Security Informatics in Complex Documents

نویسندگان

  • G. AGAM
  • D. GROSSMAN
  • O. FRIEDER
چکیده

Paper documents are routinely found in general litigation and criminal and terrorist investigations. The current state-of-the-art processing of these documents is to simply OCR them and search strictly the text. This ignores all handwriting, signatures, logos, images, watermarks, and any other non-text artifacts in a document. Technology, however, exists to extract key metadata from paper documents such as logos and signatures and match these against a set of known logos and signatures. We describe a prototype that moves beyond simply the OCR processing of paper documents and relies on additional documents artifacts rather than only on text in the search process. We also describe a benchmark developed for the evaluation of paper document

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Jikzi - a new framework for security policy, trusted publishing and electronic commerce

In this paper, we describe a thread of research which we have followed o and on at Cambridge for about three years. Our topic is the security of electronic documents, in the broad sense: how can we be sure of the authenticity of things that are published electronically? This started o as a relatively small project, which we thought would take only a few weeks. The goal was to help our medical i...

متن کامل

Iran and Security Complex in the Persian Gulf

This article enters into the debate on the link between security and identity by looking at the security context in the states surrounding the Persian Gulf, particularly Iran. Earlier scholarly works have approached security and identity separately, but lack a framework that connects them in a single account. The process tracing method offers a scientific approach to connect various notions in ...

متن کامل

The Study of Effective Factors with Emphasis on Training for Employees' Empowerment in Center for Medical Documents in Social Security Organization

In an organization, human resources are known as a valuable and lasting capital. In order to get the most out of these resources, employees' empowerment appeared in the management literature. Empowerment refers to the delegation of authority in order to lay appropriate ground for self-motivation and self-efficacy among employees.The main aim of this study was to explore the effective factors, e...

متن کامل

مفهوم و جایگاه حق تأمین اجتماعی در اسناد بین‌المللی

Social security as a social and historical phenomenon, is being considered as the result of economic and social development process especially in developing industrial societies proposed as the individual security requirements against the social risks but its legal norms in the human right framework needs international community attention on the basis of issuing international documents, rules a...

متن کامل

Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007