Security Informatics in Complex Documents
نویسندگان
چکیده
Paper documents are routinely found in general litigation and criminal and terrorist investigations. The current state-of-the-art processing of these documents is to simply OCR them and search strictly the text. This ignores all handwriting, signatures, logos, images, watermarks, and any other non-text artifacts in a document. Technology, however, exists to extract key metadata from paper documents such as logos and signatures and match these against a set of known logos and signatures. We describe a prototype that moves beyond simply the OCR processing of paper documents and relies on additional documents artifacts rather than only on text in the search process. We also describe a benchmark developed for the evaluation of paper document
منابع مشابه
Jikzi - a new framework for security policy, trusted publishing and electronic commerce
In this paper, we describe a thread of research which we have followed o and on at Cambridge for about three years. Our topic is the security of electronic documents, in the broad sense: how can we be sure of the authenticity of things that are published electronically? This started o as a relatively small project, which we thought would take only a few weeks. The goal was to help our medical i...
متن کاملIran and Security Complex in the Persian Gulf
This article enters into the debate on the link between security and identity by looking at the security context in the states surrounding the Persian Gulf, particularly Iran. Earlier scholarly works have approached security and identity separately, but lack a framework that connects them in a single account. The process tracing method offers a scientific approach to connect various notions in ...
متن کاملThe Study of Effective Factors with Emphasis on Training for Employees' Empowerment in Center for Medical Documents in Social Security Organization
In an organization, human resources are known as a valuable and lasting capital. In order to get the most out of these resources, employees' empowerment appeared in the management literature. Empowerment refers to the delegation of authority in order to lay appropriate ground for self-motivation and self-efficacy among employees.The main aim of this study was to explore the effective factors, e...
متن کاملمفهوم و جایگاه حق تأمین اجتماعی در اسناد بینالمللی
Social security as a social and historical phenomenon, is being considered as the result of economic and social development process especially in developing industrial societies proposed as the individual security requirements against the social risks but its legal norms in the human right framework needs international community attention on the basis of issuing international documents, rules a...
متن کاملRole and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کامل