Serveur d'exploration sur l'OCR

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Document Signature Using Intrinsic Features for Counterfeit Detection

Identifieur interne : 000C56 ( Main/Merge ); précédent : 000C55; suivant : 000C57

Document Signature Using Intrinsic Features for Counterfeit Detection

Auteurs : Joost Van Beusekom [Allemagne] ; Faisal Shafait [Allemagne] ; M. Breuel [Allemagne]

Source :

RBID : ISTEX:1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D

Abstract

Abstract: Document security does not only play an important role in specific domains e.g. passports, checks and degrees but also in every day documents e.g. bills and vouchers. Using special high-security features for this class of documents is not feasible due to the cost and the complexity of these methods. We present an approach for detecting falsified documents using a document signature obtained from its intrinsic features: bounding boxes of connected components are used as a signature. Using the model signature learned from a set of original bills, our approach can identify documents whose signature significantly differs from the model signature. Our approach uses globally optimal document alignment to build a model signature that can be used to compute the probability of a new document being an original one. Preliminary evaluation shows that the method is able to reliably detect faked documents.

Url:
DOI: 10.1007/978-3-540-85303-9_5

Links toward previous steps (curation, corpus...)


Links to Exploration step

ISTEX:1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Document Signature Using Intrinsic Features for Counterfeit Detection</title>
<author>
<name sortKey="Van Beusekom, Joost" sort="Van Beusekom, Joost" uniqKey="Van Beusekom J" first="Joost" last="Van Beusekom">Joost Van Beusekom</name>
</author>
<author>
<name sortKey="Shafait, Faisal" sort="Shafait, Faisal" uniqKey="Shafait F" first="Faisal" last="Shafait">Faisal Shafait</name>
</author>
<author>
<name sortKey="Breuel, M" sort="Breuel, M" uniqKey="Breuel M" first="M." last="Breuel">M. Breuel</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D</idno>
<date when="2008" year="2008">2008</date>
<idno type="doi">10.1007/978-3-540-85303-9_5</idno>
<idno type="url">https://api.istex.fr/document/1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000886</idno>
<idno type="wicri:Area/Istex/Curation">000876</idno>
<idno type="wicri:Area/Istex/Checkpoint">000711</idno>
<idno type="wicri:doubleKey">0302-9743:2008:Van Beusekom J:document:signature:using</idno>
<idno type="wicri:Area/Main/Merge">000C56</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Document Signature Using Intrinsic Features for Counterfeit Detection</title>
<author>
<name sortKey="Van Beusekom, Joost" sort="Van Beusekom, Joost" uniqKey="Van Beusekom J" first="Joost" last="Van Beusekom">Joost Van Beusekom</name>
<affiliation wicri:level="4">
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>Technical University of Kaiserslautern, Kaiserslautern</wicri:regionArea>
<placeName>
<region type="land" nuts="2">Rhénanie-Palatinat</region>
<settlement type="city">Kaiserslautern</settlement>
</placeName>
<orgName type="university">Université de technologie de Kaiserslautern</orgName>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author>
<name sortKey="Shafait, Faisal" sort="Shafait, Faisal" uniqKey="Shafait F" first="Faisal" last="Shafait">Faisal Shafait</name>
<affiliation wicri:level="3">
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>German Research Center for Artificial Intelligence (DFKI), Kaiserslautern</wicri:regionArea>
<placeName>
<region type="land" nuts="2">Rhénanie-Palatinat</region>
<settlement type="city">Kaiserslautern</settlement>
</placeName>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author>
<name sortKey="Breuel, M" sort="Breuel, M" uniqKey="Breuel M" first="M." last="Breuel">M. Breuel</name>
<affiliation wicri:level="4">
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>Technical University of Kaiserslautern, Kaiserslautern</wicri:regionArea>
<placeName>
<region type="land" nuts="2">Rhénanie-Palatinat</region>
<settlement type="city">Kaiserslautern</settlement>
</placeName>
<orgName type="university">Université de technologie de Kaiserslautern</orgName>
</affiliation>
<affiliation wicri:level="3">
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>German Research Center for Artificial Intelligence (DFKI), Kaiserslautern</wicri:regionArea>
<placeName>
<region type="land" nuts="2">Rhénanie-Palatinat</region>
<settlement type="city">Kaiserslautern</settlement>
</placeName>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2008</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D</idno>
<idno type="DOI">10.1007/978-3-540-85303-9_5</idno>
<idno type="ChapterID">5</idno>
<idno type="ChapterID">Chap5</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: Document security does not only play an important role in specific domains e.g. passports, checks and degrees but also in every day documents e.g. bills and vouchers. Using special high-security features for this class of documents is not feasible due to the cost and the complexity of these methods. We present an approach for detecting falsified documents using a document signature obtained from its intrinsic features: bounding boxes of connected components are used as a signature. Using the model signature learned from a set of original bills, our approach can identify documents whose signature significantly differs from the model signature. Our approach uses globally optimal document alignment to build a model signature that can be used to compute the probability of a new document being an original one. Preliminary evaluation shows that the method is able to reliably detect faked documents.</div>
</front>
</TEI>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/OcrV1/Data/Main/Merge
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000C56 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Merge/biblio.hfd -nk 000C56 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    OcrV1
   |flux=    Main
   |étape=   Merge
   |type=    RBID
   |clé=     ISTEX:1F1888D29239A5E61CB93EBC7B96F4C5C62F5F2D
   |texte=   Document Signature Using Intrinsic Features for Counterfeit Detection
}}

Wicri

This area was generated with Dilib version V0.6.32.
Data generation: Sat Nov 11 16:53:45 2017. Site generation: Mon Mar 11 23:15:16 2024