Author of the publication

Let's be done with thresholds!

, , and . ICDAR, page 851-855. IEEE Computer Society, (2015)relocated from Tunis, Tunisia.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Use of SLIC superpixels for ancient document image enhancement and segmentation., , , , , and . DRR, volume 9402 of SPIE Proceedings, page 940205. SPIE, (2015)Low-complexity arrays of contour signatures for exact shape retrieval., , and . Pattern Recognit., (2021)Guilloche Detection for ID Authentication: A Dataset and Baselines., , , , , and . MMSP, page 1-6. IEEE, (2023)Identity Documents Authentication based on Forgery Detection of Guilloche Pattern., , , and . CoRR, (2022)Robustness of Character Recognition Techniques to Double Print-and-Scan Process., and . IWCDF@ICDAR, page 27-32. IEEE, (2017)978-1-5386-3586-5.Mobile Phone Camera-Based Video Scanning of Paper Documents., , and . CBDAR, volume 8357 of Lecture Notes in Computer Science, page 164-178. Springer, (2013)Energy and Orientation Maps for Interactive Visualization and Retrieval of Ancient Coins., , and . CBMI, page 243-248. ACM, (2023)Knowledge-Based Techniques for Document Fraud Detection: A Comprehensive Study., , , , , and . CICLing (1), volume 13451 of Lecture Notes in Computer Science, page 17-33. Springer, (2019)Detecting Forged Receipts with Domain-Specific Ontology-Based Entities & Relations., , , , and . ICDAR (3), volume 14189 of Lecture Notes in Computer Science, page 184-199. Springer, (2023)Deep Discriminative Feature Learning for Document Image Manipulation Detection., , , , and . VISIGRAPP (4): VISAPP, page 567-574. SCITEPRESS, (2024)