Results 231 to 240 of about 260,218 (282)
Multi-stage deep learning framework for robust recognition of overlapping and faded handwritten text in bank cheques. [PDF]
Chaitanyaswami H +6 more
europepmc +1 more source
On the Convergence of Internet of Things and Decentralized Finance: Security Challenges and Future Directions. [PDF]
Sarasijanayanan P +2 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Dynamic Signature Verification System Based on One Real Signature
IEEE Transactions on Cybernetics, 2018The dynamic signature is a biometric trait widely used and accepted for verifying a person's identity. Current automatic signature-based biometric systems typically require five, ten, or even more specimens of a person's signature to learn intrapersonal variability sufficient to provide an accurate verification of the individual's identity. To mitigate
Moises Diaz +3 more
openaire +5 more sources
Signature Verification Using Python
International Journal for Research in Applied Science and Engineering Technology, 2023Abstract: Each individual has a distinctive signature that is primarily used for personal identification and the confirmation of significant papers orlegal transactions. Static (offline) and dynamic signature verification come in two flavours (online). After a signature has been made, it can be verified using a methodknown as static verification. For a
K. Sujith +4 more
openaire +1 more source
Biometric signature verification
International Journal of Biometrics, 2015In recent years, biometric signature verification BSV has been considered with renewed interest with increasing need of security and individual verification and authentication whether in banks, offices, institutions or other commercial organisations. Biometric signature verification is a behavioural biometric technique as a signature signifies unique ...
Suraiya Jabin, Farhana Javed Zareen
openaire +1 more source
On-line signature verification
Pattern Recognition, 2002zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jain, Anil K. +2 more
openaire +2 more sources
Novel signature verification process
2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), 2016Cloud computing is a model to access computing resources from anywhere. Cloud provides companies the opportunity to store their large amount of sensitive and confidential data on three different platforms-SaaS, PaaS, and IaaS. Among these three models of Cloud, SaaS has more security threats.
Abdul Razaque +4 more
openaire +1 more source
Biometrics-Signature Verification Techniques
IETE Journal of Education, 2000Personal identification is becoming an ever important issue in our every day life. Biometric Technology is the state-of-the-art that has dealt with the queries related to the identity of the indivi...
Sharon James, Subhadeep Pal
openaire +1 more source

