Detecting documents forged by printing and copying
© Shang et al.; licensee Springer. 2014
Received: 25 March 2014
Accepted: 29 August 2014
Published: 8 September 2014
This paper describes a method to distinguish documents produced by laser printers, inkjet printers, and electrostatic copiers, three commonly used document creation devices. The proposed approach can distinguish between documents produced by these sources based on features extracted from the characters in the documents. Hence, it can also be used to detect tampered documents produced by a mixture of these sources. We analyze the characteristics associated with laser/inkjet printers and electrostatic copiers and determine the signatures created by the different physical and technical processes involved in each type of printing. Based on the analysis of these signatures, we computed the features of noise energy, contour roughness, and average gradient. To the best of our knowledge, this is the first work to distinguish documents produced by laser printer, inkjet printer, and copier based on features extracted from individual characters in the documents. Experimental results show that this method has an average accuracy of 90% and works with JPEG compression.
KeywordsDevice type identification Tampering detection Noise energy Contour roughness Average gradient
Even in the age of the Internet and digital communication, paper is used extensively as an important carrier of information. Technological advances, however, have made the printed document easy to modify for malicious purposes. Therefore, document authenticity plays an important role in forensic science where documents are disputed in a court of law. In fact, ‘questioned document examination’ (QDE) has become an important discipline within forensic science. QDE deals with scientific techniques that can provide evidence about a suspicious or questionable document.
Traditional techniques for document inspection depend on specialized devices, trained personnel, and chemicals. Such systems can be expensive, cause wear and tear, and the chemicals used can even cause damage to the documents. Document forensics in the digital domain evolved to alleviate the need for specialized devices and trained personnel in order to determine the integrity of documents being analyzed.
Document forensics technology, mostly focused on tracing the source of a document or on detecting forgery, has developed rapidly in recent years. This technology uses commodity scanners and a computer to perform the necessary analyses. The analyses can be automatic or semi-automatic, reducing costs while increasing convenience. Nevertheless, document forensics faces many challenges that limit its development. The techniques are currently limited to text documents with black text on white background. In addition, the device artifacts on the questioned document do not transfer without loss to the scanned image that is analyzed. Various methods in digital image forensics are reviewed in , edited by Sencar and Memon. Although document forensics works based on scanned images, the methods are significantly different. Recent research in document forensics has focused on printer identification [2–8], forgery detection [9–12], and scanner identification [13–16].
In this paper, we describe a method to distinguish documents produced by laser printers, inkjet printers, and electrostatic copiers, three devices that are commonly used today. The proposed approach can distinguish between documents produced by these sources based on the characters in the document. Hence, it can also be used to detect tampered documents produced by a mixture of these sources. We analyze the characteristic for laser/inkjet printers and electrostatic copiers and determine the telltale ‘signatures’ caused by the different physical and technical processes involved in each type of printing. Based on the analysis of these signatures, we compute features comprising noise energy, contour roughness, and average gradient. To the best of our knowledge, this is the first work to distinguish documents produced by laser printers, inkjet printers, and copiers based on features extracted from individual characters in the documents. Using individual characters also allows us to detect and localize document forgeries created using different types of source documents.
This paper is organized as follows: Section 2 introduces related work in print forensics. Section 3 reviews the working principles of printers and copiers and the different characteristics they impart on documents. Section 4 describes the features used by the proposed technique. Section 5 gives the experimental results of the proposed scheme, including a description of how the different features perform, the performance of the algorithm for JPEG compression, and different resolutions; and Section 6 presents conclusions and future work.
2 Related work
Often, the first step in document forensics focuses on source identification. The aim is to trace the source of the documents including the brand and model of the device. Typically, statistical characteristics of the printed characters are used to identify the source brands and models. For example, Delp et al. used gray-level co-occurrence matrices (GLCM) [2, 3] features, variance/entropy, and discrete Fourier transform (DFT)  features to identify the printer source. Banding frequency is another characteristic used to identify the source as a laser printer. Banding, which appears as non-uniform light and dark lines perpendicular to the printing direction , is caused by fluctuations in the rotating angular velocity of the organic photo conductor (OPC) drum and by errors in the gear transmission mechanism. Delp et al.  printed pre-generated gray images and exploited the projection method and Fourier transform to estimate banding frequencies. Some researchers have also focused on hardware defects to trace the source; these include spinning velocity fluctuations of the polygon mirror in the laser printer and the imperfections of the paper feeding mechanism, which result in geometric distortions in the document that can serve to characterize individual laser printers. Kong et al.  established a projective transformation model to estimate such geometric distortions. Bulan et al.  computed the geometric distortion signature from printed halftone images to trace the source laser printer by estimating the variations in the center positions of halftone dots.
The second step in document forensics is document forgery detection. A forgery could involve changing, adding, or deleting some information on the document or replacing an entire page with a counterfeited page . For pasting and reprinting forgery operations, character location distortion is often introduced. Beusekon et al.  presented a technique for extracting text lines and alignment lines for document inspection. For English language characters, most characters align according to the ascender line, descender line, and base line. Tampered characters deviate from these three lines because of location distortion. In , the matching quality between all pairs of documents was used to expose tampered documents. When a page is replaced or reprinted, location distortion will occur when comparing the forged page or the tampered region with a genuine document. By computing the matching quality of two page images, the forged page or tampered region will be detected. Farid and Kee  established a printer model for characters to detect documents forged by different printers. They used principal component analysis (PCA) and singular value decomposition (SVD) to model the degradation of a page caused by printing, and the resulting printer profile was then used to distinguish between characters generated from different printers.
If a technique that aims to detect the source device type (printer, copier, etc.) is based on characters, it can also be applied for forgery detection. Some work has been done on this topic. Chan [17, 18] extracted the edge sharpness, surface roughness, and image contrast features from pre-printed images of squares. A neural network was then applied to distinguish print and copying techniques. Lampert and Breuel  analyzed the differences between laser and inkjet printouts; a set of 15 features was extracted from each character including line edge roughness, correlation coefficient, and texture. A support vector machine (SVM) was then used to classify the characters. The average accuracy for this technique reached 94.8%. Umadevi et al.  divided a text image into three regions: foreground text, noise, and background. An expectation maximization (EM) algorithm was then utilized to determine the three regions. An iterative algorithm was applied to generate a parameter print index (PI) used for print technology discrimination. All the methods in [17–20] focused on distinguishing characters produced by laser and inkjet printers. Schulze et al.  described a frequency domain method to distinguish between printed and copied documents. The mean and standard deviation of the discrete cosine transformation (DCT) coefficients were extracted from image blocks, and an average accuracy of 99.08% was achieved for full-page detection.
3 Characteristics of documents produced by different devices
3.1 The printing/copying process
In this section, we describe how printers/copiers work, and the characteristic telltale ‘signatures’ they generate in a document. Differing technical processes and mechanical constructions cause different character morphologies in the document. In the electrophotographic process of laser printing, there are six steps: charging, exposure, developing, transferring, fusing, and cleaning . The optoelectronic devices in a laser printer accurately transfer the image signal corresponding to the document, and the toner image is melted by the fuser and pressed onto the paper. As a result, the printed characters have a glossy appearance and a clear contour.
An electrostatic copier utilizes the same electrophotographic process as a laser printer. However, an electrostatic copier scans the document using CCD/CMOS image sensors, converts the analog signal to a digital signal, and then performs the electrophotographic process.
An inkjet printer consists of three principal components: the print head, the carriage, and the paper-advance mechanism . The print head is fixed to the carriage and fires ink onto paper while the carriage moves back and forth in the scan direction.
3.2 Differences in document characteristics
3.2.1 Laser printer vs. electrostatic copier
3.2.2 Inkjet printer vs. laser printer
The primary difference between inkjet and laser printers lies in the process. An inkjet printer works by firing drops of ink onto paper when the print head is moving. As a result, tails or satellites of the ink drop are formed on the document, and the contours of the printed characters are rough and contain ups and downs. For some brands and models, the period of the ups and downs can be observed in the character contour because the distance between two scanning traces is constant for a printer, and the distance between two tails is therefore the same. In addition, the ink is a fluid that contains a considerable amount of water. The diffusion speed of the ink is quicker than that of the fused toner on the paper; thus, inkjet-printed characters have a wider black-to-white transition on their edges than laser-printed characters.To illustrate the above differences, the word ‘the’ printed/copied by the three types of devices is shown in Figure 1. The differences in how the word is rendered can be observed when the scanned images are magnified. As the signal is transferred most accurately in the process of laser printing, the laser-printed word has a glossy appearance and a clear contour (Figure 1a). The quality of inkjet printing is lower than that of laser printing, as seen in the inkjet-printed word (Figure 1b). The copied characters (Figure 1c) possess a clearer contour than the inkjet-printed characters, although their quality is not as good as that of laser-printed characters because of the degradation caused by scanning a printed document.
In the next section, we develop an approach to differentiate between documents or characters produced by different devices based on the above observations. AWGN noise energy, impulsive noise energy, and contour roughness are used to differentiate between laser printers and electrostatic copiers. Contour roughness and average gradient along the contour are used to differentiate between laser-printer and inkjet-printer documents.
4 Proposed algorithm
In this section, we present the algorithm for distinguishing documents produced by laser printers, inkjet printers, and electrostatic copiers. We first give an overview of the different steps involved and then provide more details in the subsections that follow.
Pre-processing: As the proposed method is based on features derived from individual characters, the characters in the tilt-corrected scanned image are first segmented. A threshold Th is generated to binarize the character image and used to simultaneously divide each character image into three parts: the text region, edge region, and background region.
- 2.Feature extraction: As the background region contains no information about the character, it is not considered in this paper. Instead, the following four features are extracted from the text and edge regions:
Noise energy in the text region
Noise energy in the edge region
Contour roughness on the character
Average gradient on the edge region of the character.
Classification and decision: After the four features are extracted from the character, SVM is applied to classify each of the characters. The origin of the document or a part of the document is then decided upon based on the individual character decisions using majority voting.
4.1 Image pre-processing
Using the same threshold Th generated from the character histogram, the text, edge, and background regions are identified to extract the noise energy and average gradient features. In the experiments, pixel values in the range of 0.8Th ∼1.2Th were found to describe the edge region well for the three types of characters; thus, the edge region of characters is determined in this threshold range. Pixel values less than 0.8Th are classified as text region, while values greater than 1.2Th are classified as background region. Figure 2b shows the three regions obtained from Figure 1b in different colors: the text region is shown in green, the background region is shown in blue, and the edge region where pixels transfer from white to black is shown in red.
In order to remove the influence of the background noise, we discard the background region when extracting features. The noise energy features are computed from the text and edge regions of the character. Contour roughness is computed from the binary image, and average gradient is computed from the edge region.
4.2 Feature extraction
Due to the differences in the technical processes of printing/copying techniques and the resulting diversity in morphology, we compute discriminative features for these types of devices based on character morphologies including noise energy, contour roughness, and average gradient.
Independent of specific characters: the features can be extracted from arbitrary letters and words, and their values remain stable for different content;
Independent of brand or model for printer and copier: for each type of technique, different brands or models may produce different character morphologies. The features are not expected to sensitive to the individual brands or models. Perfect features fall consistently in the feature space for each device type.
Sensitive to printing and copying technique.
4.2.1 Noise energy in characters
As described in Section 3.1, laser printers and electrostatic copiers have similar architectures. Nevertheless, they produce significantly different printout qualities. Noise is introduced to the document during the scanning step in the copying process. This noise consists of AWGN and impulsive noise. AWGN noise mainly exists in the edge region of the character and has a strong influence on character morphology. In the edge region, a copied character has more significant texture than a printed character. The impulsive noise occurs mainly in the text region, appearing as white dots on the character. As described above, we extract the noise energy of AWGN and impulsive noise from the edge and text regions of the character, respectively. The noise energy in a copied character is expected to be greater than in a printed character.
Discrete wavelet transform (DWT) is used to extract the noise described above. One-level DWT is performed on the character, and Gaussian and median filtering are conducted on the wavelet coefficients to remove noise in the edge and text regions, respectively. After filtering, the denoised image is obtained by re-constructing the wavelet coefficients. Finally, the Gaussian and impulsive noises are computed by subtracting the original image from the filtered image.
126.96.36.199 Denoising by applying a Gaussian filter to DWT coefficients
where W denotes the wavelet sub-band coefficients in HH for the first level and denotes the average of W. As AWGN is present mainly in high-frequency coefficients, the standard deviation estimation is conducted on the wavelet sub-band coefficients HH in the first level.
An optimization algorithm is applied to estimate the AWGN in the image. The algorithm essentially performs repeated iterative calculations using a Gaussian filter to remove the AWGN in the image using filter parameters determined in the previous iteration. The initial standard deviation value is set to 0.5, and the iterative calculation is terminated when the difference between two successive estimates of standard deviation is less than a threshold ε. Because Σ is monotonically decreasing, the process converges.
The pseudo-code for the optimization algorithm is shown below. We start with iteration k=1, where Σ k =0.5 and α=0.5. We use a convergence threshold of ε=0.001.
Step 5: If |Σk+1-Σ k |<ε compute and return else k=k+1,go to Step 1,
where GF denotes the Gaussian filter function with parameter Σ and IDWT is the inverse DWT. The Gaussian filter is applied on the horizontal component HH, the vertical component HV, and the diagonal component HD of the first-level DWT; the sizes of these filters are 1×9, 9×1, and 9×9, respectively. IER denotes the character image in the edge region, and and are the AWGN image and denoised image of IER in the k th iterative calculation, respectively.
188.8.131.52 Denoising by median filter on DWT coefficients
During the experiment, some impulsive noise could be found in the smooth region of characters; it may due to the quality defects in a device. Most of this impulsive noise is so small that it could be seen only by magnifying the scanned image. Generally speaking, the location, quantity, and intensity of impulsive noise are stochastic. The quantity and intensity of impulsive noise are greater in a copied document compared to a printed document.
184.108.40.206 Noise energy
where U∈Rm×m and V∈Rn×n are orthogonal matrices, Σ∈Rm×n is a diagonal matrix whose diagonal elements λ1≥λ2≥···λ k ≥0 denote the eigenvalues of matrix I with k= min(m,n). The eigenvalues represent the energy that I projects to a subspace in U and R, and the eigenvalues in Σ are sorted by value from large to small. That is to say, the energy projected to the subspace changes in descending order.
As AWGN and impulsive noise are extracted on the edge and text regions of characters, respectively, we compute the ratio of energy between the two regions and denote them as E1 and E2, respectively. These are the first two-dimensional features considered to distinguish printing and copying techniques.
4.2.2 Contour roughness
Roughness is used to distinguish inkjet printing from laser printing and copying. In inkjet printing, tails or satellites trail the ink drop in the scan direction because the drops of ink are fired onto paper when the print head is moving . Due to these periodic tails or satellites, the character contour is rougher than in laser-printed and copied characters, and the value of contour roughness is higher for inkjet-printed characters. Roughness is computed based on the digital image of characters.
220.127.116.11 Coordinate extraction of character contour
The edge searching method based on the binary image is applied to extract the character contour, and the coordinates of contour pixels are recorded in this process. The selection of the initial contour point is arbitrary; in this paper, we search rows from top to bottom and columns from left to right to find the initial point. The search terminates when the current searched pixel returns to the initial point.
Since each pixel has eight adjacent pixels, we search the adjacent pixels one by one to insure the searched pixels are on the contour of characters; the pixel then moves to the next adjacent one to search the next contour pixel. During the searching process, we record the coordinates of the contour pixels that are used to compute contour roughness. It should be noted that one character may have more than one connected region; we search the connected regions one by one and record the contour pixel coordinates until all the contour pixels of the character are recorded.
18.104.22.168 Character contour projection
A projection is applied on the character contour to transfer the 2-D contour curve to a 1-D vector used to compute the contour roughness. Initially, each character contour is divided into several segments. The contour in each segment fragment could be seen as a ‘straight’ curve. Next, a line is generated that connects the two endpoints of each segment, and the distances between segment pixels and the line are computed. Finally, the distances for all the contour pixels are assigned to a 1-D vector. This process can be denoted as the character contour projection from 2-D contour to 1-D vector.
There exist some corner points and radians in each character, and the length of the contour segments should thus be restricted. A perfect contour segment contains no corner point and has a radian small enough to prevent deviation in the distance computation. The following iterative algorithm determines the length of the contour fragment.
Initial conditions: Suppose that the initial searching step L, which is the search length on the contour, is 1/5 of the character height. The initial searching point O is arbitrary on the contour. The starting and ending pixels of the current segment are A and B, respectively, where . C denotes the arbitrary point on the contour between A and B, as illustrated in Figure 3. The selection of L and the distance computation are conducted as follows:
Step 1: Compute the distance d from point C to line AB. If max(d)>5, go to Step 4;
Step 2: Compute the angle α when AC rotate clockwise to AB. If ∃C makes α>180°, go to Step 4;
Step 3: Compute the angle β betweenand. If ∃β>0, go to Step 5;
Step 4: L=L-1;
Step 5: Compute the distance between the contour pixels on the segment and line AB, assign the distance values to a vector. If B is the initial searching point O, go to Step 7;
Step 6: Search the next end pixel of the segment using the step length of L. The new end pixel is defined as B and the original B is redefined as A. If the initial search point O is between A and B, define O as B and go to Step 1;
In the iterative algorithm, steps 1 to 3 serve to constrain the length of the contour segment. These limitations ensure that the curvature on the contour segment is not large and that there is no corner on the contour segment. Curvature and corners have a significant influence on the contour roughness computation. Finally, a vector is obtained from the iterative algorithm.
22.214.171.124 Contour roughness
The character contour roughness of a laser printer is expected to be less than that of an inkjet printer because character contours originated from laser printers are smoother. This feature describes the degree of character contour roughness between the two printing techniques.
4.2.3 Average gradient on a character edge
5 Experiments and results
Printers and copiers used in the experiments
Brand and model
Brand and model
Brand and model
Kyocera km 8030
HP Pro 400 MFP
Konica Minolta 7272
5.1 Performance of the features
5.2 Experimental results
The classification accuracy for laser printers (%)
The classification accuracy for inkjet printers (%)
The classification accuracy for electrostatic copiers (%)
5.3 The effect of JPEG compression
5.4 The influence of scanning resolution
5.5 Forgery detection
In this paper, we have proposed a method for detecting fraudulent documents. Characters in the document are analyzed to identify the signatures of the common device(s) used to create them. These devices could include laser printers, inkjet printers, and electrostatic copiers.
As the devices differ in their technical architectures, they produce characteristic character morphologies in the document. To identify the source-specific characteristics, we extract features including AWGN energy, impulsive noise energy, contour roughness, and average gradient from the characters. The AWGN and impulsive noise energies are isolated by wavelet transformation (WT) and SVD on the character image and used to distinguish between laser printers and copiers. Contour roughness is drawn from the character contour; it reflects the degree of roughness on the character contour and is mainly used for laser and inkjet printer identification. Average gradient is used to distinguish inkjet printers from laser printers as the black-to-white transition velocity is greater in inkjet-printed characters.
The experimental results show the effectiveness of the proposed method. For all the inkjet printers and most laser printers and copiers, the accuracy reaches 90%. The SVM models were tested for stability, and the method is also robust to JPEG compression. However, the method is sensitive to resolution, with better accuracy obtained at higher resolutions. Finally, since the proposed technique utilizes the classification of individual letters or words, it was shown that it can be used to detect a forged document consisting of parts originating from different device types.
Future work will focus on improving the robustness of the method by making it work with all brands of devices and improving its accuracy at lower resolution.
The first and last authors were supported by the National Natural Science Foundation of China under Grant Number 61172109 and China Scholarship Council.
- Sencar HT, Memon N: Digital Image Forensics: There Is More to a Picture than Meets the Eye. Springer, New York; 2013.View ArticleGoogle Scholar
- Mikkilineni AK, Khanna N, Delp EJ: Forensic printer detection using intrinsic signatures. In Proceedings of SPIE-IS and T Electronic Imaging - Media Watermarking, Security, and Forensics III. San Francisco, CA, USA; 24–26 Jan 2011:78800-11.View ArticleGoogle Scholar
- Mikkilineni AK, Chiang PJ, Ali G, Chiu GTC, Allebach P, Delp EJ: Printer identification based on graylevel co-occurrence feature for security and forensics application. In Proceedings of the SPIE - The International Society for Optical Engineering. San Jose, CA, USA; 21 Mar 2005:430-440.Google Scholar
- Mikkilineni AK, Khanna N, Delp EJ: Texture based attacks on intrinsic signature based printer identification. In Proceedings of the SPIE - The International Society for Optical Engineering. San Jose, CA, USA; 18–20 Jan 2010:75410-12.Google Scholar
- Chiang PJ, Khanna N, Mikkilineni AK, Segovia MVO, Suh S, Allebach JP, Chiu GTC, Delp JE: Printer and scanner forensics. IEEE Signal Process. Mag 2009, 26: 72-83.View ArticleGoogle Scholar
- Ali GN, Mikkilineni AK, Chiang JP, Allebach GT, Delp EJ: Intrinsic and extrinsic signatures for information hiding and secure printing with electrophotographic devices. In International Conference on Digital Printing Technologies. New Orleans, LA, USA; 28 Sept–3 Oct 2003:511-515.Google Scholar
- Wu YB, Kong XW, Guo YP: Printer forensics based on page document’s geometric distortion. In Proceedings of the 2009 16th IEEE International Conference on Image Processing (ICIP 2009). Cairo, Egypt; 7–12 Nov 2010:2909-2912.Google Scholar
- Bulan O, Mao J, Sharma G: Geometric distortion signatures for printer identification. In ICASSP 2009 - 2009 IEEE International Conference on Acoustics, Speech and Signal Processing. Taipei, Taiwan; 19–24 Apr 2009:1401-1404.View ArticleGoogle Scholar
- Cui L: Document inspection forged by photocopying. J. Chinese People’s Public Secur. Univ. (Science and Technology) 2008, 3: 22-24.Google Scholar
- Beusekom JV, Shafait F, Breuel TM: Document inspection using text-line alignment. In ACM International Conference Proceeding Series. Boston, MA, USA; 9–11 Jun 2010:263-270.Google Scholar
- Beusekom JV, Shafait F: Distortion measurement for sutomatic document verification. In Proceedings of the 2011 11th International Conference on Document Analysis and Recognition (ICDAR 2011). Bejing, China; 18–21 Sept 2011:289-293.View ArticleGoogle Scholar
- Kee E, Farid H: Printer profiling for forensics and ballistics. In MM and Sec’08: Proceedings of the 10th ACM Workshop on Multimedia and Security. Oxford, UK; 22–23 Sept 2009:3-9.Google Scholar
- Aronoff JS, Simske SJ: Effect of scanner resolution and character selection on source printer identification. J. Inform. Sci. Technol 2011, 55: 506021-5060210.Google Scholar
- Gou H, Swaminathan A, Wu M: Robust scanner identification based on noise features. In Proceedings of SPIE - The International Society for Optical Engineering. San Jose, CA, USA; 29 Jan–1 Feb 2007:0-0.Google Scholar
- Khanna N, Mikkilineni AK, Delp EJ: Scanner identification using feature based processing and analysis. IEEE Tran. Inform. Forensics Secur 2009, 4: 123-139.View ArticleGoogle Scholar
- Dirik AE, Sencar HT, Memon N: Flatbed scanner identification based on dust and scratches over scanner platen. In ICASSP 2009 - 2009 IEEE International Conference on Acoustics, Speech and Signal Processing. Taipei, Taiwan; 19–24 Apr 2009:1385-1388.View ArticleGoogle Scholar
- Tchan J: Classifying digital prints according to their production process using image analysis and artificial neural networks. In Proceedings of the SPIE - The International Society for Optical Engineering. San Jose, USA; 27–28 Jan 2000:105-116.Google Scholar
- Tchan J: The development of an image analysis system that can detect fraudulent alterations made to printed images. In Proceedings of the SPIE - The International Society for Optical Engineering. San Jose, USA; 20–22 Jan 2004:151-159.Google Scholar
- Lampert CH, Breuel TM: Printing technique classification for document counterfeit detection. In 2006 International Conference on Computational Intelligence and Security. Guangzhou, China; 3–6 Nov 2006:639-644.View ArticleGoogle Scholar
- Umadevi M, Agarwal A, Rao R: Printed text characterization for identifying print technology using expectation maximization algorithm. Multi-disciplinary Trends Artif. Intell 2011, 7080: 201-212. 10.1007/978-3-642-25725-4_18View ArticleGoogle Scholar
- Schulze C, Schreyer M, Stahl A, Breuel T: Using DCT features for printing technique and copy detection. Adv. Digital Forensics V 2009, 306: 95-106. 10.1007/978-3-642-04155-6_7View ArticleGoogle Scholar
- Hoang TV, Elisa H, Smith B, Tabbone S: Edge noise removal in bi-level graphical document images using sparse representation. In 18th IEEE International Conference on Image Processing (ICIP 2011). Brussels, Belgium; 11–14 Sept 2011:3549-3552.View ArticleGoogle Scholar
- Donoho DL, Johnstone IM: Ideal spatial adaptation via wavelet shrinkage. Biometika 1994, 81: 425-455. 10.1093/biomet/81.3.425MathSciNetView ArticleMATHGoogle Scholar
- Chang C, Lin C: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol 2011, 27: 1-27.View ArticleGoogle Scholar
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.