Using image analysis systems in forensics and security printing

被引:0
|
作者
Kipman, Y [1 ]
Johnson, K [1 ]
机构
[1] ImageXpert Inc, Nashua, NH USA
关键词
D O I
暂无
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
Image analysis tools are currently in use for a variety of applications in the fields of forensics and security printing. Objective, quantitative data allow for characterization and comparison of a variety of image attributes. In forensics, document examiners can use quantitative image analysis systems in authentication, detection and analysis of forgeries, counterfeits and altered documents. Statistical analysis enables population characterization that can help in forgery detection and supports the potential for source identification. In security printing, image analysis tools can be applied to measure the quality of printed output and assess wear for bank notes. Flexible hardware options allow for a broad application of image quality measurements in a variety of image analysis situations. Camera and scanner-based image quality systems can be used for quantitative analysis of image content. A laser-based system can be used for height and depth profiling. Oblique angle illumination and scanning can be used for impression detection. A flatbed scanner can be used in transmission mode for the evaluation of bank note wear and for watermark analysis. In this paper, we will be discussing the use of a variety of hardware configurations for image analysis in forensics and security printing.
引用
收藏
页码:318 / 322
页数:5
相关论文
共 50 条
  • [21] Analysis of Secured Video Steganography Using Computer Forensics Technique for Enhance Data Security
    Moon, Sunil. K.
    Raut, Rajeshree. D.
    2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2013, : 660 - 665
  • [22] Methodology and Challenges in Digital Security Forensics of Wireless Systems and Devices
    Achi, H.
    Hellany, A.
    Nagrial, M.
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES 2009), 2009, : 283 - 287
  • [23] Failure Forensics of Shaped PDC Cutters Using Image Analysis and Deep Learning
    Liu, Wei
    Li, Jianchao
    Gao, Deli
    SPE JOURNAL, 2024, 29 (04): : 1832 - 1846
  • [24] Information Security and Digital Forensics in the world of Cyber Physical Systems
    Jones, Andrew
    Vidalis, Stilianos
    Abouzakhar, Nasser
    2016 ELEVENTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM 2016), 2016, : 10 - 14
  • [25] Using Memory Forensics to Investigate Security and Privacy of Facebook
    Ghafarian, Ahmad
    Keskin, Deniz
    INTELLIGENT COMPUTING, VOL 3, 2022, 508 : 581 - 601
  • [26] Detection of Spliced Image Forensics Using Texture Analysis of Median Filter Residual
    Rhee, Kang Hyeon
    IEEE ACCESS, 2020, 8 : 103374 - 103384
  • [27] Using noise inconsistencies for blind image forensics
    Mahdian, Babak
    Saic, Stanislav
    IMAGE AND VISION COMPUTING, 2009, 27 (10) : 1497 - 1503
  • [28] Digital Image Forensics Using EM Algorithm
    Lin, Tim-kun
    Huang, Chung-Lin
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2009, 2009, 5879 : 994 - 998
  • [29] Live Forensics Analysis: Violations of Business Security Policy
    Tanwar, Govind Singh
    Poonia, Ajeet Singh
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 971 - 976
  • [30] Multimedia security and forensics
    Yan, Wei Qi
    Kurugollu, Fatih
    Emmanuel, Sabu
    Kankanhalli, Mohan S.
    International Journal of Digital Crime and Forensics, 2010, 2 (04)