نتایج جستجو برای: line signature recognition
تعداد نتایج: 712456 فیلتر نتایج به سال:
The study being presented is a continuation of the previous studies that consisted in the adaptation and use of the Levenshtein method in a signature recognition process. Three methods based on the normalized Levenshtein measure were taken into consideration. The studies included an analysis and selection of appropriate signature features, on the basis of which the authenticity of a signature w...
This paper describes a unique method of recognizing common patterns among various images. It makes use of signatures of images which enables it to overcome the problem of different features ordering and appearance of noisy and less expressive features. It discusses two different methods of finding common set of data among various signatures. It has been then concluded that the proposed algorith...
In this paper, we propose a new signature scheme that is existentially unforgeable under a chosen message attack without random oracle. The security of our scheme depends on a new complexity assumption called the k+1 square roots assumption. We also discuss the relationship between the k+1 square roots assumption and some related problems and provide some conjectures. Moreover, the k+1 square r...
Biometrics attracts attention since person authentication becomes very important in networked society. As the biometrics, the fingerprint, iris, face, ear, vein, gate, voice and signature are well known and are used in various applications (Jain et al., 1999; James et al., 2005). Especially, assuming mobile access using a portable terminal such as a personal digital assistant (PDA), a camera, m...
Signature verification is an art: Whereas we may bring objective measures to bear on the problem, in the final analysis, the problem remains subjective. This art is both well studied and well documented as it applies to the verification by humans of signatures whose only records are visual [13,5,10] — that is, as it applies to signatures during whose production no measurement is made of the pen...
Iris recognition has been done by many researchers in last decade. Iris recognition plays an important role to improve efficiency in biometric identification due to its reliability in highly secured areas. Such as In Airports And Harbors, Access Control In Laboratories And Factories traditional issue is focused on full fingerprint images matching and face detection are used for identification o...
The paper presents the method of signature recognition, which is a modification of the windows technique. This windows technique allows comparing signatures with the use of any similarity coefficient, without the necessity of using additional algorithms equalizing the lengths of the sequences being compared. The elaborated method introduces a modification regarding the repeatability of individu...
One of the basic problems in signature verification is variability and differences apparent on patterns of signature even for an individual. Signature segmentation to basic components, in addition to the access to the stable features, the hidden differences are revealed between genuine and forgery patterns. In this paper, signature patterns of two-dimensional are segmented by using dominant poi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید