{"id":"https://openalex.org/W4306706818","doi":"https://doi.org/10.48550/arxiv.2210.07884","title":"SealClub: Computer-aided Paper Document Authentication","display_name":"SealClub: Computer-aided Paper Document Authentication","publication_year":2022,"publication_date":"2022-10-14","ids":{"openalex":"https://openalex.org/W4306706818","doi":"https://doi.org/10.48550/arxiv.2210.07884"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2210.07884","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2210.07884","pdf_url":"https://arxiv.org/pdf/2210.07884","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2210.07884","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019979722","display_name":"Mart\u00edn Ochoa","orcid":"https://orcid.org/0000-0002-7816-5775"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ochoa, Mart\u00edn","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108697064","display_name":"Jorge Toro-Pozo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Toro-Pozo, Jorge","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5025344654","display_name":"David Basin","orcid":"https://orcid.org/0000-0003-2952-939X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Basin, David","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019979722"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8470171689987183},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.6727181673049927},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5876149535179138},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5851992964744568},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5750278234481812},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5496245622634888},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.46084877848625183},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4459112286567688},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.393195241689682},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3903006315231323},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.2672974169254303},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07353949546813965}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8470171689987183},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.6727181673049927},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5876149535179138},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5851992964744568},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5750278234481812},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5496245622634888},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.46084877848625183},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4459112286567688},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.393195241689682},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3903006315231323},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2672974169254303},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07353949546813965},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2210.07884","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2210.07884","pdf_url":"https://arxiv.org/pdf/2210.07884","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"doi:10.48550/arxiv.2210.07884","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2210.07884","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2210.07884","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2210.07884","pdf_url":"https://arxiv.org/pdf/2210.07884","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"score":0.699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4389670110","https://openalex.org/W2429057255","https://openalex.org/W2187546663","https://openalex.org/W148745890","https://openalex.org/W2611942503","https://openalex.org/W4315621326","https://openalex.org/W2899790217","https://openalex.org/W2598865957","https://openalex.org/W1576092969","https://openalex.org/W2524154428"],"abstract_inverted_index":{"Digital":[0],"authentication":[1],"is":[2,88],"a":[3,7,37,106,160],"mature":[4],"field,":[5],"offering":[6],"range":[8],"of":[9,50,94,108,111,137],"solutions":[10],"with":[11],"rigorous":[12],"mathematical":[13],"guarantees.":[14],"Nevertheless,":[15],"paper":[16,42,112,167],"documents,":[17,69,113],"where":[18],"cryptographic":[19,55],"techniques":[20,59],"are":[21,25,141],"not":[22],"directly":[23],"applicable,":[24],"still":[26],"widely":[27],"utilized":[28],"due":[29],"to":[30,40,60,134,144,147,152,165],"usability":[31],"and":[32,56,62,72],"legal":[33],"reasons.":[34],"We":[35,80,99],"propose":[36],"novel":[38],"approach":[39,158],"authenticating":[41],"documents":[43,168],"using":[44,169],"smartphones":[45,171],"by":[46,78],"taking":[47],"short":[48],"videos":[49,110],"them.":[51],"Our":[52,118],"solution":[53],"combines":[54],"image":[57],"comparison":[58],"detect":[61],"highlight":[63],"subtle":[64,116],"semantic-changing":[65],"attacks":[66],"on":[67,105,131],"rich":[68],"containing":[70,115],"text":[71],"graphics,":[73],"that":[74,86],"could":[75],"go":[76],"unnoticed":[77],"humans.":[79],"rigorously":[81],"analyze":[82],"our":[83,157],"approach,":[84],"proving":[85],"it":[87],"secure":[89],"against":[90],"strong":[91],"adversaries":[92],"capable":[93],"compromising":[95],"different":[96],"system":[97],"components.":[98],"also":[100],"measure":[101],"its":[102],"accuracy":[103],"empirically":[104],"set":[107],"128":[109],"half":[114],"forgeries.":[117,155],"algorithm":[119],"finds":[120],"all":[121],"forgeries":[122],"accurately":[123],"(no":[124],"false":[125],"alarms)":[126],"after":[127],"analyzing":[128],"5.13":[129],"frames":[130],"average":[132],"(corresponding":[133],"1.28":[135],"seconds":[136],"video).":[138],"Highlighted":[139],"regions":[140],"large":[142],"enough":[143,151],"be":[145],"visible":[146],"users,":[148],"but":[149],"small":[150],"precisely":[153],"locate":[154],"Thus,":[156],"provides":[159],"promising":[161],"way":[162],"for":[163],"users":[164],"authenticate":[166],"conventional":[170],"under":[172],"realistic":[173],"conditions.":[174]},"counts_by_year":[],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
