An approach to computer-aided document examination

In this paper we describe a knowledge-based expert system capable of investigating a typewritten document and acquiring evidence on its falsification. A document is assumed to be falsified if its typing has been performed in multiple typing sessions. Verification of document authenticity is carried out by subjecting a document to four tests: alignment analysis, symbol comparison, gray level intensity analysis and type font identification. Tests are performed in succession and failure of any one of the tests signifies possible document falsificaton.

[1]  Jirí Pik A hierarchical pattern description in the syntactic approach to pattern recognition , 1981, Pattern Recognit..

[2]  Nobuyuki Otsu,et al.  ATlreshold Selection Method fromGray-Level Histograms , 1979 .

[3]  George Nagy Normalization techniques for handprinted numerals , 1970, CACM.

[4]  Julius T. Tou Zoom-thresholding technique for boundary determination , 2004, International Journal of Computer & Information Sciences.

[5]  Azriel Rosenfeld,et al.  A Threshold Selection Technique , 1974, IEEE Transactions on Computers.

[6]  Franz L. Alt,et al.  Digital Pattern Recognition by Moments , 1962, JACM.

[7]  A. Rosenfeld Image pattern recognition , 1981, Proceedings of the IEEE.

[8]  Theodosios Pavlidis,et al.  Algorithms for Shape Analysis of Contours and Waveforms , 1980, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[9]  Russell A. Kirsch,et al.  Computer Interpretation of English Text and Picture Patterns , 1964, IEEE Trans. Electron. Comput..

[10]  C. Chow,et al.  Automatic boundary detection of the left ventricle from cineangiograms. , 1972, Computers and biomedical research, an international journal.