A Study on Enhancement of Admissibility of Electronic Documents and Scanned Documents

2019 ◽  
Vol 24 (2) ◽  
pp. 153-188
Author(s):  
Chul-Ha KANG
2016 ◽  
Author(s):  
Marc-Aurele Racicot

These days, is there a topic more significant and provocative than the protection of privacy in the private sector? The importance of this topic has been highlighted since the Canadian Parliament adopted the Personal Information Protection and Electronic Documents Act which came into full force on 1 January 2004 and which is scheduled for review in 2006. Although it seems that everywhere we turn, the word "privacy" and its companion PIPEDA are at centre stage, many say that this attention is unwarranted and a knee-jerk reaction to the information age where one can run but cannot hide. Like it or not, we are subject to the prying eyes of cameras in public places, the tracking and trailing of Internet activities, the selling of address lists and other such listings, and the synthesizing by marketers of frightful amounts of personal information that, when pulled together, reveals a lot about our personal life, our ancestry, our relationships, our interests and our spending habits.


Detection and reorganization of text may save a lot of time while reproducing old books text and its chapters. This is really challenging research topic as different books may have different font types and styles. The digital books and eBooks reading habit is increasing day by day and new documents are producing every day. So in order to boost the process the text reorganization using digital image processing techniques can be used. This research work is using hybrid algorithms and morphological algorithms. For sample we have taken an letter pad where the text and images are separated using algorithms. The another objective of this research is to increase the accuracy of recognized text and produce accurate results. This research worked on two different concepts, first is concept of Pixel-level thresholding processing and another one is Otsu Method thresholding.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Xi-Yan Li ◽  
Xia-Bing Zhou ◽  
Qing-Lei Zhou ◽  
Shi-Jing Han ◽  
Zheng Liu

With the development of cloud computing, high-capacity reversible data hiding in an encrypted image (RDHEI) has attracted increasing attention. The main idea of RDHEI is that an image owner encrypts a cover image, and then a data hider embeds secret information in the encrypted image. With the information hiding key, a receiver can extract the embedded data from the hidden image; with the encryption key, the receiver reconstructs the original image. In this paper, we can embed data in the form of random bits or scanned documents. The proposed method takes full advantage of the spatial correlation in the original images to vacate the room for embedding information before image encryption. By jointly using Sudoku and Arnold chaos encryption, the encrypted images retain the vacated room. Before the data hiding phase, the secret information is preprocessed by a halftone, quadtree, and S-BOX transformation. The experimental results prove that the proposed method not only realizes high-capacity reversible data hiding in encrypted images but also reconstructs the original image completely.


2013 ◽  
Vol 385-386 ◽  
pp. 1705-1707
Author(s):  
Tzer Long Chen ◽  
Yu Fang Chung ◽  
Jian Mao Hong ◽  
Jeng Hong Jhong ◽  
Chin Sheng Chen ◽  
...  

It is important to notice that the access control mechanism has been widely applied in various areas, such as on-line video systems, wireless network, and electronic documents. We propose an access control mechanism which is constructed based on two mathematical fundamentals: Lagrange interpolation and ElGamal algorithm. We conduct performance analysis to compare the efficiency of our proposed scheme with that of several related published schemes in both key generation phase and key derivation phase. Our new scheme is proven to be more efficient. It is shown, as expected, a more efficient scheme provides relatively less security and a more secure scheme is relatively less efficient for private keys of the same size.


Author(s):  
Rafael D. Lins ◽  
Daniel M. Oliveira ◽  
Gabriel Torreão ◽  
Jian Fan ◽  
Marcelo Thielo
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document