نتایج جستجو برای: signature recognition

تعداد نتایج: 315167  

2016
Emanuele Maiorana

With the widespread diffusion of biometrics-based recognition systems, there is an increasing awareness of the risks associated with the use of biometric data. Significant efforts are therefore being dedicated to the design of algorithms and architectures able to secure the biometric characteristics, and to guarantee the necessary privacy to their owners. In this work we discuss a protected on-...

Journal: :Pattern Recognition 1992
Ivo Tchoukanov Reza Safaee-Rad Kenneth C. Smith Beno Benhabib

-A new two-dimensional (2D) shape-encoding scheme is introduced which is based on the idea of the angle-of-sight (AOS). Using this scheme, a shape can be efficiently transformed into a one-dimensional (ID) signature by recording the AOS vs. distance of each boundary point with respect to a shape-specific chord-of-sight (COS). The COS is selected by using an extension of the notion of shape boun...

2003
Carol Taylor Jim Alves-Foss

This paper extends and builds on previous work that presented a signature-based attack recognition technique. We present general requirements for “survivable attack recognition” and discuss how our approach fits the requirements. Empirical results are given along with an estimate of the measured performance. Other work is reviewed within the context of attack recognition for survivability.

Journal: :Pattern Recognition 2011
Gonzalo Bailador Carmen Sánchez Ávila Javier Guerra Casanova Alberto de Santos Sierra

Keywords: Biometrics Signature Accelerometer Hidden Markov models Bayes Dynamic time warping As a result of advances in mobile technology, new services which benefit from the ubiquity of these devices are appearing. Some of these services require the identification of the subject since they may access private user information. In this paper, we propose to identify each user by drawing his/her h...

2015
Rajpal Kaur Pooja Choudhary

Handwritten signature broadly used biometric which include elevated intrapersonal variance .Signature are generally used as the personal identification apparatus for human that the necessitate for verification system. Two types verification is performed generally online (dynamic) and offline signature verification (static). The static is offline technology that is used for documents authenticat...

1998
George M. White

Signature tree "machine learning" , pattern recognition heuristics are investigated for the specific problem of computer recognition of human speech. When the data base of given utterances is insufficient to establish trends with confidence, a large number of feature extractors must be employed and "recognition" of an unknown pattern made by comparing its feature values with those of known patt...

2014
Girija M K Sowmya K S

-------------------------------------------------------------ABSTRACT-------------------------------------------------------Biometric Technologies are automated methods for verifying or recognizing the identity of a living person based on physiological or behavioral characteristics. Multimodal Biometric Systems are those which utilize more than one physiological or behavioral characteristic for...

2001
Jon Doyle Isaa Kohane William Long Howard Shrobe Peter Szolovits

Journal: :J. Inf. Sci. Eng. 2002
Sheng-Fuu Lin Yu-Wei Chang Chien-Kun Su

A novel off-line algorithm and a modified chain code for recognizing signatures are proposed in the present study. Carbon paper is used to detect force distributions when people write their signatures. First of all, the signature contours are located and the upper and lower profiles are generated; then, these are used to classify the given signature. Both the gray-scale and the chain code chara...

2003
Abdolah Chalechale Alfred Mertins

A novel fast method for line segment extraction based on chain code representation of thinned sketches (or edge maps) is presented and exploited for Persian signature recognition. The method has a parallel nature and can be employed on parallel machines. It breaks the macro chains into several micro chains after applying shifting, smoothing and differentiating. The micro chains are then approxi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید