Stamp Verification for Automated Document Authentication
نویسندگان
چکیده
Stamps, along with signatures, can be considered as the most widely used extrinsic security feature in paper documents. In contrast to signatures, however, for stamps little work has been done to automatically verify their authenticity. In this paper, an approach for verification of color stamps is presented. We focus on photocopied stamps as nongenuine stamps. Our previously presented stamp detection method is improved and extended to verify that the stamp is genuine and not a copy. Using a variety of features, a classifier is trained that allows successful separation between genuine stamps and copied stamps. Sensitivity and specificity of up to 95% could be obtained on a data set that is publicly available.
منابع مشابه
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملVerification of Authenticity of Stamps in Documents
Classical ink stamps and seals used for authentication of a document content have become relatively easy to forge by the scan&print technique since the technology is available to general public. For environments where a huge volume of documents is processed, an automatic system for verification of authenticity of stamps has been developed in the scope of this work. The process of stamp authenti...
متن کاملUser Signature Identification and Image Pixel Pattern Verification
Online Internet applications are used widely all over the world. Especially the secured applications like banking and financial applications the basic authentication is password and one time password verification. The new system is facilitated with signature based authentication and graphical pattern authentication based on Multimodal Verification System. The new system uses contourlet based tr...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملSome Critical Aspects of the PKIX TSP
Authentication, non-repudiation, and digital signatures, require the ability to determine if a data token existed at a certain moment in time when the creator’s credentials were valid. Time-stamps are tokens which contain a verifiable cryptographic link between a time value and a data representation. The paper presents some critical aspects of the X.509 Public Key Infrastructure Time Stamp Prot...
متن کامل