A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Efficient Signature Verification Method Based on an Interval Symbolic Representation and a Fuzzy Similarity Measure
2017
IEEE Transactions on Information Forensics and Security
In this paper an efficient off-line signature verification method based on an interval symbolic representation and a fuzzy similarity measure is proposed. ...
A novel fuzzy similarity measure is further proposed to compute the similarity between a test sample signature and the corresponding interval-valued symbolic model for the verification of the test sample ...
Symbolic Representation and a Fuzzy Similarity Measure created using texture-based features. ...
doi:10.1109/tifs.2017.2707332
fatcat:mvyorl3dpzerzou3pspribhhcm
Geometric Centroids and their Relative Distances for Off-line Signature Verification
2009
2009 10th International Conference on Document Analysis and Recognition
A method of off-line signature verification based on the symbolic representation is presented. ...
We cluster similar signatures in each class and also investigate the cluster based symbolic representation for signature verification. ...
The distances between geometric centroids are used to form interval-type of symbolic representation. A method of signature verification based on symbolic representation is presented. ...
doi:10.1109/icdar.2009.67
dblp:conf/icdar/PrakashG09
fatcat:a5eu4axznjbqpcyx27sqntpsy4
User Dependent Features in Online Signature Verification
[article]
2016
arXiv
pre-print
A method of signature verification based on the proposed cluster based symbolic representation is also presented. ...
In this paper, we propose a novel approach for verification of on-line signatures based on user dependent feature selection and symbolic representation. ...
Julian Fierrez Aguillar, Biometric Research Lab-AVTS, Spain for providing MCYT Online signature dataset. ...
arXiv:1611.10104v1
fatcat:kympakxaojfh3i7uexv7czhboy
Interval valued symbolic representation of writer dependent features for online signature verification
2017
Expert systems with applications
Highlights An approach for online signature verification based on writer dependent parameters Interval valued symbolic representation of writer dependent features Verification based on both symbolic ...
Once features for each writer are selected, they are represented in the form of an interval valued symbolic feature vector. ...
One is exploring the notion of writer dependent parameters for online signature verification and the other one is to demonstrate the superiority of symbolic representation and usage of a symbolic classifier ...
doi:10.1016/j.eswa.2017.03.024
fatcat:xpfic54qfvhnllyxez2bu37feu
Difference of Fuzzy Homogeneous Classes of Objects
2021
International Conference on Information and Communication Technologies in Education, Research, and Industrial Applications
To implement the proposed exploiter, which allows computing of the difference of one fuzzy homogeneous class of objects from another one, we developed the corresponding algorithm and provided an example ...
Therefore the concept of universal difference exploiter of fuzzy homogeneous classes of objects, within such a knowledge representation model as fuzzy objectoriented dynamic networks, was introduced in ...
Fuzzy Classes and Types A class is one of the main representation structures in class-based object-oriented programming, in a variety of object-oriented knowledge representation models as well as in object-oriented ...
dblp:conf/icteri/TerletskyiY21
fatcat:i3al3tedzrd5hdvsr7bfk5ae2i
Off line Handwritten Signature Recognition based on Fusion of Global and GLCM Features Using Fuzzy Logic
2019
University of Thi-Qar Journal of Science
In this paper, we present a new offline handwritten signature recognition system based on fusion of global and GLCM (Grey Level Co-occurrence Matrix) features using fuzzy logic system as classifier tool ...
The test signature is compared with the database signatures based on features, whilst match/non match of signatures is decided with fuzzy logic. ...
Thus, the signature can be treated as an output of a system obscured in a certain time interval necessary to make the signature. ...
doi:10.32792/utq/utjsci/vol4/3/32
fatcat:ann6tqr56jh4zatl7rcdi6o3o4
An Efficient Offline Signature Verification System
2014
International Journal of Machine Learning and Computing
Offline signature verification is one of most challenging area of pattern recognition. Many methods have been introduced in literature to find whether a given signature is genuine or forgery. ...
In the proposed work, the signature image is converted into time series data using linear scanning method and then time series shapelets are identified to distinguish genuine signatures from forged ones ...
The proposed method used symbolic representation of offline signatures using bi-interval valued feature vector. ...
doi:10.7763/ijmlc.2014.v6.468
fatcat:us7y7kyqcne4tn4a4kupzsx6n4
A Comparative Study among Handwritten Signature Verification Methods Using Machine Learning Techniques
2022
Scientific Programming
Since handwritten signatures are widely used in legal documents and financial transactions, it is important for researchers to select an efficient machine-learning technique for verifying these signatures ...
Nowadays, the verification of handwritten signatures has become an effective research field in computer vision as well as machine learning. ...
Finally, the interval-valued symbolic representation was applied to make a decision on whether the test signature was genuine or forged. e experiment results were estimated on SVC2004 Task 2, obtaining ...
doi:10.1155/2022/8170424
fatcat:7jgjvrggqnf2dlokh7uiac7xnm
Approaches and Issues in Offline Signature Verification System
2012
International Journal of Computer Applications
In this paper, we have presented a survey of various approaches and issues related to offline signature verification systems. ...
Offline signature verification is one of most challenging area of pattern recognition. ...
The proposed
method used symbolic representation of offline signatures
using bi-interval valued feature vector. ...
doi:10.5120/5780-8035
fatcat:2w3xlsgbvbby3ignsldied2wfq
Automated Spam Filtering through Data Mining Approach
2017
Sreyas International Journal of Scientists and Technocrats
For preventing the spam delivery, an automatic system based spam filter tool is employed. The objectives of spam filters and spam are contradicted diametrically. ...
In this project we present a method, to access classifier security against their attacks profoundly concentrating on the content of the message. ...
E-mail verification E-mail verification refers to a challenge-response system which normally sends a one-time verification e-mail to the sender. ...
doi:10.24951/sreyasijst.org/2017021004
fatcat:cfv33n7vhvejnh7anw733r22q4
Off-Line Handwritten Signature Recognition by Wavelet Entropy and Neural Network
2017
Entropy
In this paper, a signature recognition approach based on a probabilistic neural network (PNN) and wavelet transform average framing entropy (AFE) is proposed. ...
Identification tasks, as well as verification tasks, were investigated for a comprehensive signature system study. Several other methods used in the literature were considered for comparison. ...
Principles for an improved writer enrollment based on an entropy measure for genuine signatures is presented in [18] . ...
doi:10.3390/e19060252
fatcat:2yw6h2ghovbnpkhupq5k7bux2y
An Efficient Conformable Fractional Chaotic Map-Based Online/Offline IBSS Scheme for Provable Security in ROM
2022
Complexity
Chaos distributes with a covert method to condense the dynamic of complexity and satisfies the security requirements of a cryptographic system. ...
This study gives an ability online/offline (O/O) ID-based short signature (IBSS) scheme using conformable fractional chaotic maps. ...
Conclusion Here, we established an effective CCM based on the IBSS method. ...
doi:10.1155/2022/6302328
fatcat:2j7uatwrbbfuld5ryhu4umtymi
Automatic Target Recognition Based on Cross-Plot
2011
PLoS ONE
We conclude that Cross-plotting is able to produce a digital fingerprint of a target that correlates efficiently and effectively to signatures of patterns having its identity in a target repository. ...
Target recognition was implemented based on the proposed pattern recognition concept and tested rigorously for its precision and recall performance. ...
Identification Metric Detection and identification of a target is based on the outcome of comparison or similarity between signatures. ...
doi:10.1371/journal.pone.0025621
pmid:21980508
pmcid:PMC3183066
fatcat:4ln5wqv3tzdgrimiskdqmd4i2q
2021 Index IEEE Transactions on Reliability Vol. 70
2021
IEEE Transactions on Reliability
The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination. ...
The Subject Index contains entries describing the item under all appropriate subject headings, plus the first author's name, the publication abbreviation, month, and year, and inclusive pages. ...
., +, TR June 2021 643-653 SIT-SE: A Specification-Based Incremental Testing Method With Symbolic Execution. ...
doi:10.1109/tr.2021.3134026
fatcat:22noq6n6n5cd3fshazpc3w4tku
Fingerprints, Iris and DNA Features based Multimodal Systems: A Review
2013
International Journal of Information Technology and Computer Science
, iris, retina, face recognition, DNA recognition, palm prints, heartbeat, finger veins, palates etc) and behavioral characteristics (such as body language, facial exp ression, signature verification, ...
This paper p rovides an overview of single feature and mult iple features based biometric systems, including the performance of physiological characteristics (such as fingerprint, hand geometry, head recognition ...
The similarities between template and input fingerprints are computed using Normalized Fuzzy Similarity Measure (NFSM). ...
doi:10.5815/ijitcs.2013.02.10
fatcat:2u4rlwbt3vbmze4sfwvj4ufuyq
« Previous
Showing results 1 — 15 out of 1,098 results