Automatic signature verification: The state of the art
D Impedovo, G Pirlo - IEEE Transactions on Systems, Man, and …, 2008 - ieeexplore.ieee.org
In recent years, along with the extraordinary diffusion of the Internet and a growing need for
personal verification in many daily applications, automatic signature verification is being …
personal verification in many daily applications, automatic signature verification is being …
Dynamic signatures: A review of dynamic feature variation and forensic methodology
J Linden, R Marquis, S Bozza, F Taroni - Forensic science international, 2018 - Elsevier
This article focuses on dynamic signatures and their features. It provides a detailed and
critical review of dynamic feature variations and circumstantial parameters affecting dynamic …
critical review of dynamic feature variations and circumstantial parameters affecting dynamic …
[图书][B] Huber and Headrick's Handwriting Identification: Facts and Fundamentals
HH Harralson, LS Miller - 2017 - taylorfrancis.com
" Forensic document examination is the study of physical evidence and physical evidence
cannot lie. Only its interpretation can err. Only the failure to find it, or to hear its true testimony …
cannot lie. Only its interpretation can err. Only the failure to find it, or to hear its true testimony …
Development of a Sigma–Lognormal representation for on-line signatures
C O'Reilly, R Plamondon - Pattern recognition, 2009 - Elsevier
This paper proposes an on-line signature representation based on Sigma–Lognormal
modeling. It briefly overviews the prior art published on signature modeling and on human …
modeling. It briefly overviews the prior art published on signature modeling and on human …
Collaborative mobile charging for sensor networks
The limited battery capacity of sensor nodes has become the biggest impediment to wireless
sensor network (WSN) applications. Two recent breakthroughs in the areas of wireless …
sensor network (WSN) applications. Two recent breakthroughs in the areas of wireless …
Secure biometric template generation for multi-factor authentication
In the light of recent security incidents, leading to compromise of services using single factor
authentication mechanisms, industry and academia researchers are actively investigating …
authentication mechanisms, industry and academia researchers are actively investigating …
Usage of autoencoders and Siamese networks for online handwritten signature verification
K Ahrabian, B BabaAli - Neural computing and applications, 2019 - Springer
In this paper, we propose a novel writer-independent global feature extraction framework for
the task of automatic signature verification which aims to make robust systems for …
the task of automatic signature verification which aims to make robust systems for …
SUSIG: an on-line signature database, associated protocols and benchmark results
A Kholmatov, B Yanikoglu - Pattern Analysis and Applications, 2009 - Springer
We present a new online signature database (SUSIG). The database consists of two parts
that are collected using different pressure-sensitive tablets (one with and the other without …
that are collected using different pressure-sensitive tablets (one with and the other without …
[PDF][PDF] KinWrite: Handwriting-Based Authentication Using Kinect.
Password-based authentication is easy to use but its security is bounded by how much a
user can remember. Biometrics-based authentication requires no memorization but …
user can remember. Biometrics-based authentication requires no memorization but …
Mobile signature verification: Feature robustness and performance comparison
M Martinez‐Diaz, J Fierrez, RP Krish… - IET Biometrics, 2014 - Wiley Online Library
In this study, the effects of using handheld devices on the performance of automatic
signature verification systems are studied. The authors compare the discriminative power of …
signature verification systems are studied. The authors compare the discriminative power of …