Domain-agnostic document authentication against practical recapturing attacks
C Chen, S Zhang, F Lan… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Recapturing attack can be employed as a simple but effective anti-forensic tool for digital
document images. Inspired by the document inspection process that compares a questioned …
document images. Inspired by the document inspection process that compares a questioned …
Detecting forged receipts with domain-specific ontology-based entities & relations
In this paper, we tackle the task of document fraud detection. We consider that this task can
be addressed with natural language processing techniques. We treat it as a regression …
be addressed with natural language processing techniques. We treat it as a regression …
Receipt Dataset for Document Forgery Detection
The widespread use of unsecured digital documents by companies and administrations as
supporting documents makes them vulnerable to forgeries. Moreover, image editing …
supporting documents makes them vulnerable to forgeries. Moreover, image editing …
A distortion model-based pre-screening method for document image tampering localization under recapturing attack
Document images are vulnerable to tampering by image editing tools. The forgery trace can
be concealed by a simple but effective counter-forensic measure, ie, recapturing the altered …
be concealed by a simple but effective counter-forensic measure, ie, recapturing the altered …
Domain generalization for document authentication against practical recapturing attacks
Recapturing attack can be employed as a simple but effective anti-forensic tool for digital
document images. Inspired by the document inspection process that compares a questioned …
document images. Inspired by the document inspection process that compares a questioned …
[PDF][PDF] Boosting up Source Scanner Identification Using Wavelets and Convolutional Neural Networks.
In today's media age, where dematerialization of documents facilitates and accelerates
many administrative processes, it is crucial to verify the origin of digital documents and the …
many administrative processes, it is crucial to verify the origin of digital documents and the …
Knowledge-based techniques for document fraud detection: a comprehensive study
Due to the availability of cost-effective scanners, printers, and image processing software,
document fraud detection is, unfortunately, quite common nowadays. The main challenges …
document fraud detection is, unfortunately, quite common nowadays. The main challenges …
Analysis of scanned documents for integrity and authenticity checking
CB Rabah - 2021 - theses.hal.science
There is no universal method for detecting counterfeit images. Several techniques have
been proposed but each has its limits. Among these methods, the so-called" forensic digital …
been proposed but each has its limits. Among these methods, the so-called" forensic digital …
[HTML][HTML] Boosting up Source Scanner Identification Using Wavelets and Convolutional Neural Networks Boosting up Source Scanner Identification Using Wavelets …
In this paper, we present a conceptually innovative method for source scanner identification
(SSI), that is to say, identifying the scanner at the origin of a scanned document. Solutions …
(SSI), that is to say, identifying the scanner at the origin of a scanned document. Solutions …