Signature identification and verification techniques: state-of-the-art work
Signature identification and verification are some of the biometric systems used for personal
identification. Signatures can be considered as authentication of an individual by the …
identification. Signatures can be considered as authentication of an individual by the …
Biometric signature authentication using machine learning techniques: Current trends, challenges and opportunities
K Bibi, S Naz, A Rehman - Multimedia Tools and Applications, 2020 - Springer
Biometric systems are playing a key role in the multitude of applications and placed at the
center of debate in the scientific research community. Among the numerous biometric …
center of debate in the scientific research community. Among the numerous biometric …
Biometric signature verification system based on freeman chain code and k-nearest neighbor
AN Azmi, D Nasien, FS Omar - Multimedia Tools and Applications, 2017 - Springer
Signature is one of human biometrics that may change due to some factors, for example
age, mood and environment, which means two signatures from a person cannot perfectly …
age, mood and environment, which means two signatures from a person cannot perfectly …
Iris localization in frontal eye images for less constrained iris recognition systems
Commercial iris recognition systems do not perform well for non-ideal data, because their
iris localization algorithms are specifically developed for controlled data. This paper …
iris localization algorithms are specifically developed for controlled data. This paper …
Online signature verification using segment‐level fuzzy modelling
This study presents a new online signature verification system based on fuzzy modelling of
shape and dynamic features extracted from online signature data. Instead of extracting these …
shape and dynamic features extracted from online signature data. Instead of extracting these …
Handwritten signature identification using basic concepts of graph theory
Handwritten signature is being used in various applications on daily basis. The problem
arises when someone decides to imitate our signature and steal our identity. Therefore …
arises when someone decides to imitate our signature and steal our identity. Therefore …
Signature recognition using binary features and KNN
This paper proposes the use of binary features in offline signature recognition systems.
Indeed, offline signature recognition finds mainly its importance for the authentication of …
Indeed, offline signature recognition finds mainly its importance for the authentication of …
[HTML][HTML] Robust and Swift Iris Recognition at distance based on novel pupil segmentation
One of the most common and successful biometric frameworks is iris recognition, which has
yielded promising results in systems of access control and identity authentication. Recent …
yielded promising results in systems of access control and identity authentication. Recent …
Topological characterizations of covering for special covering-based upper approximation operators
X Ge, X Bai, Z Yun - Information Sciences, 2012 - Elsevier
The relationships among properties of covering approximation operators and their
corresponding coverings have attracted intensive research in recent years. In particular …
corresponding coverings have attracted intensive research in recent years. In particular …
Online handwritten signature verification and recognition based on dual-tree complex wavelet packet transform
Background: With the increasing advancement of technology, it is necessary to develop
more accurate, convenient, and cost-effective security systems. Handwriting signature, as …
more accurate, convenient, and cost-effective security systems. Handwriting signature, as …