Automatic authentication of color laser print-outs using machine identification codes
暂无分享,去创建一个
[1] Heung-Kyu Lee,et al. Color laser printer identification by analyzing statistical features on discrete wavelet transform , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[2] Thomas M. Breuel,et al. Evaluation of Graylevel-Features for Printing Technique Classification in High-Throughput Document Management Systems , 2008, IWCF.
[3] Jan P. Allebach,et al. Intrinsic and Extrinsic Signatures for Information Hiding and Secure Printing with Electrophotographic Devices , 2003, NIP & Digital Fabrication Conference.
[4] Sargur N. Srihari,et al. A Machine Learning Approach to Off-Line Signature Verification Using Bayesian Inference , 2009, IWCF.
[5] Thomas M. Breuel,et al. Efficient implementation of local adaptive thresholding techniques using integral images , 2008, Electronic Imaging.
[6] N. Otsu. A threshold selection method from gray level histograms , 1979 .
[7] Martin Neebe,et al. Multifunctional optical security features based on bacteriorhodopsin , 2004, IS&T/SPIE Electronic Imaging.
[8] Thomas M. Breuel,et al. Implementation techniques for geometric branch-and-bound matching methods , 2003, Comput. Vis. Image Underst..
[9] L Rudolf,et al. Optical Security and Counterfeit Deterrence Techniques III , 1996 .
[10] Siyuan Chen,et al. A New Off-line Signature Verification Method based on Graph , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[11] Jan P. Allebach,et al. Printer identification based on graylevel co-occurrence features for security and forensic applications , 2005, IS&T/SPIE Electronic Imaging.
[12] R. L. van Renesse,et al. Paper based document security-a review , 1997 .
[13] Rudolf L. van Renesse,et al. Hidden and scrambled images: a review , 2002, IS&T/SPIE Electronic Imaging.
[14] Yun Q. Shi,et al. A Novel Multi-size Block Benford's Law Scheme for Printer Identification , 2010, PCM.
[15] Sargur N. Srihari,et al. Computational Forensics: An Overview , 2008, IWCF.
[16] Thomas M. Breuel,et al. Automatic counterfeit protection system code classification , 2010, Electronic Imaging.
[17] Isaac Amidror. New print-based security strategy for the protection of valuable documents and products using moire intensity profiles , 2002, IS&T/SPIE Electronic Imaging.
[18] Lambert Schomaker,et al. Automatic writer identification using connected-component contours and edge-based features of uppercase Western script , 2004, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[19] Carlos Luna,et al. Commercial anticounterfeit products using machine vision , 2004, IS&T/SPIE Electronic Imaging.
[20] Sargur N. Srihari,et al. Comparison of historical documents for writership , 2010, Electronic Imaging.
[21] Jan P. Allebach,et al. Survey of Scanner and Printer Forensics at Purdue University , 2008, IWCF.
[22] Matti Pietikäinen,et al. Adaptive document image binarization , 2000, Pattern Recognit..
[23] Willem A. Vliegenthart,et al. Optical security and counterfeit deterrence techniques III : 27-28 January 2000, San Jose, California , 2000 .
[24] Thomas M. Breuel. Binary Morphology and Related Operations on Run-Length Representations , 2008, VISAPP.
[25] Lambert Schomaker,et al. Automatic writer identification using fragmented connected-component contours , 2004, Ninth International Workshop on Frontiers in Handwriting Recognition.
[26] Thomas M. Breuel. A practical, globally optimal algorithm for geometric matching under uncertainty , 2001, Electron. Notes Theor. Comput. Sci..
[27] Rudolf L. van Renesse. Ordering the order: a survey of optical document security features , 1995 .
[28] Thomas M. Breuel,et al. Combined orientation and skew detection using geometric text-line modeling , 2009, International Journal on Document Analysis and Recognition (IJDAR).
[29] Marco Schreyer,et al. Intelligent Printing Technique Recognition and Photocopy Detection for Forensic Document Examination , 2009, Informatiktage.
[30] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[31] Thomas M. Breuel,et al. Using DCT Features for Printing Technique and Copy Detection , 2009, IFIP Int. Conf. Digital Forensics.