Signature identification and verification techniques: state-of-the-art work

H Kaur, M Kumar - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Signature identification and verification are some of the biometric systems used for personal
identification. Signatures can be considered as authentication of an individual by the …

Biometric signature authentication using machine learning techniques: Current trends, challenges and opportunities

K Bibi, S Naz, A Rehman - Multimedia Tools and Applications, 2020 - Springer
Biometric systems are playing a key role in the multitude of applications and placed at the
center of debate in the scientific research community. Among the numerous biometric …

Biometric signature verification system based on freeman chain code and k-nearest neighbor

AN Azmi, D Nasien, FS Omar - Multimedia Tools and Applications, 2017 - Springer
Signature is one of human biometrics that may change due to some factors, for example
age, mood and environment, which means two signatures from a person cannot perfectly …

Iris localization in frontal eye images for less constrained iris recognition systems

F Jan, I Usman, S Agha - Digital Signal Processing, 2012 - Elsevier
Commercial iris recognition systems do not perform well for non-ideal data, because their
iris localization algorithms are specifically developed for controlled data. This paper …

Online signature verification using segment‐level fuzzy modelling

AQ Ansari, M Hanmandlu, J Kour, AK Singh - IET biometrics, 2014 - Wiley Online Library
This study presents a new online signature verification system based on fuzzy modelling of
shape and dynamic features extracted from online signature data. Instead of extracting these …

Handwritten signature identification using basic concepts of graph theory

T Fotak, M Bača, P Koruga - WSEAS Transactions on Signal Processing, 2011 - dl.acm.org
Handwritten signature is being used in various applications on daily basis. The problem
arises when someone decides to imitate our signature and steal our identity. Therefore …

Signature recognition using binary features and KNN

H Hezil, R Djemili, H Bourouba - International Journal of …, 2018 - inderscienceonline.com
This paper proposes the use of binary features in offline signature recognition systems.
Indeed, offline signature recognition finds mainly its importance for the authentication of …

[HTML][HTML] Robust and Swift Iris Recognition at distance based on novel pupil segmentation

AK Nsaif, SHM Ali, AK Nseaf, KN Jassim… - Journal of King Saud …, 2022 - Elsevier
One of the most common and successful biometric frameworks is iris recognition, which has
yielded promising results in systems of access control and identity authentication. Recent …

Topological characterizations of covering for special covering-based upper approximation operators

X Ge, X Bai, Z Yun - Information Sciences, 2012 - Elsevier
The relationships among properties of covering approximation operators and their
corresponding coverings have attracted intensive research in recent years. In particular …

Online handwritten signature verification and recognition based on dual-tree complex wavelet packet transform

A Foroozandeh, AA Hemmat… - Journal of Medical Signals …, 2020 - journals.lww.com
Background: With the increasing advancement of technology, it is necessary to develop
more accurate, convenient, and cost-effective security systems. Handwriting signature, as …