Forgery and Cheque Cards
نویسندگان
چکیده
منابع مشابه
Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards
Smart card has been adopted to various applications. In 2000, Hwang and Li proposed a remote user authentication scheme, which is also using smart card. Nine months later, Chan and Cheng pointed out that there is a weakness in the remote authentication scheme proposed by Hwang and Li. In this paper, we show that Chan and Cheng’s attack does not work well because they did not consider the format...
متن کاملSignature Processing in Handwritten Bank Cheque Images
-Signature is the most important feature of a bank cheque. Basically signature verification is a scheme to verify a cheque for its authentication. The data base consist of several bank’s cheque. The present paper focuses on different steps including browsing a bank cheque, pre-processing, feature extraction, recognition. Preprocessing stage includes image resizing, noise elimination, thinning e...
متن کاملSecuring Cloud Data and Cheque Truncation System with Visual Cryptography
Cloud computing is growing day-by-day in the current world scenario. Organizations are excited and worried at the same time to use cloud computing features as it will require for them to move their data on public cloud. Resource utilization is the main advantage of cloud computing which results in storing data of multiple clients in one place. Private cloud is preferred by the companies but it ...
متن کاملThe Prevention of Plastic and Cheque Fraud: a Briefing Paper
Inevitably, there is a tension between the provision of services in a market society and the management of crime risks in both public and private sectors. As central media of exchange in global networks, credit, debit and charge cards can never avoid the risk of crime entirely: the primary goals of corporations are profit maximisation rather than maximum crime reduction. There will always be so...
متن کاملForgery Detection by Local Correspondence Forgery Detection by Local Correspondence Forgery Detection by Local Correspondence
Signatures may be stylish or unconventional and have many personal characteristics that are challenging to reproduce by anyone other then the original author For this reason signatures are used and accepted as proof of authorship or consent on personal checks credit purchases and legal documents Currently signatures are veri ed only informally in many environments but the rapid development of c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Modern Law Review
سال: 1994
ISSN: 0026-7961
DOI: 10.1111/j.1468-2230.1994.tb01976.x