Writer identification using machine learning approaches: a comprehensive review
Handwriting is one of the most common types of questioned writing encountered and
frequently attracts the attention in litigation. Contrary to the physiological characteristics …
frequently attracts the attention in litigation. Contrary to the physiological characteristics …
Buffer overflows: Attacks and defenses for the vulnerability of the decade
Buffer overflows have been the most common form of security vulnerability for the last ten
years. Moreover, buffer overflow vulnerabilities dominate the area of remote network …
years. Moreover, buffer overflow vulnerabilities dominate the area of remote network …
Text-independent writer identification and verification using textural and allographic features
M Bulacu, L Schomaker - IEEE transactions on pattern analysis …, 2007 - ieeexplore.ieee.org
The identification of a person on the basis of scanned images of handwriting is a useful
biometric modality with application in forensic and historic document analysis and …
biometric modality with application in forensic and historic document analysis and …
Gender prediction system through behavioral biometric handwriting: a comprehensive review
Identification of a person on the basis of different characteristics is a prevailing area of
research. Both behavioral biometrics and physical biometrics are used as measures to …
research. Both behavioral biometrics and physical biometrics are used as measures to …
Text independent writer recognition using redundant writing patterns with contour-based orientation and curvature features
We propose an effective method for automatic writer recognition from unconstrained
handwritten text images. Our method relies on two different aspects of writing: the presence …
handwritten text images. Our method relies on two different aspects of writing: the presence …
Texture-based descriptors for writer identification and verification
In this work, we discuss the use of texture descriptors to perform writer verification and
identification. We use a classification scheme based on dissimilarity representation, which …
identification. We use a classification scheme based on dissimilarity representation, which …
[BOOK][B] Shape classification and analysis: theory and practice
L da Fona Costa, RM Cesar Jr - 2018 - taylorfrancis.com
Because the properties of objects are largely determined by their geometric features, shape
analysis and classification are essential to almost every applied scientific and technological …
analysis and classification are essential to almost every applied scientific and technological …
Offline text-independent writer identification based on scale invariant feature transform
X Wu, Y Tang, W Bu - IEEE Transactions on Information …, 2014 - ieeexplore.ieee.org
This paper proposes a novel offline text-independent writer identification method based on
scale invariant feature transform (SIFT), composed of training, enrollment, and identification …
scale invariant feature transform (SIFT), composed of training, enrollment, and identification …
A writer identification and verification system
In this paper, we show that both the writer identification and the writer verification tasks can
be carried out using local features such as graphemes extracted from the segmentation of …
be carried out using local features such as graphemes extracted from the segmentation of …
[BOOK][B] Shape analysis and classification: theory and practice
L da Fontoura Costa, RM Cesar Jr - 2010 - taylorfrancis.com
Advances in shape analysis impact a wide range of disciplines, from mathematics and
engineering to medicine, archeology, and art. Anyone just entering the field, however, may …
engineering to medicine, archeology, and art. Anyone just entering the field, however, may …