Print signatures for document authentication
暂无分享,去创建一个
[1] Remco C. Veltkamp,et al. State of the Art in Shape Matching , 2001, Principles of Visual Information Retrieval.
[2] Fernando Pérez-González,et al. Visible encryption: using paper as a secure channel , 2003, IS&T/SPIE Electronic Imaging.
[3] Jerome Swartz,et al. Information encoding with two-dimensional bar codes , 1992, Computer.
[4] Van Renesse,et al. Optical document security , 1994 .
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] Proceedings of the 1983 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 25-27, 1983 , 1983, IEEE Symposium on Security and Privacy.
[7] Abigail Sellen,et al. The myth of the paperless office , 2001 .
[8] Christian Kuhn. The security document , 2005 .
[9] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[10] Jack Brassil,et al. Tracing the Source of a Shredded Document , 2002, Information Hiding.
[11] Joshua R. Smith,et al. FiberFingerprint Identification , 2002 .
[12] Christine Reid,et al. The Myth of the Paperless Office , 2003, J. Documentation.
[13] Stephen J. Bigelow,et al. Easy Laser Printer Maintenance and Repair , 1994 .
[14] N. Otsu. A threshold selection method from gray level histograms , 1979 .
[15] E. Ziegel. Introduction to the Theory and Practice of Econometrics , 1989 .
[16] Jerome Swartz,et al. Fundamentals of bar code information theory , 1990, Computer.
[17] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..