Presentation is loading. Please wait.

Presentation is loading. Please wait.

Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Proposed enrollment and production of an identification document. Figure Legend:

Similar presentations


Presentation on theme: "Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Proposed enrollment and production of an identification document. Figure Legend:"— Presentation transcript:

1 Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Proposed enrollment and production of an identification document. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293

2 Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Proposed authentication of an identification document. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293

3 Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Location index modulation (N=1): (a) original character x=A=(xh,xv); (b) marked character Q1(x) by horizontal shifting; (c) marked character Q1(x) by vertical shifting; (d) marked character Q0(x) by combined horizontal and vertical shifting. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293

4 Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Location index modulation (N=5): (a) original word xN=(A,p,p,l,e)=(x1,x2,x3,x4,x5), where each xn=(xnh,xnv); (b) marked word Q0(xN) by horizontal shifting (also known as word-shift coding); (c) marked word Q1(xN) by vertical shifting; (d) marked word Q1(xN) by mixed horizontal and vertical character shifting. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293

5 Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. The relationships between an authority, a person, a challenger, and an identification document. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293

6 Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Proposed system architecture for document authentication. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293

7 Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Document authentication system architectures based on the secure link between biometrics and personal data via: (a) database; (b) on-document storage module; (c) self cross-storage based on digital data hiding. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293

8 Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Block diagram of a generic biometric document authentication system. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293

9 Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Discrete memoryless data hiding channel. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293

10 Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. OCR+MAC text hashing. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293

11 Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Identification document sample. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293

12 Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Hamming distances between different images. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293

13 Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Hamming distances between 64-bit hashes of images before and after being watermarked, printed, and scanned, which are legitimate distortions. The Hamming distances of different images are provided for reference. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293


Download ppt "Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Proposed enrollment and production of an identification document. Figure Legend:"

Similar presentations


Ads by Google