A secured distributed OCR system in a pervasive environment with authentication as a service in the Cloud

In this paper we explore the potential for securing a distributed Arabic Optical Character Recognition (OCR) system via cloud computing technology in a pervasive and mobile environment. The goal of the system is to achieve full accuracy, high speed and security when taking into account large vocabularies and amounts of documents. This issue has been resolved by integrating the recognition process and the security issue with multiprocessing and distributed computing technologies.

[1]  William E. Johnston,et al.  Certificate-based Access Control for Widely Distributed Resources , 1999, USENIX Security Symposium.

[2]  Jiang Xingguo,et al.  A Method to Streamline the TCP/IP Protocol Stack at Embedded Systems , 2010, 2010 International Conference of Information Science and Management Engineering.

[3]  Ákos Frohner,et al.  VOMS, an Authorization System for Virtual Organizations , 2003, European Across Grids Conference.

[4]  Mohammed Nadir Djedid,et al.  A trust-based security mechanism for nomadic users in pervasive systems , 2012, ArXiv.

[5]  Hamdi Hassen,et al.  A Comparative study of Arabic handwritten characters invariant feature , 2012, ArXiv.

[6]  Radu Prodan,et al.  A survey and taxonomy of infrastructure as a service and web hosting cloud providers , 2009, 2009 10th IEEE/ACM International Conference on Grid Computing.

[7]  Ian T. Foster,et al.  A community authorization service for group collaboration , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[8]  XiaoFeng Wang,et al.  Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services , 2012, 2012 IEEE Symposium on Security and Privacy.

[9]  M. Pechwitz,et al.  IFN/ENIT: database of handwritten arabic words , 2002 .

[10]  Byron L. D. Bezerra,et al.  A KNN-SVM hybrid model for cursive handwriting recognition , 2012, The 2012 International Joint Conference on Neural Networks (IJCNN).

[11]  Hideaki Goto OCRGrid : A Platform for Distributed and Cooperative OCR Systems , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[12]  Jörg Schwenk,et al.  Secure Bindings of SAML Assertions to TLS Sessions , 2010, 2010 International Conference on Availability, Reliability and Security.

[13]  Frank Stajano,et al.  Security for Ubiquitous Computing , 2002, ICISC.

[14]  Anna van Raaphorst OASIS (Organization for the Advancement of Structured Information Standards) , 2006 .

[15]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.

[16]  Drummond Reed,et al.  OpenID 2.0: a platform for user-centric identity management , 2006, DIM '06.

[17]  David W. Chadwick,et al.  The PERMIS X.509 role based privilege management infrastructure , 2002, SACMAT '02.

[18]  Jukka Riekki,et al.  Pervasive Service Computing toward Accommodating Service Coordination and Collaboration , 2009, 2009 Fourth International Conference on Frontier of Computer Science and Technology.

[19]  Thomas M. Breuel,et al.  The OCRopus open source OCR system , 2008, Electronic Imaging.

[20]  Mansour Alsaleh,et al.  Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks , 2006, Privacy Enhancing Technologies.

[21]  Se-Young Oh,et al.  Efficient Human-like Memory Management based on Walsh-based Associative Memory for Real-time Pattern Recognition , 2006, The 2006 IEEE International Joint Conference on Neural Network Proceedings.

[22]  Singh Ghuman,et al.  Cloud Computing-A Study of Infrastructure as a Service , 2015 .

[23]  Rose Holley,et al.  How Good Can It Get? Analysing and Improving OCR Accuracy in Large Scale Historic Newspaper Digitisation Programs , 2009, D Lib Mag..