The Evolution of Document Authentication

D. Doermann
{"title":"The Evolution of Document Authentication","authors":"D. Doermann","doi":"10.1109/ICFHR.2010.128","DOIUrl":null,"url":null,"abstract":"Authentication in the document context refers to the ability to trace the origins of a document to a given person or device used to produce it or to a given time or place it was produced. The general approach typically involves comparing physical, visual and/or linguistic properties of a questioned source to reproducible properties of a known or genuine source. The challenges lie in defining acceptable variations between authentic sources and identifying distinguishing characteristics of forgeries or unknown sources. As documents have evolved from physical objects made with primitive devices to manuscripts created by machine to content that lives only in electronic form, methods for authentication have also changed. While there has been considerable work in attempts to automate problems such as signature verification and writer identification in the image domain, and to guarantee authenticity or prove authorship in the electronic text domain, other authentication tasks have continued to rely extensively on human expertise. This talk will overview the general concept of authentication and discuss some of the novel approaches that can be used to authenticate documents and detect forgeries. While technology advances in archeology, antiquities, forensics, security and business are driving new and better ways to perform authentication, they are also enabling more realistic ways to produce counterfeits. As we continue to make progress in automating various analysis and recognition tasks, the question remains as to how well we will be able to automate these highly expert driven authentication tasks.","PeriodicalId":335044,"journal":{"name":"2010 12th International Conference on Frontiers in Handwriting Recognition","volume":"2832 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 12th International Conference on Frontiers in Handwriting Recognition","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFHR.2010.128","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Authentication in the document context refers to the ability to trace the origins of a document to a given person or device used to produce it or to a given time or place it was produced. The general approach typically involves comparing physical, visual and/or linguistic properties of a questioned source to reproducible properties of a known or genuine source. The challenges lie in defining acceptable variations between authentic sources and identifying distinguishing characteristics of forgeries or unknown sources. As documents have evolved from physical objects made with primitive devices to manuscripts created by machine to content that lives only in electronic form, methods for authentication have also changed. While there has been considerable work in attempts to automate problems such as signature verification and writer identification in the image domain, and to guarantee authenticity or prove authorship in the electronic text domain, other authentication tasks have continued to rely extensively on human expertise. This talk will overview the general concept of authentication and discuss some of the novel approaches that can be used to authenticate documents and detect forgeries. While technology advances in archeology, antiquities, forensics, security and business are driving new and better ways to perform authentication, they are also enabling more realistic ways to produce counterfeits. As we continue to make progress in automating various analysis and recognition tasks, the question remains as to how well we will be able to automate these highly expert driven authentication tasks.
文件认证的演变
文档上下文中的身份验证指的是将文档的来源追溯到用于生成文档的特定人员或设备,或者追溯到生成文档的特定时间或地点的能力。一般的方法通常涉及将可疑来源的物理、视觉和/或语言特性与已知或真实来源的可复制特性进行比较。挑战在于确定真实来源之间可接受的变化,并识别伪造或未知来源的显著特征。随着文件从原始设备制作的实物,到机器制作的手稿,再到只能以电子形式存在的内容,认证的方法也发生了变化。虽然在图像领域的签名验证和作者身份识别以及在电子文本领域保证真实性或证明作者身份等问题的自动化方面已经进行了大量的工作,但其他身份验证任务仍然广泛依赖于人类的专业知识。本讲座将概述认证的一般概念,并讨论一些可用于认证文档和检测伪造的新方法。虽然考古学、古物学、法医学、安全和商业领域的技术进步正在推动新的、更好的认证方法,但它们也使制造假币的方法更加现实。随着我们在自动化各种分析和识别任务方面不断取得进展,问题仍然是我们能够在多大程度上自动化这些高度专家驱动的身份验证任务。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信