Results 21 to 30 of about 260,218 (282)

On the security of digital signature schemes based on error-correcting codes [PDF]

open access: yes, 2003
We discuss the security of digital signature schemes based on error-correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to explain why the Xinmei scheme failed, such as the linearity of the signature and the ...
Doumen, Jeroen   +2 more
core   +3 more sources

Generation and verification method of trusted signature seal incorporating handwriting features

open access: yes网络与信息安全学报
With the rapid development of electronic communication and internet technology, the digitization of document circulation and processing has become increasingly prevalent.The trend towards greater convenience, flexibility, and diversity in electronic ...
Li LI, Shang GAO, Peiliang ZUO, Jiazheng XUAN, Han SONG
doaj   +3 more sources

Online Signature Verification Using Locally Weighted Dynamic Time Warping via Multiple Fusion Strategies

open access: yesIEEE Access, 2022
Online signature verification is the process of using a dynamic signature verification system to confirm the writer’s identity. It can be used as a security system to confirm entrance applications and password substitutes, as well as a forensic ...
Manabu Okawa
doaj   +1 more source

Ring Signature Scheme of Programmable Hash Function on Lattices [PDF]

open access: yesJisuanji gongcheng, 2020
To address the problem that the length of signature and key is too long in traditional ring signature schemes on lattices,this paper proposes an improved ring signature model of Programmable Hash Function(PHF) on lattices.The MP12 trapdoor function is ...
GE Binghui, ZHAO Zongqu, HE Zheng, QIN Panke
doaj   +1 more source

Handwritten Signature Verification using Deep Learning [PDF]

open access: yes, 2020
Every person has his/her own unique signature that is used mainly for the purposes of personal identification and verification of important documents or legal transactions.
Abu-Naser, Samy S.   +6 more
core  

DeepAirSig: End-to-End Deep Learning Based in-Air Signature Verification

open access: yesIEEE Access, 2020
In-air signature verification is vital for biometric user identification in contact-less mode. The state-of-the-art methods use heuristics for signature acquisition, and provide insufficient data to train neural networks for the verification.
Jameel Malik   +5 more
doaj   +1 more source

Bagged ensemble of fuzzy classifiers and feature selection for handwritten signature verification [PDF]

open access: yesКомпьютерная оптика, 2019
Handwritten signature verification is an important research area in the field of person authentication and biometric identification. There are two known methods for handwriting signature verification: if it is possible to digitize the speed of pen ...
Konstantin Sarin, Ilya Hodashinsky
doaj   +1 more source

An Offline Signature Verification and Forgery Detection Method Based on a Single Known Sample and an Explainable Deep Learning Approach

open access: yesApplied Sciences, 2020
Signature verification is one of the biometric techniques frequently used for personal identification. In many commercial scenarios, such as bank check payment, the signature verification process is based on human examination of a single known sample ...
Hsin-Hsiung Kao, Che-Yen Wen
doaj   +1 more source

Offline signature verification using classifier combination of HOG and LBP features [PDF]

open access: yes, 2011
We present an offline signature verification system based on a signature’s local histogram features. The signature is divided into zones using both the Cartesian and polar coordinate systems and two different histogram features are calculated for each ...
Kholmatov, Alisher Anatolyevich   +6 more
core   +2 more sources

A robustness verification system for mobile phone authentication based on gestures using Linear Discriminant Analysis [PDF]

open access: yes, 2011
This article evaluates an authentication technique for mobiles based on gestures. Users create a remindful identifying gesture to be considered as their in-air signature. This work analyzes a database of 120 gestures of different vulnerability, obtaining
Bailador del Pozo, Gonzalo   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy