References
- van Renesse RL. Paper based document security – a review. Proceedings Conference on Security and detection, ECOS 97, 1997: 75–80.
- Zhang Y, Ma Y, Li YQ. Perforated number anti-counterfeiting, in Documents anti-counterfeiting and examine, 2014: 156–178. China: Chinese People’s Public Security University.
- ICAO. Doc9303 – machine readable travel document Canada: International Civil Aviation Organization. (Report Part 1, Vol. 2); 2006.
- Samsul W, Uranus HP, Birowosuto MD. Recognizing document’s originality by laser surface authentication. In: Advances in Computing, Control and Telecommunication Technologies (ACT), 2010 Second International Conference 2010: 37–40.
- Garain U, Halder B. Machine authentication of security documents. In: Document analysis and recognition, 2009. ICDAR ‘09. 10th International Conference 2009: 718–722.
- Alginahi YM. Thresholding and character recognition in security documents with watermarked background. Digit Image Comput Tech Appl. (DICTA), 2008:220–225.
- Hae-Yeoun L, Jung-Ho C. Identifying color laser printer using noisy feature and support vector machine. In: Ubiquitous information technologies and applications (CUTE), 2010 Proceedings 5th International Conference 2010, Paper 1–6.
- Liang H, Qinghu C, Wei D, et al. A WHD-based method for printer identification, in Intelligent systems and applications, 2009. ISA 2009. International Workshop, 2009: 1–4.
- Otsu N. A threshold selection method from gray-level histograms. Automatica, 1975;11(285–296):23–27.
- He LF, Chao YY, Suzuki K. Fast connected-component labeling. Pattern Recogn. 2009;42(9):1977–1987. doi: 10.1016/j.patcog.2008.10.013
- Wan W, Zhou S. Research of roundness error visual evaluation system. J Nanchang Hangkong Univ Nat Sci Edit. 2014;28(2):105–108.
- Deng JN, An ZY, Qi JQ. A high precision detection method for hole roundness. J Changchun Univ Sci Technol Nat Sci Edit. 2014;37(1):58–64.
- Lloyd SP. Least squares quantization in PCM. IEEE Trans Inf Theory. 1982;28:129–137. doi: 10.1109/TIT.1982.1056489
- Kanungo T, Mount DM, Netanyahu NS, et al. An efficient k-means clustering algorithm: analysis and implementation. IEEE Trans Pattern Anal Mach Intell. 2002;24(7):881–892. doi: 10.1109/TPAMI.2002.1017616
- Liu Y, Zhu LS, Xiong QJ. Development of quality detecting system for micro holes by ECM based on machine vision technology. Appl Mech Mater 2013 Trans Tech Publ. 2013:397:1482–1485.
- Fei ZG, Guo, JJ, Li, CS. A new method for detecting the diameter and spatial location of tiny through-hole. Adv Mater Res 2011, Trans Tech Publ. 2011;189:4186–4190.