Author of the publication

Knowledge-Based Techniques for Document Fraud Detection: A Comprehensive Study.

, , , , , and . CICLing (1), volume 13451 of Lecture Notes in Computer Science, page 17-33. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low-complexity arrays of contour signatures for exact shape retrieval., , and . Pattern Recognit., (2021)Guilloche Detection for ID Authentication: A Dataset and Baselines., , , , , and . MMSP, page 1-6. IEEE, (2023)Robustness of Character Recognition Techniques to Double Print-and-Scan Process., and . IWCDF@ICDAR, page 27-32. IEEE, (2017)978-1-5386-3586-5.Use of SLIC superpixels for ancient document image enhancement and segmentation., , , , , and . DRR, volume 9402 of SPIE Proceedings, page 940205. SPIE, (2015)Évaluation de la robustesse des descripteurs de texture pour la segmentation des images de documents anciens., , , , , , and . CORIA-CIFED, page 25-40. ARIA-GRCE, (2014)Background Removal of French University Diplomas., , , and . DAS, volume 12116 of Lecture Notes in Computer Science, page 182-196. Springer, (2020)Receipt Dataset for Document Forgery Detection., , , , , , , and . ICDAR (3), volume 14189 of Lecture Notes in Computer Science, page 454-469. Springer, (2023)A System Based on Intrinsic Features for Fraudulent Document Detection., , , , and . ICDAR, page 106-110. IEEE Computer Society, (2013)Texture feature benchmarking and evaluation for historical document image analysis., , , and . Int. J. Document Anal. Recognit., 20 (1): 1-35 (2017)Low-complexity arrays of patch signature for efficient ancient coin retrieval., , and . Pattern Anal. Appl., 27 (3): 70 (September 2024)