Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,098 Hits in 5.9 sec

An Efficient Signature Verification Method Based on an Interval Symbolic Representation and a Fuzzy Similarity Measure

Alireza Alaei, Srikanta Pal, Umapada Pal, Michael Blumenstein
2017 IEEE Transactions on Information Forensics and Security  
In this paper an efficient off-line signature verification method based on an interval symbolic representation and a fuzzy similarity measure is proposed.  ...  A novel fuzzy similarity measure is further proposed to compute the similarity between a test sample signature and the corresponding interval-valued symbolic model for the verification of the test sample  ...  Symbolic Representation and a Fuzzy Similarity Measure created using texture-based features.  ... 
doi:10.1109/tifs.2017.2707332 fatcat:mvyorl3dpzerzou3pspribhhcm

Geometric Centroids and their Relative Distances for Off-line Signature Verification

H.N. Prakash, D.S. Guru
2009 2009 10th International Conference on Document Analysis and Recognition  
A method of off-line signature verification based on the symbolic representation is presented.  ...  We cluster similar signatures in each class and also investigate the cluster based symbolic representation for signature verification.  ...  The distances between geometric centroids are used to form interval-type of symbolic representation. A method of signature verification based on symbolic representation is presented.  ... 
doi:10.1109/icdar.2009.67 dblp:conf/icdar/PrakashG09 fatcat:a5eu4axznjbqpcyx27sqntpsy4

User Dependent Features in Online Signature Verification [article]

D. S. Guru, K. S. Manjunatha, S. Manjunath
2016 arXiv   pre-print
A method of signature verification based on the proposed cluster based symbolic representation is also presented.  ...  In this paper, we propose a novel approach for verification of on-line signatures based on user dependent feature selection and symbolic representation.  ...  Julian Fierrez Aguillar, Biometric Research Lab-AVTS, Spain for providing MCYT Online signature dataset.  ... 
arXiv:1611.10104v1 fatcat:kympakxaojfh3i7uexv7czhboy

Interval valued symbolic representation of writer dependent features for online signature verification

D.S. Guru, K.S. Manjunatha, S. Manjunath, M.T. Somashekara
2017 Expert systems with applications  
Highlights  An approach for online signature verification based on writer dependent parameters  Interval valued symbolic representation of writer dependent features  Verification based on both symbolic  ...  Once features for each writer are selected, they are represented in the form of an interval valued symbolic feature vector.  ...  One is exploring the notion of writer dependent parameters for online signature verification and the other one is to demonstrate the superiority of symbolic representation and usage of a symbolic classifier  ... 
doi:10.1016/j.eswa.2017.03.024 fatcat:xpfic54qfvhnllyxez2bu37feu

Difference of Fuzzy Homogeneous Classes of Objects

Dmytro Terletskyi, Sergey Yershov
2021 International Conference on Information and Communication Technologies in Education, Research, and Industrial Applications  
To implement the proposed exploiter, which allows computing of the difference of one fuzzy homogeneous class of objects from another one, we developed the corresponding algorithm and provided an example  ...  Therefore the concept of universal difference exploiter of fuzzy homogeneous classes of objects, within such a knowledge representation model as fuzzy objectoriented dynamic networks, was introduced in  ...  Fuzzy Classes and Types A class is one of the main representation structures in class-based object-oriented programming, in a variety of object-oriented knowledge representation models as well as in object-oriented  ... 
dblp:conf/icteri/TerletskyiY21 fatcat:i3al3tedzrd5hdvsr7bfk5ae2i

Off line Handwritten Signature Recognition based on Fusion of Global and GLCM Features Using Fuzzy Logic

2019 University of Thi-Qar Journal of Science  
In this paper, we present a new offline handwritten signature recognition system based on fusion of global and GLCM (Grey Level Co-occurrence Matrix) features using fuzzy logic system as classifier tool  ...  The test signature is compared with the database signatures based on features, whilst match/non match of signatures is decided with fuzzy logic.  ...  Thus, the signature can be treated as an output of a system obscured in a certain time interval necessary to make the signature.  ... 
doi:10.32792/utq/utjsci/vol4/3/32 fatcat:ann6tqr56jh4zatl7rcdi6o3o4

An Efficient Offline Signature Verification System

M. Arathi, A. Govardhan
2014 International Journal of Machine Learning and Computing  
Offline signature verification is one of most challenging area of pattern recognition. Many methods have been introduced in literature to find whether a given signature is genuine or forgery.  ...  In the proposed work, the signature image is converted into time series data using linear scanning method and then time series shapelets are identified to distinguish genuine signatures from forged ones  ...  The proposed method used symbolic representation of offline signatures using bi-interval valued feature vector.  ... 
doi:10.7763/ijmlc.2014.v6.468 fatcat:us7y7kyqcne4tn4a4kupzsx6n4

A Comparative Study among Handwritten Signature Verification Methods Using Machine Learning Techniques

Zainab Hashim, Hanaa M. Ahmed, Ahmed Hussein Alkhayyat, Punit Gupta
2022 Scientific Programming  
Since handwritten signatures are widely used in legal documents and financial transactions, it is important for researchers to select an efficient machine-learning technique for verifying these signatures  ...  Nowadays, the verification of handwritten signatures has become an effective research field in computer vision as well as machine learning.  ...  Finally, the interval-valued symbolic representation was applied to make a decision on whether the test signature was genuine or forged. e experiment results were estimated on SVC2004 Task 2, obtaining  ... 
doi:10.1155/2022/8170424 fatcat:7jgjvrggqnf2dlokh7uiac7xnm

Approaches and Issues in Offline Signature Verification System

Hemanta Saikia, Kanak Chandra Sarma
2012 International Journal of Computer Applications  
In this paper, we have presented a survey of various approaches and issues related to offline signature verification systems.  ...  Offline signature verification is one of most challenging area of pattern recognition.  ...  The proposed method used symbolic representation of offline signatures using bi-interval valued feature vector.  ... 
doi:10.5120/5780-8035 fatcat:2w3xlsgbvbby3ignsldied2wfq

Automated Spam Filtering through Data Mining Approach

Deepika Mallampati, Amitesh Madhur, Gundari Abhinay, Gopalam Tanuja
2017 Sreyas International Journal of Scientists and Technocrats  
For preventing the spam delivery, an automatic system based spam filter tool is employed. The objectives of spam filters and spam are contradicted diametrically.  ...  In this project we present a method, to access classifier security against their attacks profoundly concentrating on the content of the message.  ...  E-mail verification E-mail verification refers to a challenge-response system which normally sends a one-time verification e-mail to the sender.  ... 
doi:10.24951/sreyasijst.org/2017021004 fatcat:cfv33n7vhvejnh7anw733r22q4

Off-Line Handwritten Signature Recognition by Wavelet Entropy and Neural Network

Khaled Daqrouq, Husam Sweidan, Ahmad Balamesh, Mohammed Ajour
2017 Entropy  
In this paper, a signature recognition approach based on a probabilistic neural network (PNN) and wavelet transform average framing entropy (AFE) is proposed.  ...  Identification tasks, as well as verification tasks, were investigated for a comprehensive signature system study. Several other methods used in the literature were considered for comparison.  ...  Principles for an improved writer enrollment based on an entropy measure for genuine signatures is presented in [18] .  ... 
doi:10.3390/e19060252 fatcat:2yw6h2ghovbnpkhupq5k7bux2y

An Efficient Conformable Fractional Chaotic Map-Based Online/Offline IBSS Scheme for Provable Security in ROM

Chandrashekhar Meshram, Rabha W. Ibrahim, Rafida M. Elobaid, Honglei Xu
2022 Complexity  
Chaos distributes with a covert method to condense the dynamic of complexity and satisfies the security requirements of a cryptographic system.  ...  This study gives an ability online/offline (O/O) ID-based short signature (IBSS) scheme using conformable fractional chaotic maps.  ...  Conclusion Here, we established an effective CCM based on the IBSS method.  ... 
doi:10.1155/2022/6302328 fatcat:2j7uatwrbbfuld5ryhu4umtymi

Automatic Target Recognition Based on Cross-Plot

Kelvin Kian Loong Wong, Derek Abbott, Teresa Serrano-Gotarredona
2011 PLoS ONE  
We conclude that Cross-plotting is able to produce a digital fingerprint of a target that correlates efficiently and effectively to signatures of patterns having its identity in a target repository.  ...  Target recognition was implemented based on the proposed pattern recognition concept and tested rigorously for its precision and recall performance.  ...  Identification Metric Detection and identification of a target is based on the outcome of comparison or similarity between signatures.  ... 
doi:10.1371/journal.pone.0025621 pmid:21980508 pmcid:PMC3183066 fatcat:4ln5wqv3tzdgrimiskdqmd4i2q

2021 Index IEEE Transactions on Reliability Vol. 70

2021 IEEE Transactions on Reliability  
The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination.  ...  The Subject Index contains entries describing the item under all appropriate subject headings, plus the first author's name, the publication abbreviation, month, and year, and inclusive pages.  ...  ., +, TR June 2021 643-653 SIT-SE: A Specification-Based Incremental Testing Method With Symbolic Execution.  ... 
doi:10.1109/tr.2021.3134026 fatcat:22noq6n6n5cd3fshazpc3w4tku

Fingerprints, Iris and DNA Features based Multimodal Systems: A Review

Prakash Chandra Srivastava, Anupam Agrawal, Kamta Nath Mishra, P. K. Ojha, R. Garg
2013 International Journal of Information Technology and Computer Science  
, iris, retina, face recognition, DNA recognition, palm prints, heartbeat, finger veins, palates etc) and behavioral characteristics (such as body language, facial exp ression, signature verification,  ...  This paper p rovides an overview of single feature and mult iple features based biometric systems, including the performance of physiological characteristics (such as fingerprint, hand geometry, head recognition  ...  The similarities between template and input fingerprints are computed using Normalized Fuzzy Similarity Measure (NFSM).  ... 
doi:10.5815/ijitcs.2013.02.10 fatcat:2u4rlwbt3vbmze4sfwvj4ufuyq
« Previous Showing results 1 — 15 out of 1,098 results