نتایج جستجو برای: signature recognition
تعداد نتایج: 315167 فیلتر نتایج به سال:
One of the most important processes used by companies to safeguard security information and prevent it from unauthorized access or penetration is signature process. As businesses individuals move into digital age, a computerized system that can discern between genuine faked signatures crucial for protecting people's authorization determining what permissions they have. In this paper, we Pre-Tra...
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
Signature recognition is probably the oldest biometrical identification method, with a high legal acceptance. Verification can be performed either Offline or Online based on the application. Online systems use dynamic information of a signature captured at the time the signature is made. Offline systems work on the scanned image of a signature. We have worked on the Offline Verification of sign...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید