نتایج جستجو برای: line signature recognition

تعداد نتایج: 712456  

2018

HMM has been used successfully to model speech and online signature in the past two decades. The success has been attributed to the fact that these biometric traits have time reference. Only few HMM based offline signature recognition systems have be developed because offline signature lack time reference. This paper presents a recognition system for offline signatures using Discrete Cosine Tra...

2018

HMM has been used successfully to model speech and online signature in the past two decades. The success has been attributed to the fact that these biometric traits have time reference. Only few HMM based offline signature recognition systems have be developed because offline signature lack time reference. This paper presents a recognition system for offline signatures using Discrete Cosine Tra...

2018

HMM has been used successfully to model speech and online signature in the past two decades. The success has been attributed to the fact that these biometric traits have time reference. Only few HMM based offline signature recognition systems have be developed because offline signature lack time reference. This paper presents a recognition system for offline signatures using Discrete Cosine Tra...

2018

HMM has been used successfully to model speech and online signature in the past two decades. The success has been attributed to the fact that these biometric traits have time reference. Only few HMM based offline signature recognition systems have be developed because offline signature lack time reference. This paper presents a recognition system for offline signatures using Discrete Cosine Tra...

2010
Adebayo Daramola Samuel Ibiyemi

HMM has been used successfully to model speech and online signature in the past two decades. The success has been attributed to the fact that these biometric traits have time reference. Only few HMM based offline signature recognition systems have be developed because offline signature lack time reference. This paper presents a recognition system for offline signatures using Discrete Cosine Tra...

2017

HMM has been used successfully to model speech and online signature in the past two decades. The success has been attributed to the fact that these biometric traits have time reference. Only few HMM based offline signature recognition systems have be developed because offline signature lack time reference. This paper presents a recognition system for offline signatures using Discrete Cosine Tra...

2003
Daigo Muramatsu Takashi Matsumoto

Authentication of individuals is rapidly becoming an important issue. On-line signature verification is one of the methods that use biometric features. This paper proposes a new HMM algorithm is for on-line signature verification. After preprocessing, input signature is discretized in a polar coordinate system. This particular discretization leads to a simple procedure for assigning initial sta...

2013
Imen Abroug Ben Abdelghani Najoua Essoukri Ben Amara

Our research works are concerned with checking the off-line handwritten signature. We propose a base of Tunisian static handwritten signatures. In this paper, we go through the phase of designing the SID-Signature database and its various features. Afterwards, we present the results obtained by this base as part of our system of handwritten-signature verification.

2012
Yan Wu Hui Geng Xiao-yue Bian

Aim at the difficulty and low recognition rate of signature verification, this paper introduces biomimetic pattern recognition theory and applies it to the problem. According to the features of the signature samples, the coverage in the high-dimension feature space is built, one class of samples are all covered with a super-sausage neuron chain. As the radius selection of the super-sausage neur...

2005
Chris Crutchfield David Molnar David Turner David Wagner

We propose on-line/off-line threshold signature schemes, in which the bulk of signature computation can take place “off-line” during lulls in service requests [7]. Such precomputation can help systems using threshold signatures quickly respond to requests. For example, tests of the Pond distributed file system showed that computation of a threshold RSA signature consumes roughly 86% of the time...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید