Categorization of Document Image Tampering Techniques and How to Identify Them

5Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present in a descriptive way the first results of our study of the problem of document image tampering detection. We aim at helping the community by establishing certain guidelines in what refers to the categorization and targeting of this problem. We propose a categorization of the main types of forgeries performed by a direct manipulation of the document image. That applies to most of the cases we observed in real world forged documents according to our sources from external private companies. In addition, we describe a set of visual clues result of these tampering operations that can be addressed when developing automatic methods for its detection.

Cite

CITATION STYLE

APA

Cruz, F., Sidère, N., Coustaty, M., Poulain d’Andecy, V., & Ogier, J. M. (2019). Categorization of Document Image Tampering Techniques and How to Identify Them. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11188 LNCS, pp. 117–124). Springer Verlag. https://doi.org/10.1007/978-3-030-05792-3_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free