Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

An approach to computer-aided document examination

  • Published:
International Journal of Computer & Information Sciences Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

In this paper we describe a knowledge-based expert system capable of investigating a typewritten document and acquiring evidence on its falsification. A document is assumed to be falsified if its typing has been performed in multiple typing sessions. Verification of document authenticity is carried out by subjecting a document to four tests: alignment analysis, symbol comparison, gray level intensity analysis and type font identification. Tests are performed in succession and failure of any one of the tests signifies possible document falsificaton.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. J. T. Tou, J. M. Cheng, D. Z. Lu, and T. McCarthy, Automatic Type Font Identification for Falsified Documents,” Proc. of Sixth Int. Conf. on Pattern Recognition, Munich, Germany (1982).

  2. J. T. Tou, D. Lu, and T. McCarthy, Automatic Detection of Document Falsification,Proc. of the IEEE Conf. on Image Processing and Pattern Recognition, Las Vegas (1982).

  3. C. K. Chow and T. Kameko, Automatic Boundary Detection of the Left Ventricle from Cineangrograms,Comput. Biomed. Res.,8:388–410 (1972).

    Google Scholar 

  4. N. Otsu, A Threshold Section Method from Gray-Level Histograms,IEEE Trans. Syst. Man Cyber.,SMC-9(1):62–66 (1979).

    Google Scholar 

  5. J. T. Tou, Zoom Thresholding Technique for Boundary Determination,Int. J. of Comput. and Infor. Sci. 8(1):3–8 (1979).

    Google Scholar 

  6. T. S. Weszka, R. N. Nagel, and A. Rosenfeld, A Threshold Section Technique,IEEE Trans. Comput.,C-23:1322–1326 (1974).

    Google Scholar 

  7. V. I. Zaiev, and A. A. Savin, On a System for a Character Reader, Čitajuščie Ustroistva Izd. VINITI (1962).

  8. F. L. Alt, Digital Pattern Recognition of Numerals,J. ACM 9:240–258 (1962).

    Google Scholar 

  9. A. S. Bogdonas and R. Žlabis. The RUTA-701 Reading Machine, in Avtomatizacia Vvoda Pis'menyh Znakov v EVM, RINTIP, Vilnius (1965).

    Google Scholar 

  10. R. A. Kirsch, Computer Interpretation of English Text and Picture Patterns,IEEE Trans. Electron. Computers,EC-13:363–376 (1964).

    Google Scholar 

  11. V. A. Kovalevsky,Image Pattern Recognition, Springer-Verlag, New York (1980).

    Google Scholar 

  12. G. Nagy and N. Tuong, Normalization Techniques for Hand Printed Numerals,Comm. of ACM,13:475–487 (1970).

    Google Scholar 

  13. Jiri Pik, A Hierarchical Pattern Description in the Syntactic Approach to Pattern Recognition,Pattern Recognition,14(6):191–196 (1981).

    Google Scholar 

  14. T. Pavlidis, Algorithms for Shape Analysis of Contours and Waveforms,IEEE Trans. on Pattern Analysis and Machine Intelligence,PAMI-2(4):301–311 (1980).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Brzakovic, D., Tou, J.T. An approach to computer-aided document examination. International Journal of Computer and Information Sciences 14, 365–385 (1985). https://doi.org/10.1007/BF00991180

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF00991180

Key words