Two-dimensional barcodes for hardcopy document integrity verification
Although we live in an electronic age, it cannot be denied that hardcopy documents are still needed in our life, such as land titles, application forms and contracts. However, document forgery is still happening. Forgery makes a document lose its integrity. Integrity means the assurance that the inf...
| Main Author: | Teoh, Chin Yew |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/9467/ http://eprints.utm.my/9467/1/TeohChinYewFSKSM2008.pdf |
Similar Items
Scanning barcode 1d vs barcode 2d / Azura Shatar
by: Azura, Shatar
Published: (2003)
by: Azura, Shatar
Published: (2003)
Scanning barcode 1d vs barcode 2d / Azura Shatar
by: Azura, Shatar
Published: (2003)
by: Azura, Shatar
Published: (2003)
Cubature formula for approximate calculation of integrals of two-dimensional irregular highly oscillating functions
by: Mezhuyev, Vitaliy, et al.
Published: (2018)
by: Mezhuyev, Vitaliy, et al.
Published: (2018)
Protection of integrity and ownership of pdf documents using invisible signature
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Input Information in the Approximate Calculation of Two-Dimensional Integral from Highly Oscillating Functions (Irregular Case)
by: Lytvyn, Oleg M., et al.
Published: (2019)
by: Lytvyn, Oleg M., et al.
Published: (2019)
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Data transmission between PDA and PC using WIFI for pocket barcode application
by: Seah, Yeow Ngee
Published: (2007)
by: Seah, Yeow Ngee
Published: (2007)
Comparison of document similarity algorithms in extracting document keywords from an academic paper
by: Miah, M. Saef Ullah, et al.
Published: (2021)
by: Miah, M. Saef Ullah, et al.
Published: (2021)
Three-Dimensional Convolutional Approaches for the Verification of Deepfake Videos: The Effect of Image Depth Size on Authentication Performance
by: Muhammad Salihin, Saealal, et al.
Published: (2023)
by: Muhammad Salihin, Saealal, et al.
Published: (2023)
Multibiometric systems based verification technique
by: Anwar, Farhat, et al.
Published: (2009)
by: Anwar, Farhat, et al.
Published: (2009)
Verification of scholars and references in Islamic websites
by: Mahmud, Murni, et al.
Published: (2011)
by: Mahmud, Murni, et al.
Published: (2011)
Stroke-to-stroke matching in on-line signature verification
by: Ahmad Jaini, Azhar
Published: (2010)
by: Ahmad Jaini, Azhar
Published: (2010)
Seamless Access to cancer patient’s EMR through Short Message Service and 2D Barcode
by: Abd Ghani, M. K., et al.
Published: (2011)
by: Abd Ghani, M. K., et al.
Published: (2011)
Probabilistic random projections and speaker verification
by: Ying, Chong Lee, et al.
Published: (2007)
by: Ying, Chong Lee, et al.
Published: (2007)
High security Iris verification system based on random secret integration
by: SIEWCHIN, C, et al.
Published: (2006)
by: SIEWCHIN, C, et al.
Published: (2006)
Logico-linguistic semantic representation of documents
by: Wani, Sharyar, et al.
Published: (2016)
by: Wani, Sharyar, et al.
Published: (2016)
Image binarization of historical document image
by: Mat Som, Hafizan
Published: (2007)
by: Mat Som, Hafizan
Published: (2007)
Medical certificate verification system using QR code
by: Lai, Chong Lan
Published: (2014)
by: Lai, Chong Lan
Published: (2014)
Online signature verification based on dynamic feature discriminators
by: Omar, Nazaruddin
Published: (2009)
by: Omar, Nazaruddin
Published: (2009)
Ontology-based information retrieval for historical documents
by: Fatihah, Ramli, et al.
Published: (2017)
by: Fatihah, Ramli, et al.
Published: (2017)
A model for controlling access to XML documents.
by: Rahman, Kh. Azizur, et al.
Published: (2003)
by: Rahman, Kh. Azizur, et al.
Published: (2003)
Image classification using two dimensional wavelet coefficients with parallel computing
by: Ong, Yew Fai
Published: (2020)
by: Ong, Yew Fai
Published: (2020)
An offline signature verification technique using pixels intensity levels
by: Shah, Abdul Salam, et al.
Published: (2016)
by: Shah, Abdul Salam, et al.
Published: (2016)
Dynamic signature verification based on hybrid wavelet-Fourier transform
by: Khoh, W. H., et al.
Published: (2014)
by: Khoh, W. H., et al.
Published: (2014)
Speaker verification using probabilistic 2D CLAFIC
by: Ying, Chong Lee, et al.
Published: (2007)
by: Ying, Chong Lee, et al.
Published: (2007)
High performance in minimizing of term-document matrix representation for document clustering
by: B., Baharudin, et al.
Published: (2009)
by: B., Baharudin, et al.
Published: (2009)
A face and speech biometric verification system using a simple Bayesian structure
by: Teoh, , ABJ, et al.
Published: (2005)
by: Teoh, , ABJ, et al.
Published: (2005)
Nearest neighbourhood classifiers in a bimodal biometric verification system fusion decision scheme
by: Teoh,, A, et al.
Published: (2004)
by: Teoh,, A, et al.
Published: (2004)
Offline Signature Verification through Biometric Strengthening
by: Ooi, Shih-Yin, et al.
Published: (2007)
by: Ooi, Shih-Yin, et al.
Published: (2007)
Comparison of feature selection techniques in classifying stroke documents
by: Nur Syaza Izzati, Mohd Rafei, et al.
Published: (2019)
by: Nur Syaza Izzati, Mohd Rafei, et al.
Published: (2019)
An efficient fingerprint verification system using integrated wavelet and Fourier–Mellin invariant transform
by: Jin, A
Published: (2004)
by: Jin, A
Published: (2004)
Evaluation of XML documents queries based on native XML database
by: Lazim, Raghad Yaseen
Published: (2016)
by: Lazim, Raghad Yaseen
Published: (2016)
Driver identification and driver's emotion verification using KDE and MLP neural networks
by: Md Nor, Norzaliza, et al.
Published: (2010)
by: Md Nor, Norzaliza, et al.
Published: (2010)
Driver identification and driver's emotion verification using KDE and MLP neural networks
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2011)
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2011)
Verification the performance of Microsoft SQL Server / Nageswary Gannapathy
by: Nageswary , Gannapathy
Published: (2002)
by: Nageswary , Gannapathy
Published: (2002)
2D CLAFIC Subspace Technique in Probabilistic Speaker Verification
by: Chong, L. Y., et al.
Published: (2007)
by: Chong, L. Y., et al.
Published: (2007)
Building an event ontology for historical domain to support semantic document retrieval
by: Fatihah, Ramli, et al.
Published: (2016)
by: Fatihah, Ramli, et al.
Published: (2016)
Dynamic Handwritten Signature Verification Based on Statistical Quantization Mechanism
by: Ong, Thian Song, et al.
Published: (2009)
by: Ong, Thian Song, et al.
Published: (2009)
Kidney simulation in 3 dimensional environment "digikid" / Dennis Foong Yew Han
by: Dennis Foong , Yew Han
Published: (2004)
by: Dennis Foong , Yew Han
Published: (2004)
Modeling activity diagram to colored petri net for validation and verification based on non functional parameters
by: Balagatabi, Hossein Nematzadeh
Published: (2008)
by: Balagatabi, Hossein Nematzadeh
Published: (2008)
Similar Items
-
Scanning barcode 1d vs barcode 2d / Azura Shatar
by: Azura, Shatar
Published: (2003) -
Scanning barcode 1d vs barcode 2d / Azura Shatar
by: Azura, Shatar
Published: (2003) -
Cubature formula for approximate calculation of integrals of two-dimensional irregular highly oscillating functions
by: Mezhuyev, Vitaliy, et al.
Published: (2018) -
Protection of integrity and ownership of pdf documents using invisible signature
by: Taha, Imad, et al.
Published: (2012) -
Input Information in the Approximate Calculation of Two-Dimensional Integral from Highly Oscillating Functions (Irregular Case)
by: Lytvyn, Oleg M., et al.
Published: (2019)