This chapter exhibits the technologies on device source identification and document forgery detection. It presents three examples on printer identification, scanner identification and document forgery ...
Some results have been hidden because they may be inaccessible to you