Automatic Seal Imprint Verification Systems Using Edge Difference
نویسندگان
چکیده
منابع مشابه
automatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولThe Seal Imprint Verification System: Cases of Introduction in Financial Institutions
At a time of drastic change in the environment surrounding financial institutions, administrative work centralization aimed at reducing the workload of the back office has propelled the introduction of cost-effective image processing systems geared toward centralized operations. Further, in an effort to prevent forgery, more and more institutions have done away with duplicate seals and are intr...
متن کاملAutomatic Verification of Hybrid Systems
We address the problem of model checking hybrid systems which exhibit nontrivial discrete behavior and thus cannot be treated by considering the discrete states one by one, as most currently available verification tools do. Our procedure relies on a deep integration of several techniques and tools. A first-order extension of AND-Inverter-Graphs (AIGs) serves as a compact representation format f...
متن کاملAutomatic Verification of Intermittent Systems
Transiently powered devices have given rise to a new model of computation called intermittent computation. Intermittent programs keep checkpointing the program state to a persistent memory, and on power failures, the programs resume from the last executed checkpoint. An intermittent program is usually automatically generated by instrumenting a given continuous program. The behaviour of the cont...
متن کاملAutomatic Chinese seal identification
A combination of image processing and matching techniques is proposed to solve the problem of seal identification. The techniques include thresholding, rotation, thinning, reexpansion, and finally matching of seal images. The principle for identification is based on the fact that the spatial distributions of the stroke skeletons of the characters engraved by human hands on two distinct seals wi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2945045