Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








40 Hits in 3.9 sec

Online Signature Verification: State of the art

Ibrahim El-Henawy, Magdy Rashad, Omima Nomir, Kareem Ahmed
2005 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
online or Dynamic signature verification (DSV) is one of the most acceptable, intuitive, fast and cost effective tool for user authentication.  ...  We concentrate on the relationship between the verification approach used (the nature of the classifier) and the type of features that are used to represent the signature.  ...  DTW has been widely used in online signature verification systems to cope with variable length of signatures.  ... 
doi:10.24297/ijct.v4i2c2.4872 fatcat:xln3pkyrdjbptelwuaq2ohteye

A Two-Stage Method for Online Signature Verification Using Shape Contexts and Function Features

Yu Jia, Linlin Huang, Houjin Chen
2019 Sensors  
In this paper, we present a method using shape contexts and function features as well as a two-stage strategy for accurate online signature verification.  ...  As a behavioral biometric trait, an online signature is extensively used to verify a person's identity in many applications.  ...  In the framework of parametric features-based methods, a signature is characterized as a vector of elements and each one is a representative of the value of one feature [8] .  ... 
doi:10.3390/s19081808 pmid:31014033 pmcid:PMC6515562 fatcat:4tjd5x6fbrdlhaqxwa4od6apty

Multimodal Biometric Fusion Online Handwritten Signature Verification Using Neural Network and Support Vector Machine

Orieb AbuAlghanam, Layla Albdour, Omar Adwan
2021 International Journal of Innovative Computing, Information and Control  
The first model is based on the neural network classifier used to verify online handwritten signatures. The second model is based on a multimodal called a fusion model.  ...  In this paper, we propose two models for an online handwritten signature verification system to enhance the accuracy of prediction and decrease the equal error rate.  ...  In [19] , the authors proposed a signature verification model based on image-based handwritten signatures that are considered important when a hard copy of the signature is needed.  ... 
doi:10.24507/ijicic.17.05.1691 fatcat:2zzc2xy6tvdopihmagr3lzvk3y

A Perspective Analysis of Handwritten Signature Technology

Moises Diaz, Miguel A. Ferrer, Donato Impedovo, Muhammad Imran Malik, Giuseppe Pirlo, Réjean Plamondon
2019 ACM Computing Surveys  
online and offline systems.  ...  Ever since, and over the last 10 years, the application of handwritten signature technology has strongly evolved and much research has focused on the possibility of applying systems based on handwritten  ...  In [122] , the authors proposed a novel approach for online signature verification based on the directional analysis of velocity-based partitions of the signature.  ... 
doi:10.1145/3274658 fatcat:au7cal7rkzeczd2dzrkzimu2wy

On Usage of Autoencoders and Siamese Networks for Online Handwritten Signature Verification [article]

Kian Ahrabian, Bagher Babaali
2017 arXiv   pre-print
In this paper, we propose a novel writer-independent global feature extraction framework for the task of automatic signature verification which aims to make robust systems for automatically distinguishing  ...  Our method consists of an autoencoder for modeling the sample space into a fixed length latent space and a Siamese Network for classifying the fixed-length samples obtained from the autoencoder based on  ...  Conclusion In this paper, we presented a writer-independent global feature extraction framework based on the autoencoder models and the siamese networks for online handwritten signature verification task  ... 
arXiv:1712.02781v2 fatcat:swq6icnvpbfk3fjdvvwcoac7au

Secure biometric template generation for multi-factor authentication

Salman H. Khan, M. Ali Akbar, Farrukh Shahzad, Mudassar Farooq, Zeashan Khan
2015 Pattern Recognition  
We have evaluated the performance of the framework on three publicly available signatures datasets.  ...  We also undertake a case study of deploying the proposed framework in a two-factor authentication setup that uses users' passwords and dynamic handwritten signatures.  ...  Acknowledgments The work presented in this paper is supported by the National ICT R&D Fund, Ministry of Information Technology, Government of Pakistan.  ... 
doi:10.1016/j.patcog.2014.08.024 fatcat:52nw7dspkre33d6idiwu333xri

Current Challenges and Application of Speech Recognition Process using Natural Language Processing: A Survey

Neha Chadha, R.C. Gangwar, Rajeev Bedi
2015 International Journal of Computer Applications  
A critical machine learning based review is defined which addresses the various challenging tasks of speech recognition system in NLP.  ...  In the existing systems, the recognition rate is very less and the noise ration during the recognition process creates a problem.  ...  The most common applications include speaker recognition and online signature recognition.  ... 
doi:10.5120/ijca2015907471 fatcat:2gytrmn44bhr5llivkd3iuwseq

Audio-Visual Person Authentication with Multiple Visualized-Speech Features and Multiple Face Profiles

Amitava Das, Ohil K. Manyam, Makarand Tapaswi
2008 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing  
We present an Audio-visual person authentication system which extracts several novel "Visualized-Speech-Features" (VSF) from the spoken-password and multiple face profiles using a simple user-interface  ...  The spoken password is converted to a string of images formed by several visualized speech features. A compressed form of these VSFs preserves speaker identity in a compact manner.  ...  DTW based system (as in [18] ) for speech.  ... 
doi:10.1109/icvgip.2008.106 dblp:conf/icvgip/DasMT08 fatcat:n36azluaofbntjju7nszcvckqi

Recent Advances in Biometric Technology for Mobile Devices

Abhijit Das, Chiara Galdi, Hu Han, Raghavendra Ramachandra, Jean-Luc Dugelay, Antitza Dantcheva
2018 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS)  
Motivated by this, in this work we seek to provide insight on recent development in mobile biometrics.  ...  The prevalent commercial deployment of mobile biometrics as a robust authentication method on mobile devices has fueled increasingly scientific attention.  ...  is matched in a full-system evaluation of a verification system.  ... 
doi:10.1109/btas.2018.8698587 dblp:conf/btas/DasGHRDD18 fatcat:fpntmsgwfnd6vjt4pllajy4vja

Unobtrusive multi-modal biometric recognition using activity-related signatures

A. Drosou, G. Stavropoulos, D. Ioannidis, K. Moustakas, D. Tzovaras
2011 IET Computer Vision  
The present study proposes a novel multimodal biometrics framework for identity recognition and verification following the concept of the so called 'on-the-move' biometry, which sets as the final objective  ...  On the other hand, the biometric signatures, based on the user activities, are extracted by tracking of three points of interest and are seen to provide a powerful auxiliary biometric trait.  ...  Thus, a novel feature-based method is introduced within the proposed framework that applies, prior to the feature extraction phase, 3D reconstruction on the silhouette itself, encoding at the same time  ... 
doi:10.1049/iet-cvi.2010.0166 fatcat:6dnszlrdbjhwzkxxxw3lyqpby4

Complex Handwriting Trajectory Recovery: Evaluation Metrics and Algorithm [article]

Zhounan Chen, Daihui Yang, Jinglin Liang, Xinwu Liu, Yuyi Wang, Zhenghua Peng, Shuangping Huang
2022 arXiv   pre-print
Many important tasks such as forensic signature verification, calligraphy synthesis, etc, rely on handwriting trajectory recovery of which, however, even an appropriate evaluation metric is still missing  ...  After that, we then propose a novel handwriting trajectory recovery model named Parsing-and-tracing ENcoder-decoder Network (PEN-Net), in particular for characters with both complex glyph and long trajectory  ...  There are a lot of applications including forensic signature verification [22, 18] , calligraphy synthesis and imitation [34, 35] , handwritten character recognition [28, 23] , handwriting robot [32  ... 
arXiv:2210.15879v1 fatcat:2fqmpl2hyzavxda6yd2ek4adyq

Authentication of Smartphone Users Using Behavioral Biometrics [article]

Abdulaziz Alzubaidi, Jugal Kalita
2019 arXiv   pre-print
In addition, this might enable pervasive observation or imitation of one's movements and activities, such as sending messages to contacts, accessing private communication, shopping with a credit card,  ...  and relaying information about where one has been.  ...  thentication on smartphones,” in 15th Workshop on Mobile Computing [130] N. Sae-Bae and N. Memon, “Online signature verification on mobile Systems and Applications,HotMobile ’14.  ... 
arXiv:1911.04104v1 fatcat:yxx7pagj3ff6rok7zaq3f5psua

Towards a Rigorous Consideration of Occupant Behaviours of Residential Households for Effective Electrical Energy Savings: An Overview

Salah Bouktif, Ali Ouni, Sanja Lazarova-Molnar
2022 Energies  
Our findings via a literature review methodology, based on a bibliometric study, reveal a growth of the number of research works involving occupant behavior to model load forecasting and household segmentation  ...  Occupant behavior is, indeed, a complex and multi-disciplinary concept depending on several human factors.  ...  A number of Gaussian Mixture Models (GMM) were used for discovering these appliance use patterns, based on circuit and appliance-level electricity consumption in one-minute intervals from 800 households  ... 
doi:10.3390/en15051741 fatcat:lqppve3pfrgrrkjnntaotlue5q

Challenges in Multi-modal Gesture Recognition [chapter]

Sergio Escalera, Vassilis Athitsos, Isabelle Guyon
2017 Gesture Recognition  
We also overview recent state of the art works on gesture recognition based on a proposed taxonomy for gesture recognition, discussing challenges and future lines of research.  ...  using multimodal data in this area of application.  ...  Acknowledgments This work has been partially supported by ChaLearn Challenges in Machine Learning http: //chalearn.org, the Human Pose Recovery and Behavior Analysis Group 7 , the Pascal2 network of excellence  ... 
doi:10.1007/978-3-319-57021-1_1 fatcat:vfeijghqtvffllogw2tium3pwa

Driver Identification through Stochastic Multi-State Car-Following Modeling [article]

Donghao Xu, Zhezhang Ding, Chenfeng Tu, Huijing Zhao, Mathieu Moze, François Aioun, Franck Guillemard
2020 arXiv   pre-print
Based on the assumption, a stochastic car-following model is proposed to take both intra-driver and inter-driver heterogeneity into consideration, and a method is proposed to jointly learn parameters in  ...  It is assumed that all drivers share a pool of driver states; under each state a car-following data sequence obeys a specific probability distribution in feature space; each driver has his/her own probability  ...  is that the encoding and matching steps in common bag-of-words based methods are implicitly combined by directly using the joint posterior probability of online measurements based on the GMM based driver  ... 
arXiv:2005.11077v1 fatcat:dngxwqusjzbj7hh6kuzsmsg4pe
« Previous Showing results 1 — 15 out of 40 results