Download presentation
Presentation is loading. Please wait.
Published byRodney Henderson Modified over 8 years ago
1
Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Proposed enrollment and production of an identification document. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293
2
Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Proposed authentication of an identification document. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293
3
Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Location index modulation (N=1): (a) original character x=A=(xh,xv); (b) marked character Q1(x) by horizontal shifting; (c) marked character Q1(x) by vertical shifting; (d) marked character Q0(x) by combined horizontal and vertical shifting. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293
4
Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Location index modulation (N=5): (a) original word xN=(A,p,p,l,e)=(x1,x2,x3,x4,x5), where each xn=(xnh,xnv); (b) marked word Q0(xN) by horizontal shifting (also known as word-shift coding); (c) marked word Q1(xN) by vertical shifting; (d) marked word Q1(xN) by mixed horizontal and vertical character shifting. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293
5
Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. The relationships between an authority, a person, a challenger, and an identification document. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293
6
Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Proposed system architecture for document authentication. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293
7
Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Document authentication system architectures based on the secure link between biometrics and personal data via: (a) database; (b) on-document storage module; (c) self cross-storage based on digital data hiding. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293
8
Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Block diagram of a generic biometric document authentication system. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293
9
Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Discrete memoryless data hiding channel. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293
10
Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. OCR+MAC text hashing. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293
11
Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Identification document sample. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293
12
Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Hamming distances between different images. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293
13
Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Hamming distances between 64-bit hashes of images before and after being watermarked, printed, and scanned, which are legitimate distortions. The Hamming distances of different images are provided for reference. Figure Legend: From: Authentication of biometric identification documents via mobile devices J. Electron. Imaging. 2008;17(1):011014-011014-14. doi:10.1117/1.2896293
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.