Automatic Seal Imprint Verification Systems Using Edge Difference

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

The Seal Imprint Verification System: Cases of Introduction in Financial Institutions

At a time of drastic change in the environment surrounding financial institutions, administrative work centralization aimed at reducing the workload of the back office has propelled the introduction of cost-effective image processing systems geared toward centralized operations. Further, in an effort to prevent forgery, more and more institutions have done away with duplicate seals and are intr...

متن کامل

Automatic Verification of Hybrid Systems

We address the problem of model checking hybrid systems which exhibit nontrivial discrete behavior and thus cannot be treated by considering the discrete states one by one, as most currently available verification tools do. Our procedure relies on a deep integration of several techniques and tools. A first-order extension of AND-Inverter-Graphs (AIGs) serves as a compact representation format f...

متن کامل

Automatic Verification of Intermittent Systems

Transiently powered devices have given rise to a new model of computation called intermittent computation. Intermittent programs keep checkpointing the program state to a persistent memory, and on power failures, the programs resume from the last executed checkpoint. An intermittent program is usually automatically generated by instrumenting a given continuous program. The behaviour of the cont...

متن کامل

Automatic Chinese seal identification

A combination of image processing and matching techniques is proposed to solve the problem of seal identification. The techniques include thresholding, rotation, thinning, reexpansion, and finally matching of seal images. The principle for identification is based on the fact that the spatial distributions of the stroke skeletons of the characters engraved by human hands on two distinct seals wi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2019

ISSN: 2169-3536

DOI: 10.1109/access.2019.2945045