2022
DOI: 10.1016/j.jisa.2022.103133
|View full text |Cite
|
Sign up to set email alerts
|

Authentication of rotogravure print-outs using a regular test pattern

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 31 publications
(56 reference statements)
0
2
0
Order By: Relevance
“…Security printing as an industry hosts many international conferences to share novel techniques and components in the production of security documents, and those FDE working in this domain would typically review these resources. Given the many advanced technologies in use in the field of security documents production it is not surprising that over the past years included in this review there have been many conference presentations of interest to those FDE who specialize in security documents examination, as well as two textbooks [ 674 , 675 ], and 24 published articles [ [676] , [677] , [678] , [679] , [680] , [681] , [682] , [683] , [684] , [685] , [686] , [687] , [688] , [689] , [690] , [691] , [692] , [693] , [694] , [695] , [696] , [697] , [698] , [699] ]. In fact, there were approximately 1200 conference presentations given on topics related to security documents examination over the period of this review, however only a selection was included in this article [ [700] , [701] , [702] , [703] , [704] , [705] , [706] , [707] , [708] , [709] , [710] , [711] , [712] , [713] , [714] , [715] , [716] , [717] , [718] , [719] , [720] , [721] , [722] , [723] , [724] , [725] , [...…”
Section: Forensic Document Examinationmentioning
confidence: 99%
See 1 more Smart Citation
“…Security printing as an industry hosts many international conferences to share novel techniques and components in the production of security documents, and those FDE working in this domain would typically review these resources. Given the many advanced technologies in use in the field of security documents production it is not surprising that over the past years included in this review there have been many conference presentations of interest to those FDE who specialize in security documents examination, as well as two textbooks [ 674 , 675 ], and 24 published articles [ [676] , [677] , [678] , [679] , [680] , [681] , [682] , [683] , [684] , [685] , [686] , [687] , [688] , [689] , [690] , [691] , [692] , [693] , [694] , [695] , [696] , [697] , [698] , [699] ]. In fact, there were approximately 1200 conference presentations given on topics related to security documents examination over the period of this review, however only a selection was included in this article [ [700] , [701] , [702] , [703] , [704] , [705] , [706] , [707] , [708] , [709] , [710] , [711] , [712] , [713] , [714] , [715] , [716] , [717] , [718] , [719] , [720] , [721] , [722] , [723] , [724] , [725] , [...…”
Section: Forensic Document Examinationmentioning
confidence: 99%
“…The team of Tkachenko et al [ 693 ] explored pharmaceutical packaging printed on blister foils using rotogravure process for counterfeit identification purposes. They showed that the chemical etching has a stochastic nature that can be spotted by correlation or classical machine learning methods, and therefore proposed an authentication system using a novel regular test pattern of blister foils.…”
Section: Forensic Document Examinationmentioning
confidence: 99%