نتایج جستجو برای: line signature recognition
تعداد نتایج: 712456 فیلتر نتایج به سال:
We consider the problem of multi-modal pattern recognition under the assumption that a kernel-based approach is applicable within each particular modality. The Cartesian product of the linear spaces into which the respective kernels embed the output scales of single sensors is employed as an appropriate joint scale corresponding to the idea of combining modalities at the sensor level. This cont...
The paper “A Colour Code Algorithm for Signature Recognition” accounts an image processing application where any user can verify signature instantly. The system deals with a Colour code algorithm, which is used to recognize the signature. The paper deals with the recognition of the signature, as human operator generally make the work of signature recognition. Hence the algorithm simulates human...
The notion of on-line/off-line signature schemes was introduced in 1990 by Even, Goldreich and Micali. They presented a general method for converting any signature scheme into an on-line/off-line signature scheme, but their method is not very practical as it increases the length of each signature by a quadratic factor. In this paper we use the recently introduced notion of a trapdoor hash funct...
A new DTW-based on-line signature verification system is presented and evaluated. The system is specially designed to operate under realistic conditions, it needs only a small number of genuine signatures to operate and it can be deployed in almost any signature capable capture device. Optimal features sets have been obtained experimentally, in order to adapt the system to environments with dif...
A number of biometric techniques have been proposed for personal identification in the past. Among the vision-based ones, we can point out fingerprint, face, palm, ear, iris and retina recognition. Voice recognition or signature verification are the most widely known among the non-vision based ones. Signature verification requires the use of electronic tablets or digitizers for on-line capturin...
We combine a publicly veriiable encryption technique and a Schnorr type signature scheme to achieve a veriiable escrowed signature scheme. The scheme allows a signer to convince a veriier the validity of a signature without letting him see the signature value. The unavailable but veriiable signature is encrypted under a public key of someone (e.g., a trusted third party) who stays oo-line. The ...
HMM has been used successfully to model speech and online signature in the past two decades. The success has been attributed to the fact that these biometric traits have time reference. Only few HMM based offline signature recognition systems have be developed because offline signature lack time reference. This paper presents a recognition system for offline signatures using Discrete Cosine Tra...
HMM has been used successfully to model speech and online signature in the past two decades. The success has been attributed to the fact that these biometric traits have time reference. Only few HMM based offline signature recognition systems have be developed because offline signature lack time reference. This paper presents a recognition system for offline signatures using Discrete Cosine Tra...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید