2015
DOI: 10.14257/ijsia.2015.9.8.31
|View full text |Cite
|
Sign up to set email alerts
|

Printed Document Authentication Using Two-Dimensional (2D) Barcodes and Image Processing Techniques

Abstract: Advancements in information and communication technologies have made it easier to forge printed documents these days. Forgery of printed document could have serious repercussions including financial losses, so maintaining the reliability of valuable documents is one that is timely and necessary. The document authentication approach in this study is one that involves tracing of the origin of a document through its contents. The approach explores viability of embedding certain information on printed documents fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…Digital document is designed to produce visual information on the computer monitor [10]. Forgery of documents has increased jeopardizing the integrity of both the document holder and the organization that issued the document [4][5]. The forgery of document is classified into two types which are 1) altering part of an authentic document that is original and 2) producing a new fake certificate with false information [10].…”
Section: Document Verification Workflowmentioning
confidence: 99%
See 2 more Smart Citations
“…Digital document is designed to produce visual information on the computer monitor [10]. Forgery of documents has increased jeopardizing the integrity of both the document holder and the organization that issued the document [4][5]. The forgery of document is classified into two types which are 1) altering part of an authentic document that is original and 2) producing a new fake certificate with false information [10].…”
Section: Document Verification Workflowmentioning
confidence: 99%
“…A graduation certificate is still in the form of a paper-based document because, as of yet, an electronic document cannot effectively replace a physical certificate [13]. With the rise of graduates and advancements in printing and photocopying technologies, came the rise of fake certificates as well threatening the integrity of both the certificate holder and the university that has issued the certificate [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. This means that document validation and verification has become an important task The graduation certificate has to be verified to ensure that its content is true and also to ensure that the issued certificate comes from a real source [2].…”
Section: The Graduation Certificatementioning
confidence: 99%
See 1 more Smart Citation
“…Till date, a number of techniques have been proposed for seamless document verification [1], [2]. Among them, digital watermarking techniques intend determine the ownership and integrity for digital content [3]. Watermarking techniques intend to detect noise introduced in a document while printing.…”
Section: Introductionmentioning
confidence: 99%
“…Amidror [4] presented an intrinsic security model which integrates print-based authentication and a security strategy for the protection of valuable documents. This technique is based on more intensity profiles and mathematical transformations of the microstructure of a document to generate an attractive, dynamic visual effect [3]. The author claimed that the counterfeiting of authenticity is difficult but the way of 623 | P a g e www.ijacsa.thesai.org verification from the level of mass people is almost impossible [4].…”
Section: Introductionmentioning
confidence: 99%