Features representing information about pressure distribution from a static image of a handwritten signature are analyzed for an offline verification system. From gray-scale image...
Jesus Francisco Vargas Bonilla, Miguel Angel Ferre...
Recent results of forgery detection by implementing biometric signature verification methods are promising. At present, forensic signature verification in daily casework is perfor...
Vivian L. Blankers, C. Elisa van den Heuvel, Katri...
In this paper, we propose a new approach for symbolic representation of off-line signatures based on relative distances between centroids useful for verification. Distances betwee...
Digital signatures have been proposed by several researchers as a way of preventing execution of malicious code. In this paper we propose a general architecture for performing the...
: In this work we present a strategy for off-line signature verification. It takes into account a writer-independent model which reduces the pattern recognition problem to a 2-clas...
Luiz S. Oliveira, Edson J. R. Justino, Robert Sabo...
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...
Abstract. Although widely used to reduce error rates of difficult pattern recognition problems, multiple classifier systems are not in widespread use in off-line signature verifica...
This paper presents a multi-expert system for dynamic signature verification. The system combines three experts whose complementar behaviour is achieved by using both different fea...
Vincenzo Di Lecce, Giovanni Dimauro, Andrea Guerri...
Abstract. We propose a novel approach for on-line signature verification based on building HMM user models by adapting an ergodic Universal Background Model (UBM). State initializa...
Signcryption, first proposed by Zheng [4,5], is a cryptographic primitive which combines both the functions of digital signature and public key encryption in a logical single step,...