Using image analysis systems in forensics and security printing

被引:0
|
作者
Kipman, Y [1 ]
Johnson, K [1 ]
机构
[1] ImageXpert Inc, Nashua, NH USA
关键词
D O I
暂无
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
Image analysis tools are currently in use for a variety of applications in the fields of forensics and security printing. Objective, quantitative data allow for characterization and comparison of a variety of image attributes. In forensics, document examiners can use quantitative image analysis systems in authentication, detection and analysis of forgeries, counterfeits and altered documents. Statistical analysis enables population characterization that can help in forgery detection and supports the potential for source identification. In security printing, image analysis tools can be applied to measure the quality of printed output and assess wear for bank notes. Flexible hardware options allow for a broad application of image quality measurements in a variety of image analysis situations. Camera and scanner-based image quality systems can be used for quantitative analysis of image content. A laser-based system can be used for height and depth profiling. Oblique angle illumination and scanning can be used for impression detection. A flatbed scanner can be used in transmission mode for the evaluation of bank note wear and for watermark analysis. In this paper, we will be discussing the use of a variety of hardware configurations for image analysis in forensics and security printing.
引用
收藏
页码:318 / 322
页数:5
相关论文
共 50 条
  • [41] Frequency analysis for security printing lines
    Kiuchi, M
    Saito, K
    OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES IV, 2002, 4677 : 110 - 120
  • [42] Detecting Image Forgery using XOR and Determinant of Pixels for Image Forensics
    Mookdarsanit, Pakpoom
    Soimart, Lawankorn
    Ketcham, Mahasak
    Hnoohom, Narit
    2015 11TH INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY & INTERNET-BASED SYSTEMS (SITIS), 2015, : 613 - 616
  • [43] Smartphone image acquisition forensics using sensor fingerprint
    Sandoval Orozco, Ana Lucila
    Garcia Villalba, Luis Javier
    Arenas Gonzalez, David Manuel
    Rosales Corripio, Jocelin
    Hernandez-Castro, Julio
    Gibson, Stuart James
    IET COMPUTER VISION, 2015, 9 (05) : 723 - 731
  • [44] Passive image forensics using universal techniques: a review
    Gupta, Surbhi
    Mohan, Neeraj
    Kaushal, Priyanka
    ARTIFICIAL INTELLIGENCE REVIEW, 2022, 55 (03) : 1629 - 1679
  • [45] The 'Northumbria Temporal Image Forensics' Database: Description and Analysis
    Ahmed, Farah
    Khelifi, Fouad
    Lawgaly, Ashref
    Bouridane, Ahmed
    2020 7TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT'20), VOL 1, 2020, : 982 - 987
  • [46] Read the digital fingerprints: log analysis for digital forensics and security
    Kara I.
    Computer Fraud and Security, 2021, 2021 (07): : 11 - 16
  • [47] Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation
    Thing, Vrizlynn L. L.
    Chua, Zheng-Leong
    SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 : 217 - 230
  • [48] Image Forensics using Optimal Normalization in Challenging Environment
    Agarwal, Saurabh
    Jung, Ki-Hyun
    2021 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2021,
  • [49] Passive image forensics using universal techniques: a review
    Surbhi Gupta
    Neeraj Mohan
    Priyanka Kaushal
    Artificial Intelligence Review, 2022, 55 : 1629 - 1679
  • [50] Analysis of Benford's Law in Digital Image Forensics
    Singh, Neetu
    Bansal, Rishab
    2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSC), 2015, : 413 - 418