Results 11 to 20 of about 138,067 (276)

Interval valued symbolic representation of writer dependent features for online signature verification [PDF]

open access: yesExpert Systems With Applications, 2017
This work focusses on exploitation of the notion of writer dependent parameters for online signature verification. Writer dependent parameters namely features, decision threshold and feature dimension have been well exploited for effective verification ...
Guru, D.S.   +3 more
core   +3 more sources

Offline Signature Verification Using Image Processing [PDF]

open access: yesE3S Web of Conferences, 2023
A person’s signature is merely a handwritten sign that closely resembles his/her name, frequently stylized and distinctive, and that expresses the person’s identity, intent, and consent. Two types of verifications are present.
Shaik Bushra   +3 more
doaj   +1 more source

Online Handwritten Signature Verification Method Based on Uni-Feature Correlation Coefficient between Signatures

open access: yesSensors, 2023
Online handwritten signature verification is a crucial direction of research in the field of biometric recognition. Recently, many studies concerning online signature verification have attempted to improve performance using multi-feature fusion. However,
Ruonan Liu, Yizhong Xin
doaj   +1 more source

Online Signature Verification Using Locally Weighted Dynamic Time Warping via Multiple Fusion Strategies

open access: yesIEEE Access, 2022
Online signature verification is the process of using a dynamic signature verification system to confirm the writer’s identity. It can be used as a security system to confirm entrance applications and password substitutes, as well as a forensic ...
Manabu Okawa
doaj   +1 more source

Handwritten Signature Verification Method Based on Improved Combined Features

open access: yesApplied Sciences, 2021
As a behavior feature, handwritten signatures are widely used in financial and administrative institutions. The appearance of forged signatures will cause great property losses to customers. This paper proposes a handwritten signature verification method
Yiwen Zhou   +3 more
doaj   +1 more source

Online Signature Verification

open access: yesJournal of Forensic Document Examination, 2014
In this paper, the discriminative power of a set of features which seems to be relevant to signature analysis by Forensic Handwriting Experts (FHEs) is analyzed and particularly compared to the discriminative power of automatically selected feature sets. This analysis could help FHEs to further understand the signatures and the writer behaviour.
Plamondon R   +2 more
openaire   +5 more sources

Online Signature Verification Systems on a Low-Cost FPGA

open access: yesApplied Sciences, 2021
This paper describes three different approaches for the implementation of an online signature verification system on a low-cost FPGA. The system is based on an algorithm, which operates on real numbers using the double-precision floating-point IEEE 754 ...
Enrique Cantó Navarro   +2 more
doaj   +1 more source

Online handwritten signature verification and recognition based on dual-tree complex wavelet packet transform

open access: yesJournal of Medical Signals and Sensors, 2020
Background: With the increasing advancement of technology, it is necessary to develop more accurate, convenient, and cost-effective security systems. Handwriting signature, as one of the most popular and applicable biometrics, is widely used to register ...
Atefeh Foroozandeh   +2 more
doaj   +1 more source

Template Matching Using Time-Series Averaging and DTW With Dependent Warping for Online Signature Verification

open access: yesIEEE Access, 2019
Online signature verification has been widely applied in biometrics and forensics. Due to the recent demand on high-speed systems in this era of big data, to simultaneously improve its performance and calculation complexity, this study focuses on a ...
Manabu Okawa
doaj   +1 more source

Vulnerability Analysis and Detection of Android System Signature [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the problem that an attacker can issue pirated software by re-signing the vulnerabilities in the self-signature process of Android system application program,this paper analyses the digital signature and verification process of Android system ...
LIAO Fangyuan, GAN Zhiwang
doaj   +1 more source

Home - About - Disclaimer - Privacy