By Topic

Forensic Detection of Fraudulent Alteration in Ball-Point Pen Strokes

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Rajesh Kumar ; Directorate of Forensic Science, MHA, Govt. of India, New Delhi, India ; Nikhil R. Pal ; Bhabatosh Chanda ; J. D. Sharma

Alteration and addition to valuable data on paper documents are among the fastest growing crimes around the globe. The loss due to these crimes is huge and is increasing with an alarming rate. The techniques, which are used by forensic document examiners, to examine such cases are still limited to manual examination of physical, chemical and microscopic characteristics. Moreover, it is very difficult to detect an alteration when the ink of similar color is involved. We could not find much in the literature to deal with this problem in an automated pattern recognition framework. In this paper, we restrict ourselves to alterations made with ball-point pen strokes and propose a scheme for detection of such alterations using pattern recognition tools. For this, a large set of color and texture based features is extracted. To choose an adequate set of useful features from the extracted ones, a multilayer perceptron (MLP)-based feature analysis technique is used. For detection of the alteration, three different classifiers, namely, K-nearest neighbor, MLP and support vector machines are used. The results are quite promising.

Published in:

IEEE Transactions on Information Forensics and Security  (Volume:7 ,  Issue: 2 )