What Kind of Strategies Does a Document Examiner Take in Handwriting Identification? (Englisch)
- Neue Suche nach: Seki, Yoko
- Neue Suche nach: Seki, Yoko
In:
Computational Forensics
7
;
193-199
;
2011
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:What Kind of Strategies Does a Document Examiner Take in Handwriting Identification?
-
Beteiligte:Seki, Yoko ( Autor:in )
-
Erschienen in:Computational Forensics , 7 ; 193-199Lecture Notes in Computer Science ; 6540, 7 ; 193-199
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2011
-
Format / Umfang:7 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Gestalt Aspects of Security PatternsKöppen, Mario et al. | 2011
- 13
-
Physical Security Technologies at HitachiSakairi, Minoru et al. | 2011
- 31
-
Exploiting Character Class Information in Forensic Writer IdentificationAlonso-Fernandez, Fernando / Fierrez, Julian / Galbally, Javier / Ortega-Garcia, Javier et al. | 2011
- 43
-
Toward Forensics by Stroke Order Variation — Performance Evaluation of Stroke Correspondence MethodsCai, Wenjie / Uchida, Seiichi / Sakoe, Hiroaki et al. | 2011
- 56
-
A Novel Seal Imprint Verification Method Based on Analysis of Difference Images and Symbolic RepresentationWang, Xiaoyang / Chen, Youbin et al. | 2011
- 68
-
Extraction of 3D Shape of a Tooth from Dental CT Images with Region Growing MethodYanagisawa, Ryuichi / Omachi, Shinichiro et al. | 2011
- 78
-
Cancellable Face Biometrics System by Combining Independent Component Analysis CoefficientsJeong, MinYi / Teoh, Andrew Beng Jin et al. | 2011
- 88
-
Footwear Print Retrieval System for Real Crime Scene MarksTang, Yi / Srihari, Sargur N. / Kasiviswanathan, Harish / Corso, Jason J. et al. | 2011
- 101
-
Improvement of Inkjet Printer Spur Gear Teeth Number Estimation by Fixing the Order in Maximum Entropy Spectral AnalysisAkao, Yoshinori / Yamamoto, Atsushi / Higashikawa, Yoshiyasu et al. | 2011
- 114
-
Detecting Indentations on Documents Pressed by Pen Tip Force Using a Near Infrared Light Emitting Diode (NIR LED) and Shape from ShadingFurukawa, Takeshi et al. | 2011
- 126
-
Similar Partial Copy Detection of Line Drawings Using a Cascade Classifier and Feature MatchingSun, Weihan / Kise, Koichi et al. | 2011
- 138
-
Detection of Malicious Applications on Android OSCerbo, Francesco / Girardello, Andrea / Michahelles, Florian / Voronkova, Svetlana et al. | 2011
- 150
-
JPEG Quantization Tables Forensics: A Statistical ApproachMahdian, Babak / Saic, Stanislav / Nedbal, Radim et al. | 2011
- 160
-
Discovering Correspondences between Fingerprints Based on the Temporal Dynamics of Eye Movements from ExpertsYu, Chen / Busey, Thomas / Vanderkolk, John et al. | 2011
- 173
-
Latent Fingerprint Rarity Analysis in Madrid Bombing CaseSu, Chang / Srihari, Sargur N. et al. | 2011
- 185
-
Fingerprint Directional Image EnhancementWieclaw, Lukasz et al. | 2011
- 193
-
What Kind of Strategies Does a Document Examiner Take in Handwriting Identification?Seki, Yoko et al. | 2011
- 200
-
3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of DataYannikos, York / Franke, Frederik / Winter, Christian / Schneider, Markus et al. | 2011