Important paper-based documents exposed to forgery such as: official certificates, birth, marriage, death certificates, selling and buying documents and other legal documents is more and more serious and sophisticated. With the purposes of fraud, appropriation of property, job application and assignment in order to swindle public authorities, this forgery has led to material loss, belief deterioration as well as social instability. There are many techniques has been proposed to overcome this issue such as: ink stamps, live signatures, documented the transaction in third party like the court or notary. In this paper, it’s proposed a feasible solution for forgery prevention for paper-based documents using cloud computing application. With the...
Part 8: Pattern Recognition and Image ProcessingInternational audiencePaper-based documents are impo...
Printed documents are still relevant in our daily life and information in it must be protected from ...
The modified SHA-1 algorithm was applied in the data integrity verification process of certificates ...
Important paper-based documents Exposed to forgery such as: official certificates, birth, marriage, ...
The authenticity and integrity of documents are essential in data exchange and communication. Digita...
Abstract- QR codes are developed by a Japanese company has been around for over fifteen years. With ...
A previous study has been conducted integrating modification on secure hash algorithm 1 (SHA-1) to d...
Counterfeit production is a threat for every genuine business causing damage to their brand image an...
With the rapid development of the Internet, many problems regarding the processing of electronic doc...
The authenticity and integrity of documents are essential in data exchange and communication. Digita...
Abstract: QR code stands for Quick response code which is a two dimensional matrix barcode used for ...
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University Lo...
Part 8: Pattern Recognition and Image ProcessingInternational audiencePaper-based documents are impo...
Electronic and printed text documents are still the most common means of information communication a...
Electronic and printed text documents are still the most common means of information communication a...
Part 8: Pattern Recognition and Image ProcessingInternational audiencePaper-based documents are impo...
Printed documents are still relevant in our daily life and information in it must be protected from ...
The modified SHA-1 algorithm was applied in the data integrity verification process of certificates ...
Important paper-based documents Exposed to forgery such as: official certificates, birth, marriage, ...
The authenticity and integrity of documents are essential in data exchange and communication. Digita...
Abstract- QR codes are developed by a Japanese company has been around for over fifteen years. With ...
A previous study has been conducted integrating modification on secure hash algorithm 1 (SHA-1) to d...
Counterfeit production is a threat for every genuine business causing damage to their brand image an...
With the rapid development of the Internet, many problems regarding the processing of electronic doc...
The authenticity and integrity of documents are essential in data exchange and communication. Digita...
Abstract: QR code stands for Quick response code which is a two dimensional matrix barcode used for ...
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University Lo...
Part 8: Pattern Recognition and Image ProcessingInternational audiencePaper-based documents are impo...
Electronic and printed text documents are still the most common means of information communication a...
Electronic and printed text documents are still the most common means of information communication a...
Part 8: Pattern Recognition and Image ProcessingInternational audiencePaper-based documents are impo...
Printed documents are still relevant in our daily life and information in it must be protected from ...
The modified SHA-1 algorithm was applied in the data integrity verification process of certificates ...