Paudel et al., 2016 - Google Patents
Handwritten signature verification for mobile phonesPaudel et al., 2016
View PDF- Document ID
- 17789519958690088597
- Author
- Paudel N
- Querini M
- Italiano G
- Publication year
- Publication venue
- International Conference on Information Systems Security and Privacy
External Links
Snippet
Handwritten Signature Verification (HSV) systems have been introduced to automatically verify the authenticity of a user signature. In offline systems, the handwritten signature (represented as an image) is taken from a scanned document, while in online systems, pen …
- 238000011156 evaluation 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
- G06K9/00093—Matching features related to minutiae and pores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
- G06K9/22—Image acquisition using hand-held instruments
- G06K9/222—Image acquisition using hand-held instruments the instrument generating sequences of position coordinates corresponding to handwriting; preprocessing or recognising digital ink
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yılmaz et al. | Score level fusion of classifiers in off-line signature verification | |
Coetzer et al. | Offline signature verification using the discrete radon transform and a hidden Markov model | |
Chen et al. | Use of exterior contours and shape features in off-line signature verification | |
Sarhan et al. | Multimodal biometric systems: a comparative study | |
Pang et al. | Rotation invariant finger vein recognition | |
Hatkar et al. | Offline handwritten signature verification using neural network | |
Mohammed et al. | State-of-the-art in handwritten signature verification system | |
Alpar et al. | Online signature verification by spectrogram analysis | |
Paudel et al. | Handwritten signature verification for mobile phones | |
Zou et al. | Unsupervised palmprint image quality assessment via pseudo-label generation and ranking guidance | |
Leung et al. | Palmprint verification for controlling access to shared computing resources | |
Bharadi et al. | Multi-modal biometric recognition using human iris and dynamic pressure variation of handwritten signatures | |
Taherzadeh et al. | Evaluation of online signature verification features | |
Al-Zubi et al. | Using an active shape structural model for biometric sketch recognition | |
Adeyemo et al. | Adaptive SIFT/SURF algorithm for off-line signature recognition | |
Singh et al. | Survey on offline signature recognition and verification schemes | |
Chen et al. | A real-world online signature verification system based on correlation algorithm | |
Venkataramu et al. | Offline signature recognition and verification using orb key point matching techniques | |
Paudel et al. | Online handwritten signature verification for low-end devices | |
Brömme et al. | Multifactor biometric sketch authentication | |
Prathiba et al. | Online handwritten signature verification system: a review | |
Adamski et al. | Signature verification by only single genuine sample in offline and online systems | |
Gupta | Automatic person identification and verification using online handwriting | |
Patil et al. | A Review-Signature Verification System Using Deep Learning: A Challenging Problem | |
Mohamed et al. | Baseline extraction algorithm for online signature recognition |