Printed Document Integrity Verification Using Barcode
暂无分享,去创建一个
[1] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[2] P. Bhambri. A Novel Approach of Zero Watermarking for Text Documents , 2015 .
[3] Saeed Mozaffari,et al. Watermarking in binary document images using fractal codes , 2014, Pattern Recognit. Lett..
[4] Oriol Ramos Terrades,et al. A System Based on Intrinsic Features for Fraudulent Document Detection , 2013, 2013 12th International Conference on Document Analysis and Recognition.
[5] Anurag Jain,et al. Data Compression Techniques : A Comparative Study , 2013 .
[6] N. Hiransakolwong,et al. Grid-line watermarking: A novel method for creating a high-performance text-image watermark , 2013 .
[7] Nazori Agani,et al. Document Authentication Using Print-Scan Image Watermarking Based on DCT (Discrete Cosine Transform) Algorithm , 2013 .
[8] Steven J. Simske,et al. Modulation in the HVS Domain for Hardcopy Watermarking of Color Documents , 2012, 2012 Eighth International Conference on Signal Image Technology and Internet Based Systems.
[9] P. D. Bharati,et al. Text watermarking algorithm using structural approach , 2012, 2012 World Congress on Information and Communication Technologies.
[10] Muhammad Khurram Khan,et al. Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes , 2012, 2012 International Symposium on Biometrics and Security Technologies.
[11] Hector Perez-Meana,et al. Identity Document Authentication Based on VSS and QR Codes , 2012 .
[12] Thomas M. Breuel,et al. Text-line examination for document forgery detection , 2011, International Journal on Document Analysis and Recognition (IJDAR).
[13] Senthil Shanmugasundaram,et al. A Comparative Study Of Text Compression Algorithms , 2011 .
[14] Anwar M. Mirza,et al. A zero-watermarking algorithm for text documents based on structural components , 2010, 2010 International Conference on Information and Emerging Technologies.
[15] Xiaojun Liu,et al. A New Digital Watermarking Scheme Based on Text , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[16] Reza Davarzani,et al. Farsi Text Watermarking Based on Character Coding , 2009, 2009 International Conference on Signal Processing Systems.
[17] Mi-Young Kim. Natural Language Watermarking by Morpheme Segmentation , 2009, 2009 First Asian Conference on Intelligent Information and Database Systems.
[18] Bülent Sankur,et al. Natural language watermarking via morphosyntactic alterations , 2009, Comput. Speech Lang..
[19] Hong Wang,et al. Natural Language Watermarking Using Chinese Syntactic Transformations , 2008 .
[20] Donald W. Simborg. Viewpoint Paper: Healthcare Fraud: Whose Problem is it Anyway? , 2008, J. Am. Medical Informatics Assoc..
[21] Benoit M. Macq,et al. Natural Language Watermarking and Robust Hashing Based on Presuppositional Analysis , 2007, 2007 IEEE International Conference on Information Reuse and Integration.
[22] Sheng Huang,et al. Optical Watermarking for Printed Document Authentication , 2007, IEEE Transactions on Information Forensics and Security.
[23] Olli Nevalainen,et al. A Standalone OCR System for Mobile Cameraphones , 2006, 2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications.
[24] Mohammad Hassan Shirali-Shahreza,et al. A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).
[25] Xingming Sun,et al. A Natural Language Watermarking Based on Chinese Syntax , 2005, ICNC.
[26] Alex Biryukov,et al. Analysis of a SHA-256 Variant , 2005, Selected Areas in Cryptography.
[27] Helena Handschuh,et al. Security Analysis of SHA-256 and Sisters , 2003, Selected Areas in Cryptography.
[28] Radu Sion,et al. Natural Language Watermarking and Tamperproofing , 2002, Information Hiding.
[29] Rudolf L. van Renesse. Hidden and scrambled images: a review , 2002 .
[30] Hong Yan,et al. Interword distance changes represented by sine waves for watermarking text images , 2001, IEEE Trans. Circuits Syst. Video Technol..
[31] Arlindo L. Oliveira. Techniques for the creation of digital watermarks in sequentialcircuit designs , 2001, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[32] Sergei Nirenburg,et al. Natural language processing for information assurance and security: an overview and implementations , 2001, NSPW '00.
[33] Pieter Retief Kasselman,et al. Analysis and design of cryptographic hash functions , 1999 .
[34] Ingemar J. Cox,et al. Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[35] C. Biermann. Paper and Its Properties , 1996 .
[36] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.