{"id":"https://openalex.org/W3137318143","doi":"https://doi.org/10.1145/3417473.3417476","title":"Authentication and Tamper Localization of scanned Bill and Seal based on Block Correlation","display_name":"Authentication and Tamper Localization of scanned Bill and Seal based on Block Correlation","publication_year":2020,"publication_date":"2020-08-12","ids":{"openalex":"https://openalex.org/W3137318143","doi":"https://doi.org/10.1145/3417473.3417476","mag":"3137318143"},"language":"en","primary_location":{"id":"doi:10.1145/3417473.3417476","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3417473.3417476","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 2nd International Conference on Information Technology and Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040134998","display_name":"Wenjia Ding","orcid":"https://orcid.org/0000-0001-8543-9503"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210105229","display_name":"City University of Hong Kong, Shenzhen Research Institute","ror":"https://ror.org/00xc0ma20","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210105229"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenjia Ding","raw_affiliation_strings":["Shenzhen Research Institute, Wuhan University, China, Shenzhen"],"affiliations":[{"raw_affiliation_string":"Shenzhen Research Institute, Wuhan University, China, Shenzhen","institution_ids":["https://openalex.org/I4210105229","https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091560265","display_name":"Yi Xie","orcid":"https://orcid.org/0000-0002-6598-9097"},"institutions":[{"id":"https://openalex.org/I4210105229","display_name":"City University of Hong Kong, Shenzhen Research Institute","ror":"https://ror.org/00xc0ma20","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210105229"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Xie","raw_affiliation_strings":["Shenzhen Research Institute, Wuhan University, China, Shenzhen"],"affiliations":[{"raw_affiliation_string":"Shenzhen Research Institute, Wuhan University, China, Shenzhen","institution_ids":["https://openalex.org/I4210105229","https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100418042","display_name":"Yulin Wang","orcid":"https://orcid.org/0000-0002-5058-8856"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210105229","display_name":"City University of Hong Kong, Shenzhen Research Institute","ror":"https://ror.org/00xc0ma20","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210105229"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yulin Wang","raw_affiliation_strings":["Shenzhen Research Institute, Wuhan University, China, Shenzhen"],"affiliations":[{"raw_affiliation_string":"Shenzhen Research Institute, Wuhan University, China, Shenzhen","institution_ids":["https://openalex.org/I4210105229","https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040134998"],"corresponding_institution_ids":["https://openalex.org/I37461747","https://openalex.org/I4210105229"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18681522,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"55","last_page":"58"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14319","display_name":"Currency Recognition and Detection","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/seal","display_name":"Seal (emblem)","score":0.7748899459838867},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7078410983085632},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6863031387329102},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.6297605633735657},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.579979419708252},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5300911068916321},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5067775845527649},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4750749468803406},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.42367249727249146},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4170614182949066},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.40265703201293945},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3268283009529114},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11254817247390747}],"concepts":[{"id":"https://openalex.org/C2777755289","wikidata":"https://www.wikidata.org/wiki/Q162919","display_name":"Seal (emblem)","level":2,"score":0.7748899459838867},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7078410983085632},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6863031387329102},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.6297605633735657},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.579979419708252},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5300911068916321},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5067775845527649},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4750749468803406},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.42367249727249146},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4170614182949066},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.40265703201293945},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3268283009529114},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11254817247390747},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3417473.3417476","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3417473.3417476","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 2nd International Conference on Information Technology and Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1978683153","https://openalex.org/W2004536454","https://openalex.org/W2040104175","https://openalex.org/W2049775825","https://openalex.org/W2054168566","https://openalex.org/W2105010203","https://openalex.org/W2276974365","https://openalex.org/W2964756779"],"related_works":["https://openalex.org/W4237333278","https://openalex.org/W2461810893","https://openalex.org/W4200519391","https://openalex.org/W2326160135","https://openalex.org/W2388266094","https://openalex.org/W2362428907","https://openalex.org/W2354346723","https://openalex.org/W2978048732","https://openalex.org/W2393362322","https://openalex.org/W2358945663"],"abstract_inverted_index":{"For":[0],"important":[1],"financial":[2,6,8],"documents":[3,77,91],"such":[4],"as":[5],"statements,":[7],"contracts,":[9],"bills,":[10],"accounts,":[11],"etc.,":[12],"even":[13],"if":[14],"there":[15],"is":[16,34],"a":[17,61,101],"very":[18],"small":[19],"change":[20],"in":[21,83],"the":[22,40,44,68,76,84,89,97,106,110,118,128,136],"transmission":[23],"process,":[24],"it":[25,33,51],"may":[26],"lead":[27],"to":[28,38,71,123,140],"huge":[29],"economic":[30],"losses,":[31],"so":[32,50],"of":[35,63,86,104,117,135],"great":[36],"significance":[37],"verify":[39],"content.":[41],"In":[42,56],"addition,":[43],"seal":[45,137],"symbolizes":[46],"an":[47],"undeniable":[48],"identity,":[49],"should":[52],"be":[53],"absolutely":[54],"credible.":[55],"this":[57],"paper,":[58],"we":[59],"propose":[60],"method":[62],"passive":[64],"authentication":[65],"based":[66],"on":[67],"block":[69],"correlation":[70],"distinguish":[72],"whether":[73],"or":[74],"not":[75],"have":[78],"been":[79],"tampered":[80,98],"with":[81],"semantics":[82],"process":[85],"circulation":[87],"after":[88],"paper":[90],"are":[92,121,138],"imaged,":[93],"and":[94,114,125,132,142],"then":[95],"locate":[96],"area.":[99],"Through":[100],"large":[102],"number":[103],"experiments,":[105],"results":[107],"show":[108],"that":[109],"tamper":[111,129],"detection":[112,130],"accuracy":[113,116,131,134],"location":[115,133],"bill":[119],"image":[120],"up":[122,139],"96%":[124],"92%":[126],"respectively;":[127],"93%)":[141],"88%":[143],"respectively.":[144]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
