On-line Devanagari handwritten character recognition using moments features
Now a days recognizing the handwritten character is receiving high significance because of
numerous applications like Educational Software, On-line Signature Verification, Bank …
numerous applications like Educational Software, On-line Signature Verification, Bank …
An approach for on-line signature authentication using Zernike moments
In this work, shape analysis of the acceleration plot, using lower order Zernike moments is
performed for authentication of on-line signature. The on-line signature uses time functions …
performed for authentication of on-line signature. The on-line signature uses time functions …
A parallel recurrence method for the fast computation of Zernike moments
H Qin, L Qin, L Xue, C Yu - Applied Mathematics and Computation, 2012 - Elsevier
This paper presents a parallel recursive method for the computation of Zernike moments
from a digital image. The proposed method can reduce the computational complexity of the …
from a digital image. The proposed method can reduce the computational complexity of the …
Signature authentication based on subpattern analysis
Current network based authentication applications require simple robust methods which are
faster and does not choke the bandwidth. Minimal features are considered using subpattern …
faster and does not choke the bandwidth. Minimal features are considered using subpattern …
Off-Line Signature Authentication Using Radial Basis Function
A system is proposed that considers minimal features using subpattern analysis which leads
to less response time in a real time scenario. Using training samples, with a high degree of …
to less response time in a real time scenario. Using training samples, with a high degree of …
A Novel Approach for Authentication of Online Handwritten Signature Based on Residuals, Poles and Zeros
KR Radhika, MK Venkatesha… - International Journal of …, 2011 - World Scientific
This paper proposes an online signature authentication based on polynomial modeling. The
derived feature acceleration is used. The order of the polynomial is carefully selected for …
derived feature acceleration is used. The order of the polynomial is carefully selected for …
Biometric Authentication using Nonparametric Methods
SV Sheela, KR Radhika - arXiv preprint arXiv:1006.1187, 2010 - arxiv.org
The physiological and behavioral trait is employed to develop biometric authentication
systems. The proposed work deals with the authentication of iris and signature based on …
systems. The proposed work deals with the authentication of iris and signature based on …
Biometric efficient identification algorithm and network authentication system with robust liveness check
J Zhu - 2010 - dr.ntu.edu.sg
The world is changing rapidly with the internet penetrating into every aspect of our lives.
People are trying their best to shift as many things from the conventional platform to the …
People are trying their best to shift as many things from the conventional platform to the …