163
Views
1
CrossRef citations to date
0
Altmetric
Articles

Forgery detection for perforated number in security document by analysing the perforated holes

&
Pages 40-48 | Received 04 Sep 2016, Accepted 01 Nov 2016, Published online: 09 Mar 2017

References

  • van Renesse RL. Paper based document security – a review. Proceedings Conference on Security and detection, ECOS 97, 1997: 75–80.
  • Zhang Y, Ma Y, Li YQ. Perforated number anti-counterfeiting, in Documents anti-counterfeiting and examine, 2014: 156–178. China: Chinese People’s Public Security University.
  • ICAO. Doc9303 – machine readable travel document Canada: International Civil Aviation Organization. (Report Part 1, Vol. 2); 2006.
  • Samsul W, Uranus HP, Birowosuto MD. Recognizing document’s originality by laser surface authentication. In: Advances in Computing, Control and Telecommunication Technologies (ACT), 2010 Second International Conference 2010: 37–40.
  • Garain U, Halder B. Machine authentication of security documents. In: Document analysis and recognition, 2009. ICDAR ‘09. 10th International Conference 2009: 718–722.
  • Alginahi YM. Thresholding and character recognition in security documents with watermarked background. Digit Image Comput Tech Appl. (DICTA), 2008:220–225.
  • Hae-Yeoun L, Jung-Ho C. Identifying color laser printer using noisy feature and support vector machine. In: Ubiquitous information technologies and applications (CUTE), 2010 Proceedings 5th International Conference 2010, Paper 1–6.
  • Liang H, Qinghu C, Wei D, et al. A WHD-based method for printer identification, in Intelligent systems and applications, 2009. ISA 2009. International Workshop, 2009: 1–4.
  • Otsu N. A threshold selection method from gray-level histograms. Automatica, 1975;11(285–296):23–27.
  • He LF, Chao YY, Suzuki K. Fast connected-component labeling. Pattern Recogn. 2009;42(9):1977–1987. doi: 10.1016/j.patcog.2008.10.013
  • Wan W, Zhou S. Research of roundness error visual evaluation system. J Nanchang Hangkong Univ Nat Sci Edit. 2014;28(2):105–108.
  • Deng JN, An ZY, Qi JQ. A high precision detection method for hole roundness. J Changchun Univ Sci Technol Nat Sci Edit. 2014;37(1):58–64.
  • Lloyd SP. Least squares quantization in PCM. IEEE Trans Inf Theory. 1982;28:129–137. doi: 10.1109/TIT.1982.1056489
  • Kanungo T, Mount DM, Netanyahu NS, et al. An efficient k-means clustering algorithm: analysis and implementation. IEEE Trans Pattern Anal Mach Intell. 2002;24(7):881–892. doi: 10.1109/TPAMI.2002.1017616
  • Liu Y, Zhu LS, Xiong QJ. Development of quality detecting system for micro holes by ECM based on machine vision technology. Appl Mech Mater 2013 Trans Tech Publ. 2013:397:1482–1485.
  • Fei ZG, Guo, JJ, Li, CS. A new method for detecting the diameter and spatial location of tiny through-hole. Adv Mater Res 2011, Trans Tech Publ. 2011;189:4186–4190.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.