Signature Using Intrinsic Features for Counterfeit Detection

Auteurs : Joost Van Beusekom ; Faisal Shafait ; M. Breuel

Source :

RBID : ISTEX:1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D

Abstract

Abstract: Document security does not only play an important role in specific domains e.g. passports, checks and degrees but also in every day documents e.g. bills and vouchers. Using special high-security features for this class of documents is not feasible due to the cost and the complexity of these methods. We present an approach for detecting falsified documents using a document signature obtained from its intrinsic features: bounding boxes of connected components are used as a signature. Using the model signature learned from a set of original bills, our approach can identify documents whose signature significantly differs from the model signature. Our approach uses globally optimal document alignment to build a model signature that can be used to compute the probability of a new document being an original one. Preliminary evaluation shows that the method is able to reliably detect faked documents.

Url:
DOI: 10.1007/978-3-540-85303-9_5

Links to Exploration step

ISTEX:1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Document Signature Using Intrinsic Features for Counterfeit Detection</title>
<author>
<name sortKey="Van Beusekom, Joost" sort="Van Beusekom, Joost" uniqKey="Van Beusekom J" first="Joost" last="Van Beusekom">Joost Van Beusekom</name>
<affiliation>
<mods:affiliation>Technical University of Kaiserslautern, Kaiserslautern, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: joost.van-beusekom@dfki.uni-kl.de</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Shafait, Faisal" sort="Shafait, Faisal" uniqKey="Shafait F" first="Faisal" last="Shafait">Faisal Shafait</name>
<affiliation>
<mods:affiliation>German Research Center for Artificial Intelligence (DFKI), Kaiserslautern, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: faisal.shafait@dfki.uni-kl.de</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Breuel, M" sort="Breuel, M" uniqKey="Breuel M" first="M." last="Breuel">M. Breuel</name>
<affiliation>
<mods:affiliation>Technical University of Kaiserslautern, Kaiserslautern, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>German Research Center for Artificial Intelligence (DFKI), Kaiserslautern, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: tmb@dfki.uni-kl.de</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D</idno>
<date when="2008" year="2008">2008</date>
<idno type="doi">10.1007/978-3-540-85303-9_5</idno>
<idno type="url">https://api.istex.fr/document/1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000886</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Document Signature Using Intrinsic Features for Counterfeit Detection</title>
<author>
<name sortKey="Van Beusekom, Joost" sort="Van Beusekom, Joost" uniqKey="Van Beusekom J" first="Joost" last="Van Beusekom">Joost Van Beusekom</name>
<affiliation>
<mods:affiliation>Technical University of Kaiserslautern, Kaiserslautern, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: joost.van-beusekom@dfki.uni-kl.de</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Shafait, Faisal" sort="Shafait, Faisal" uniqKey="Shafait F" first="Faisal" last="Shafait">Faisal Shafait</name>
<affiliation>
<mods:affiliation>German Research Center for Artificial Intelligence (DFKI), Kaiserslautern, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: faisal.shafait@dfki.uni-kl.de</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Breuel, M" sort="Breuel, M" uniqKey="Breuel M" first="M." last="Breuel">M. Breuel</name>
<affiliation>
<mods:affiliation>Technical University of Kaiserslautern, Kaiserslautern, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>German Research Center for Artificial Intelligence (DFKI), Kaiserslautern, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: tmb@dfki.uni-kl.de</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2008</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D</idno>
<idno type="DOI">10.1007/978-3-540-85303-9_5</idno>
<idno type="ChapterID">5</idno>
<idno type="ChapterID">Chap5</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: Document security does not only play an important role in specific domains e.g. passports, checks and degrees but also in every day documents e.g. bills and vouchers. Using special high-security features for this class of documents is not feasible due to the cost and the complexity of these methods. We present an approach for detecting falsified documents using a document signature obtained from its intrinsic features: bounding boxes of connected components are used as a signature. Using the model signature learned from a set of original bills, our approach can identify documents whose signature significantly differs from the model signature. Our approach uses globally optimal document alignment to build a model signature that can be used to compute the probability of a new document being an original one. Preliminary evaluation shows that the method is able to reliably detect faked documents.</div>
</front>
</TEI>
<istex>
<corpusName>springer</corpusName>
<author>
<json:item>
<name>Joost van Beusekom</name>
<affiliations>
<json:string>Technical University of Kaiserslautern, Kaiserslautern, Germany</json:string>
<json:string>E-mail: joost.van-beusekom@dfki.uni-kl.de</json:string>
</affiliations>
</json:item>
<json:item>
<name>Faisal Shafait</name>
<affiliations>
<json:string>German Research Center for Artificial Intelligence (DFKI), Kaiserslautern, Germany</json:string>
<json:string>E-mail: faisal.shafait@dfki.uni-kl.de</json:string>
</affiliations>
</json:item>
<json:item>
<name>Thomas M. Breuel</name>
<affiliations>
<json:string>Technical University of Kaiserslautern, Kaiserslautern, Germany</json:string>
<json:string>German Research Center for Artificial Intelligence (DFKI), Kaiserslautern, Germany</json:string>
<json:string>E-mail: tmb@dfki.uni-kl.de</json:string>
</affiliations>
</json:item>
</author>
<language>
<json:string>eng</json:string>
</language>
<abstract>Abstract: Document security does not only play an important role in specific domains e.g. passports, checks and degrees but also in every day documents e.g. bills and vouchers. Using special high-security features for this class of documents is not feasible due to the cost and the complexity of these methods. We present an approach for detecting falsified documents using a document signature obtained from its intrinsic features: bounding boxes of connected components are used as a signature. Using the model signature learned from a set of original bills, our approach can identify documents whose signature significantly differs from the model signature. Our approach uses globally optimal document alignment to build a model signature that can be used to compute the probability of a new document being an original one. Preliminary evaluation shows that the method is able to reliably detect faked documents.</abstract>
<qualityIndicators>
<score>7.341</score>
<pdfVersion>1.6</pdfVersion>
<pdfPageSize>430 x 660 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<keywordCount>0</keywordCount>
<abstractCharCount>915</abstractCharCount>
<pdfWordCount>4137</pdfWordCount>
<pdfCharCount>22680</pdfCharCount>
<pdfPageCount>11</pdfPageCount>
<abstractWordCount>142</abstractWordCount>
</qualityIndicators>
<title>Document Signature Using Intrinsic Features for Counterfeit Detection</title>
<genre.original>
<json:string>OriginalPaper</json:string>
</genre.original>
<chapterId>
<json:string>5</json:string>
<json:string>Chap5</json:string>
</chapterId>
<genre>
<json:string>conference [eBooks]</json:string>
</genre>
<serie>
<editor>
<json:item>
<name>David Hutchison</name>
</json:item>
<json:item>
<name>Takeo Kanade</name>
</json:item>
<json:item>
<name>Josef Kittler</name>
</json:item>
<json:item>
<name>Jon M. Kleinberg</name>
</json:item>
<json:item>
<name>Friedemann Mattern</name>
</json:item>
<json:item>
<name>John C. Mitchell</name>
</json:item>
<json:item>
<name>Moni Naor</name>
</json:item>
<json:item>
<name>Oscar Nierstrasz</name>
</json:item>
<json:item>
<name>C. Pandu Rangan</name>
</json:item>
<json:item>
<name>Bernhard Steffen</name>
</json:item>
<json:item>
<name>Madhu Sudan</name>
</json:item>
<json:item>
<name>Demetri Terzopoulos</name>
</json:item>
<json:item>
<name>Doug Tygar</name>
</json:item>
<json:item>
<name>Moshe Y. Vardi</name>
</json:item>
<json:item>
<name>Gerhard Weikum</name>
</json:item>
</editor>
<issn>
<json:string>0302-9743</json:string>
</issn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Lecture Notes in Computer Science</title>
<copyrightDate>2008</copyrightDate>
</serie>
<host>
<editor>
<json:item>
<name>Sargur N. Srihari</name>
</json:item>
<json:item>
<name>Katrin Franke</name>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Biometrics</value>
</json:item>
<json:item>
<value>Pattern Recognition</value>
</json:item>
<json:item>
<value>Image Processing and Computer Vision</value>
</json:item>
<json:item>
<value>Data Mining and Knowledge Discovery</value>
</json:item>
<json:item>
<value>Computer Imaging, Vision, Pattern Recognition and Graphics</value>
</json:item>
<json:item>
<value>Language Translation and Linguistics</value>
</json:item>
</subject>
<isbn>
<json:string>978-3-540-85302-2</json:string>
</isbn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Computational Forensics</title>
<genre.original>
<json:string>Proceedings</json:string>
</genre.original>
<bookId>
<json:string>978-3-540-85303-9</json:string>
</bookId>
<volume>5158</volume>
<pages>
<last>57</last>
<first>47</first>
</pages>
<issn>
<json:string>0302-9743</json:string>
</issn>
<genre>
<json:string>Book Series</json:string>
</genre>
<eisbn>
<json:string>978-3-540-85303-9</json:string>
</eisbn>
<copyrightDate>2008</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-85303-9</json:string>
</doi>
</host>
<publicationDate>2008</publicationDate>
<copyrightDate>2008</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-85303-9_5</json:string>
</doi>
<id>1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D</id>
<fulltext>
<json:item>
<original>true</original>
<mimetype>application/pdf</mimetype>
<extension>pdf</extension>
<uri>https://api.istex.fr/document/1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D/fulltext/pdf</uri>
</json:item>
<json:item>
<original>false</original>
<mimetype>application/zip</mimetype>
<extension>zip</extension>
<uri>https://api.istex.fr/document/1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D/fulltext/zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/document/1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D/fulltext/tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Document Signature Using Intrinsic Features for Counterfeit Detection</title>
<respStmt xml:id="ISTEX-API" resp="Références bibliographiques récupérées via GROBID" name="ISTEX-API (INIST-CNRS)"></respStmt>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<availability>
<p>SPRINGER</p>
</availability>
<date>2008</date>
</publicationStmt>
<sourceDesc>
<biblStruct type="inbook">
<analytic>
<title level="a" type="main" xml:lang="en">Document Signature Using Intrinsic Features for Counterfeit Detection</title>
<author>
<persName>
<forename type="first">Joost</forename>
<surname>van Beusekom</surname>
</persName>
<email>joost.van-beusekom@dfki.uni-kl.de</email>
<affiliation>Technical University of Kaiserslautern, Kaiserslautern, Germany</affiliation>
</author>
<author>
<persName>
<forename type="first">Faisal</forename>
<surname>Shafait</surname>
</persName>
<email>faisal.shafait@dfki.uni-kl.de</email>
<affiliation>German Research Center for Artificial Intelligence (DFKI), Kaiserslautern, Germany</affiliation>
</author>
<author>
<persName>
<forename type="first">Thomas</forename>
<surname>Breuel</surname>
</persName>
<email>tmb@dfki.uni-kl.de</email>
<affiliation>Technical University of Kaiserslautern, Kaiserslautern, Germany</affiliation>
<affiliation>German Research Center for Artificial Intelligence (DFKI), Kaiserslautern, Germany</affiliation>
</author>
</analytic>
<monogr>
<title level="m">Computational Forensics</title>
<title level="m" type="sub">Second International Workshop, IWCF 2008, Washington, DC, USA, August 7-8, 2008. Proceedings</title>
<idno type="pISBN">978-3-540-85302-2</idno>
<idno type="eISBN">978-3-540-85303-9</idno>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="DOI">10.1007/978-3-540-85303-9</idno>
<idno type="BookID">978-3-540-85303-9</idno>
<idno type="BookTitleID">177648</idno>
<idno type="BookSequenceNumber">5158</idno>
<idno type="BookVolumeNumber">5158</idno>
<idno type="BookChapterCount">20</idno>
<editor>
<persName>
<forename type="first">Sargur</forename>
<forename type="first">N.</forename>
<surname>Srihari</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Katrin</forename>
<surname>Franke</surname>
</persName>
</editor>
<imprint>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<date type="published" when="2008"></date>
<biblScope unit="volume">5158</biblScope>
<biblScope unit="page" from="47">47</biblScope>
<biblScope unit="page" to="57">57</biblScope>
</imprint>
</monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<editor>
<persName>
<forename type="first">David</forename>
<surname>Hutchison</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Takeo</forename>
<surname>Kanade</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Josef</forename>
<surname>Kittler</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Jon</forename>
<forename type="first">M.</forename>
<surname>Kleinberg</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Friedemann</forename>
<surname>Mattern</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">John</forename>
<forename type="first">C.</forename>
<surname>Mitchell</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Moni</forename>
<surname>Naor</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Oscar</forename>
<surname>Nierstrasz</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">C.</forename>
<surname>Pandu Rangan</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Bernhard</forename>
<surname>Steffen</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Madhu</forename>
<surname>Sudan</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Demetri</forename>
<surname>Terzopoulos</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Doug</forename>
<surname>Tygar</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Moshe</forename>
<forename type="first">Y.</forename>
<surname>Vardi</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Weikum</surname>
</persName>
</editor>
<biblScope>
<date>2008</date>
</biblScope>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="seriesId">558</idno>
</series>
<idno type="istex">1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D</idno>
<idno type="DOI">10.1007/978-3-540-85303-9_5</idno>
<idno type="ChapterID">5</idno>
<idno type="ChapterID">Chap5</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<creation>
<date>2008</date>
</creation>
<langUsage>
<language ident="en">en</language>
</langUsage>
<abstract xml:lang="en">
<p>Abstract: Document security does not only play an important role in specific domains e.g. passports, checks and degrees but also in every day documents e.g. bills and vouchers. Using special high-security features for this class of documents is not feasible due to the cost and the complexity of these methods. We present an approach for detecting falsified documents using a document signature obtained from its intrinsic features: bounding boxes of connected components are used as a signature. Using the model signature learned from a set of original bills, our approach can identify documents whose signature significantly differs from the model signature. Our approach uses globally optimal document alignment to build a model signature that can be used to compute the probability of a new document being an original one. Preliminary evaluation shows that the method is able to reliably detect faked documents.</p>
</abstract>
<textClass>
<keywords scheme="Book Subject Collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass>
<keywords scheme="Book Subject Group">
<list>
<label>I</label>
<label>I22040</label>
<label>I2203X</label>
<label>I22021</label>
<label>I18030</label>
<label>I22005</label>
<label>I21041</label>
<item>
<term>Computer Science</term>
</item>
<item>
<term>Biometrics</term>
</item>
<item>
<term>Pattern Recognition</term>
</item>
<item>
<term>Image Processing and Computer Vision</term>
</item>
<item>
<term>Data Mining and Knowledge Discovery</term>
</item>
<item>
<term>Computer Imaging, Vision, Pattern Recognition and Graphics</term>
</item>
<item>
<term>Language Translation and Linguistics</term>
</item>
</list>
</keywords>
</textClass>
</profileDesc>
<revisionDesc>
<change when="2008">Published</change>
<change xml:id="refBibs-istex" who="#ISTEX-API" when="2016-3-20">References added</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<original>false</original>
<mimetype>text/plain</mimetype>
<extension>txt</extension>
<uri>https://api.istex.fr/document/1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D/fulltext/txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="Springer, Publisher found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo SeriesType="Series" TocLevels="0">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>David</GivenName>
<FamilyName>Hutchison</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Takeo</GivenName>
<FamilyName>Kanade</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Josef</GivenName>
<FamilyName>Kittler</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Jon</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Kleinberg</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Friedemann</GivenName>
<FamilyName>Mattern</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>John</GivenName>
<GivenName>C.</GivenName>
<FamilyName>Mitchell</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Moni</GivenName>
<FamilyName>Naor</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Oscar</GivenName>
<FamilyName>Nierstrasz</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>C.</GivenName>
<FamilyName>Pandu Rangan</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Bernhard</GivenName>
<FamilyName>Steffen</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Madhu</GivenName>
<FamilyName>Sudan</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Demetri</GivenName>
<FamilyName>Terzopoulos</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Doug</GivenName>
<FamilyName>Tygar</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Moshe</GivenName>
<GivenName>Y.</GivenName>
<FamilyName>Vardi</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Weikum</FamilyName>
</EditorName>
</Editor>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo BookProductType="Proceedings" ContainsESM="No" Language="En" MediaType="eBook" NumberingStyle="Unnumbered" OutputMedium="All" TocLevels="0">
<BookID>978-3-540-85303-9</BookID>
<BookTitle>Computational Forensics</BookTitle>
<BookSubTitle>Second International Workshop, IWCF 2008, Washington, DC, USA, August 7-8, 2008. Proceedings</BookSubTitle>
<BookVolumeNumber>5158</BookVolumeNumber>
<BookSequenceNumber>5158</BookSequenceNumber>
<BookDOI>10.1007/978-3-540-85303-9</BookDOI>
<BookTitleID>177648</BookTitleID>
<BookPrintISBN>978-3-540-85302-2</BookPrintISBN>
<BookElectronicISBN>978-3-540-85303-9</BookElectronicISBN>
<BookChapterCount>20</BookChapterCount>
<BookCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2008</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I22040" Priority="1" Type="Secondary">Biometrics</BookSubject>
<BookSubject Code="I2203X" Priority="2" Type="Secondary">Pattern Recognition</BookSubject>
<BookSubject Code="I22021" Priority="3" Type="Secondary">Image Processing and Computer Vision</BookSubject>
<BookSubject Code="I18030" Priority="4" Type="Secondary">Data Mining and Knowledge Discovery</BookSubject>
<BookSubject Code="I22005" Priority="5" Type="Secondary">Computer Imaging, Vision, Pattern Recognition and Graphics</BookSubject>
<BookSubject Code="I21041" Priority="6" Type="Secondary">Language Translation and Linguistics</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Sargur</GivenName>
<GivenName>N.</GivenName>
<FamilyName>Srihari</FamilyName>
</EditorName>
<Contact>
<Email>srihari@cedar.buffalo.edu</Email>
</Contact>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Katrin</GivenName>
<FamilyName>Franke</FamilyName>
</EditorName>
<Contact>
<Email>kyfranke@hig.no</Email>
</Contact>
</Editor>
</EditorGroup>
</BookHeader>
<Part ID="Part2">
<PartInfo TocLevels="0">
<PartID>2</PartID>
<PartSequenceNumber>2</PartSequenceNumber>
<PartTitle>Scanner, Printer, and Prints</PartTitle>
<PartChapterCount>3</PartChapterCount>
<PartContext>
<SeriesID>558</SeriesID>
<BookTitle>Computational Forensics</BookTitle>
</PartContext>
</PartInfo>
<Chapter ID="Chap5" Language="En">
<ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" NumberingStyle="Unnumbered" TocLevels="0">
<ChapterID>5</ChapterID>
<ChapterDOI>10.1007/978-3-540-85303-9_5</ChapterDOI>
<ChapterSequenceNumber>5</ChapterSequenceNumber>
<ChapterTitle Language="En">Document Signature Using Intrinsic Features for Counterfeit Detection</ChapterTitle>
<ChapterFirstPage>47</ChapterFirstPage>
<ChapterLastPage>57</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2008</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext>
<SeriesID>558</SeriesID>
<PartID>2</PartID>
<BookID>978-3-540-85303-9</BookID>
<BookTitle>Computational Forensics</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Joost</GivenName>
<Particle>van</Particle>
<FamilyName>Beusekom</FamilyName>
</AuthorName>
<Contact>
<Email>joost.van-beusekom@dfki.uni-kl.de</Email>
<URL>http://www.iupr.org</URL>
</Contact>
</Author>
<Author AffiliationIDS="Aff2">
<AuthorName DisplayOrder="Western">
<GivenName>Faisal</GivenName>
<FamilyName>Shafait</FamilyName>
</AuthorName>
<Contact>
<Email>faisal.shafait@dfki.uni-kl.de</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff1 Aff2">
<AuthorName DisplayOrder="Western">
<GivenName>Thomas</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Breuel</FamilyName>
</AuthorName>
<Contact>
<Email>tmb@dfki.uni-kl.de</Email>
</Contact>
</Author>
<Affiliation ID="Aff1">
<OrgName>Technical University of Kaiserslautern</OrgName>
<OrgAddress>
<City>Kaiserslautern</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2">
<OrgName>German Research Center for Artificial Intelligence (DFKI)</OrgName>
<OrgAddress>
<City>Kaiserslautern</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>Document security does not only play an important role in specific domains e.g. passports, checks and degrees but also in every day documents e.g. bills and vouchers. Using special high-security features for this class of documents is not feasible due to the cost and the complexity of these methods. We present an approach for detecting falsified documents using a document signature obtained from its intrinsic features: bounding boxes of connected components are used as a signature. Using the model signature learned from a set of original bills, our approach can identify documents whose signature significantly differs from the model signature. Our approach uses globally optimal document alignment to build a model signature that can be used to compute the probability of a new document being an original one. Preliminary evaluation shows that the method is able to reliably detect faked documents.</Para>
</Abstract>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Part>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Document Signature Using Intrinsic Features for Counterfeit Detection</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA" lang="en">
<title>Document Signature Using Intrinsic Features for Counterfeit Detection</title>
</titleInfo>
<name type="personal">
<namePart type="given">Joost</namePart>
<namePart type="family">van Beusekom</namePart>
<affiliation>Technical University of Kaiserslautern, Kaiserslautern, Germany</affiliation>
<affiliation>E-mail: joost.van-beusekom@dfki.uni-kl.de</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Faisal</namePart>
<namePart type="family">Shafait</namePart>
<affiliation>German Research Center for Artificial Intelligence (DFKI), Kaiserslautern, Germany</affiliation>
<affiliation>E-mail: faisal.shafait@dfki.uni-kl.de</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Thomas</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Breuel</namePart>
<affiliation>Technical University of Kaiserslautern, Kaiserslautern, Germany</affiliation>
<affiliation>German Research Center for Artificial Intelligence (DFKI), Kaiserslautern, Germany</affiliation>
<affiliation>E-mail: tmb@dfki.uni-kl.de</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre type="conference [eBooks]" displayLabel="OriginalPaper"></genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2008</dateIssued>
<copyrightDate encoding="w3cdtf">2008</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<internetMediaType>text/html</internetMediaType>
</physicalDescription>
<abstract lang="en">Abstract: Document security does not only play an important role in specific domains e.g. passports, checks and degrees but also in every day documents e.g. bills and vouchers. Using special high-security features for this class of documents is not feasible due to the cost and the complexity of these methods. We present an approach for detecting falsified documents using a document signature obtained from its intrinsic features: bounding boxes of connected components are used as a signature. Using the model signature learned from a set of original bills, our approach can identify documents whose signature significantly differs from the model signature. Our approach uses globally optimal document alignment to build a model signature that can be used to compute the probability of a new document being an original one. Preliminary evaluation shows that the method is able to reliably detect faked documents.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Computational Forensics</title>
<subTitle>Second International Workshop, IWCF 2008, Washington, DC, USA, August 7-8, 2008. Proceedings</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Sargur</namePart>
<namePart type="given">N.</namePart>
<namePart type="family">Srihari</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Katrin</namePart>
<namePart type="family">Franke</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="Book Series" displayLabel="Proceedings"></genre>
<originInfo>
<copyrightDate encoding="w3cdtf">2008</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book Subject Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book Subject Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I22040">Biometrics</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I2203X">Pattern Recognition</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I22021">Image Processing and Computer Vision</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18030">Data Mining and Knowledge Discovery</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I22005">Computer Imaging, Vision, Pattern Recognition and Graphics</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I21041">Language Translation and Linguistics</topic>
</subject>
<identifier type="DOI">10.1007/978-3-540-85303-9</identifier>
<identifier type="ISBN">978-3-540-85302-2</identifier>
<identifier type="eISBN">978-3-540-85303-9</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">177648</identifier>
<identifier type="BookID">978-3-540-85303-9</identifier>
<identifier type="BookChapterCount">20</identifier>
<identifier type="BookVolumeNumber">5158</identifier>
<identifier type="BookSequenceNumber">5158</identifier>
<identifier type="PartChapterCount">3</identifier>
<part>
<date>2008</date>
<detail type="part">
<title>Scanner, Printer, and Prints</title>
</detail>
<detail type="volume">
<number>5158</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>47</start>
<end>57</end>
</extent>
</part>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2008</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">David</namePart>
<namePart type="family">Hutchison</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Takeo</namePart>
<namePart type="family">Kanade</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Josef</namePart>
<namePart type="family">Kittler</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jon</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Kleinberg</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Friedemann</namePart>
<namePart type="family">Mattern</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Mitchell</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moni</namePart>
<namePart type="family">Naor</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Oscar</namePart>
<namePart type="family">Nierstrasz</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">C.</namePart>
<namePart type="family">Pandu Rangan</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bernhard</namePart>
<namePart type="family">Steffen</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Madhu</namePart>
<namePart type="family">Sudan</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Demetri</namePart>
<namePart type="family">Terzopoulos</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Doug</namePart>
<namePart type="family">Tygar</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moshe</namePart>
<namePart type="given">Y.</namePart>
<namePart type="family">Vardi</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Weikum</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<copyrightDate encoding="w3cdtf">2008</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2008</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D</identifier>
<identifier type="DOI">10.1007/978-3-540-85303-9_5</identifier>
<identifier type="ChapterID">5</identifier>
<identifier type="ChapterID">Chap5</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg, 2008</accessCondition>
<recordInfo>
<recordContentSource>SPRINGER</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2008</recordOrigin>
</recordInfo>
</mods>
</metadata>
<enrichments>
<istex:refBibTEI uri="https://api.istex.fr/document/1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D/enrichments/refBib">
<teiHeader></teiHeader>
<text>
<front></front>
<body></body>
<back>
<listBibl>
<biblStruct xml:id="b0">
<analytic>
<title level="a" type="main">Commercial anticounterfeit products using machine vision</title>
<author>
<persName>
<forename type="first">P</forename>
<forename type="middle">J</forename>
<surname>Smith</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">P</forename>
<surname>Doherty</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">C</forename>
<surname>Luna</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Mccarthy</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Optical Security and Counterfeit Deterrence Techniques V. Presented at the Society of Photo-Optical Instrumentation Engineers (SPIE) Conference. Proceedings of the SPIE</title>
<editor>van Renesse, R.L.</editor>
<imprint>
<date type="published" when="2004-06"></date>
<biblScope unit="page" from="237" to="243"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b1">
<analytic>
<title level="a" type="main">A new print-based security strategy for the protection of valuable documents and products using moire intensity profiles</title>
<author>
<persName>
<forename type="first">I</forename>
<surname>Amidror</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Optical Security and Counterfeit Deterrence Techniques V. Proceedings of the SPIE</title>
<editor>van Renesse, R.L.</editor>
<imprint>
<date type="published" when="2002-06"></date>
<biblScope unit="page" from="89" to="100"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b2">
<analytic>
<title level="a" type="main">Multifunctional optical security features based on bacteriorhodopsin</title>
<author>
<persName>
<forename type="first">N</forename>
<forename type="middle">A</forename>
<surname>Hampp</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">M</forename>
<surname>Neebe</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">T</forename>
<surname>Juchem</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">M</forename>
<surname>Wolperdinger</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">M</forename>
<surname>Geiger</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">A</forename>
<surname>Schmuck</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Optical Security and Counterfeit Deterrence Techniques V. Proceedings of the SPIE</title>
<editor>van Renesse, R.L.</editor>
<imprint>
<date type="published" when="2004-06"></date>
<biblScope unit="page" from="117" to="124"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b3">
<analytic>
<title level="a" type="main">Dynamic thresholding of gray level images</title>
<author>
<persName>
<forename type="first">J</forename>
<surname>Bernsen</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Proc. Int. Conf. on Pattern Recognition</title>
<meeting>. Int. Conf. on Pattern Recognition
<address>
<addrLine>Paris, France</addrLine>
</address>
</meeting>
<imprint>
<date type="published" when="1986"></date>
<biblScope unit="page" from="1251" to="1255"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b4">
<analytic>
<title level="a" type="main">The OCRopus open source OCR system</title>
<author>
<persName>
<forename type="first">T</forename>
<forename type="middle">M</forename>
<surname>Breuel</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">SPIE Document Recognition and Retrieval XV</title>
<meeting>
<address>
<addrLine>San Jose, USA</addrLine>
</address>
</meeting>
<imprint>
<date type="published" when="2008-01"></date>
<biblScope unit="page" from="0" to="1"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b5">
<analytic>
<title level="a" type="main">Performance evaluation and benchmarking of six page segmentation algorithms</title>
<author>
<persName>
<forename type="first">F</forename>
<surname>Shafait</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">D</forename>
<surname>Keysers</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">T</forename>
<forename type="middle">M</forename>
<surname>Breuel</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">IEEE Trans. on Pattern Analysis and Machine Intelligence</title>
<imprint>
<biblScope unit="volume">30</biblScope>
<biblScope unit="issue">6</biblScope>
<biblScope unit="page" from="941" to="954"></biblScope>
<date type="published" when="2008"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b6">
<analytic>
<title level="a" type="main">Image registration methods: a survey</title>
<author>
<persName>
<forename type="first">B</forename>
<surname>Zitova</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<surname>Flusser</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">Image and Vision Computing</title>
<imprint>
<biblScope unit="volume">21</biblScope>
<biblScope unit="issue">11</biblScope>
<biblScope unit="page" from="977" to="1000"></biblScope>
<date type="published" when="2003"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b7">
<analytic>
<title level="a" type="main">A method of annotation extraction from paper documents using alignment based on local arrangements of feature points</title>
<author>
<persName>
<forename type="first">T</forename>
<surname>Nakai</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">K</forename>
<surname>Kise</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">M</forename>
<surname>Iwamura</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Int. Conf. on Document Analysis and Recognition</title>
<meeting>
<address>
<addrLine>Curitiba, Brazil</addrLine>
</address>
</meeting>
<imprint>
<date type="published" when="2007-09"></date>
<biblScope unit="page" from="23" to="27"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b8">
<analytic>
<title level="a" type="main">Camera-based document image mosaicing</title>
<author>
<persName>
<forename type="first">J</forename>
<surname>Liang</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">D</forename>
<surname>Dementhon</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">D</forename>
<surname>Doermann</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Int. Conf. on Patt. Recog., Hong Kong, China</title>
<imprint>
<date type="published" when="2006-08"></date>
<biblScope unit="page" from="476" to="479"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b9">
<analytic>
<title level="a" type="main">Page frame detection for marginal noise removal from scanned documents</title>
<author>
<persName>
<forename type="first">F</forename>
<surname>Shafait</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<surname>Van Beusekom</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">D</forename>
<surname>Keysers</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">T</forename>
<forename type="middle">M</forename>
<surname>Breuel</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">SCIA 2007</title>
<editor>Ersbøll, B.K., Pedersen, K.S.</editor>
<meeting>
<address>
<addrLine>Heidelberg</addrLine>
</address>
</meeting>
<imprint>
<publisher>Springer</publisher>
<date type="published" when="2007"></date>
<biblScope unit="page" from="651" to="660"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b10">
<analytic>
<title level="a" type="main">Image-matching for revision detection in printed historical documents</title>
<author>
<persName>
<forename type="first">J</forename>
<surname>Van Beusekom</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">F</forename>
<surname>Shafait</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">T</forename>
<forename type="middle">M</forename>
<surname>Breuel</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">DAGM 2007</title>
<editor>Hamprecht, F.A., Schnörr, C., Jähne, B.</editor>
<meeting>
<address>
<addrLine>Heidelberg</addrLine>
</address>
</meeting>
<imprint>
<publisher>Springer</publisher>
<date type="published" when="2007"></date>
<biblScope unit="page" from="507" to="516"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b11">
<analytic>
<title level="a" type="main">A practical, globally optimal algorithm for geometric matching under uncertainty</title>
<author>
<persName>
<forename type="first">T</forename>
<forename type="middle">M</forename>
<surname>Breuel</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">Electronic Notes in Theoretical Computer Science</title>
<imprint>
<biblScope unit="volume">46</biblScope>
<biblScope unit="page" from="1" to="15"></biblScope>
<date type="published" when="2001"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b12">
<analytic>
<title level="a" type="main">Implementation techniques for geometric branch-and-bound matching methods</title>
<author>
<persName>
<forename type="first">T</forename>
<forename type="middle">M</forename>
<surname>Breuel</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">Computer Vision and Image Understanding</title>
<imprint>
<biblScope unit="volume">90</biblScope>
<biblScope unit="issue">3</biblScope>
<biblScope unit="page" from="258" to="294"></biblScope>
<date type="published" when="2003"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b13">
<analytic>
<title level="a" type="main">Fourier Preprocessing for Hand Print Character Recognition</title>
<author>
<persName>
<forename type="first">G</forename>
<forename type="middle">H</forename>
<surname>Granlund</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">IEEE Trans. on Computers C–</title>
<imprint>
<biblScope unit="volume">21</biblScope>
<biblScope unit="issue">2</biblScope>
<biblScope unit="page" from="195" to="201"></biblScope>
<date type="published" when="1972"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b14">
<analytic>
<title level="a" type="main">Printing technique classification for document counterfeit detection</title>
<author>
<persName>
<forename type="first">C</forename>
<forename type="middle">H</forename>
<surname>Lampert</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">L</forename>
<surname>Mei</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">T</forename>
<forename type="middle">M</forename>
<surname>Breuel</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">CIS 2006</title>
<editor>Wang, Y., Cheung, Y.-m., Liu, H.</editor>
<meeting>
<address>
<addrLine>Heidelberg</addrLine>
</address>
</meeting>
<imprint>
<publisher>Springer</publisher>
<date type="published" when="2007"></date>
<biblScope unit="page" from="639" to="644"></biblScope>
</imprint>
</monogr>
</biblStruct>
</listBibl>
</back>
</text>
</istex:refBibTEI>
</enrichments>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/OcrV1/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000886 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 000886 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    OcrV1
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D
   |texte=   Document Signature Using Intrinsic Features for Counterfeit Detection
}}

Wicri

This area was generated with Dilib version V0.6.32.
Data generation: Sat Nov 11 16:53:45 2017. Site generation: Mon Mar 11 23:15:16 2024