نتایج جستجو برای: signature verification

تعداد نتایج: 138762  

Journal: :Pattern Recognition Letters 1997
Quen-Zong Wu Suh-Yin Lee I-Chang Jou

In this paper, an on-line signature verification scheme based on split-and-merge matching mechanism is proposed. Each word in the signature is specified with static and dynamic features: a sequence of (x, y) coordinates and a sequence of (x, y) velocities. We employ the split-and-merge matching mechanism for each input sequence of coordinates or velocities with the corresponding sequence of the...

Journal: :IACR Cryptology ePrint Archive 2014
Masayuki Abe Jens Groth Miyako Ohkubo Mehdi Tibouchi

We investigate structure-preserving signatures in asymmetric bilinear groups with an efficiently computable homomorphism from one source group to the other, i.e., the Type II setting. It has been shown that in the Type I and Type III settings, structure-preserving signatures need at least 2 verification equations and 3 group elements. It is therefore natural to conjecture that this would also b...

2011
Ali Karouni Bassam Daya Samia Bahlak

The fact that the signature is widely used as a means of personal verification emphasizes the need for an automatic verification system because of the unfortunate side-effect of being easily abused by those who would feign the identification or intent of an individual. A great deal of work has been done in the area of off-line signature verification over the past few decades. Verification can b...

2009
BENCE KOVARI BENEDEK TOTH HASSAN CHARAF

The aim of off-line signature verification is to decide, whether a signature originates from a given signer based on the scanned image of the signature and a few images of the original signatures of the signer. Although the verification process can be thought to as a monolith component, it is recommended to divide it into loosely coupled phases (like preprocessing, feature extraction, feature m...

Journal: :IEEE Trans. Parallel Distrib. Syst. 2008
Bezawada Bruhadeshwar Sandeep S. Kulkarni Alex X. Liu

The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP is vulnerable to a variety of attacks due to lack of security mechanisms in place. Many BGP security mechanisms have been proposed. However, none of them has been deployed because of either high cost or high complexi...

2013
Zhiwei Wang Ruirui Xie Wei Zhang Liwen He Guozi Sun Wei Chen

Attribute based signature (ABS) is a novel cryptographic primitive, which enables a party can sign messages for any predicate satisfy by their attributes. However, heavy computational cost is required during the verification procedure in most existing ABS schemes, which may needs many pairing operations. Pairing are costly operation when compared to exponentiation in the base group. As a result...

2008
BENCE KOVARI ISTVAN ALBERT HASSAN CHARAF

Although automatic off-line signature verification has been extensively studied in the last three decades, there are still a huge number of open questions and even the best systems are still struggling to get better error rates than 5%. This paper targets some of the weak spots of the research area, which are comparability, measurability and interoperability of different signature verification ...

2006
Siew Keng Chan Yong Haur Tay

Biometrics authentication has been gaining popularity among the industries that highly incorporate securities in their daily activities. Signature verification is one of the biometrics authentication techniques which has been used for years and publicly accepted. The ease of use of signature verification coupled with lower cost and technology advances in tablet technologies, signature verificat...

2015
Komal Pawar Tanuja Dhope

A number of biometric techniques have been used for personal identification such as face recognition, fingerprint recognition, voice recognition and signature recognition. However signature verification is most widely used. Signature being the most prominent handwritten proof of identity is used for authentication of documents in the fields of financial, commercial and legal transactions which ...

1998
QUEN-ZONG WU I-CHANG JOU

In this paper, an on-line signature verification scheme based on similarity measurement of logarithmic spectrum is proposed. The principal components of the logarithmic spectrum of each signature are extracted. We then compute the similarity of logarithmic spectrum between input signature and the reference template. By comparing the similarity of logarithmic spectrum with the verification thres...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید