Provided by: Dublin Institute of Technology
The approach discussed in this paper is robust to a wide variety of attacks including geometric attacks, drawing, crumpling and print/scan attacks, details of which lie beyond the scope of the paper. The method is relatively insensitive to lossy compression, itering, amplitude adjustments, additive noise and thresholding (for a binary input). The principal weakness of the system is its sensitivity to rotation and cropping. This can be minimized by orienting the document correctly and accurately before scanning and using automatic cropping software which is available with selected scanners (e.g. cannon scanners).