نتایج جستجو برای: offline handwritten signature
تعداد نتایج: 105201 فیلتر نتایج به سال:
Most of the signature verification work done in the past years focused either on offline or online approaches. In this paper, a different methodology is proposed, where the online reference data acquired through a digitizing tablet serves as the basis for the segmentation process of the corresponding scanned offline data. Local windows are built over the image through a self-adjustable learning...
An offline signature-based fuzzy vault (OSFV) is a bio-cryptographic implementation that uses handwritten signature images as biometrics instead of traditional passwords to secure private cryptographic keys. Having a reliable OSFV implementation is the first step towards automating financial and legal authentication processes, as it provides greater security of confidential documents by means o...
Our research works are concerned with checking the off-line handwritten signature. We propose a base of Tunisian static handwritten signatures. In this paper, we go through the phase of designing the SID-Signature database and its various features. Afterwards, we present the results obtained by this base as part of our system of handwritten-signature verification.
In the modern times identity verification has become an important task for various reasons. Mostly identity provided by the authorities is the combination of characters & digits. Now there are several techniques available to recognize them efficiently, & good accuracy rates also have been achieved for characters & digits recognition (Typewritten).But in case of handwritten characters, accuracy ...
India has more than 1,600 official languages, making it a multilingual country. Kannada, one of the major originated in state Karnataka and is currently ranked 33rd among accents that are most often spoken throughout world. However, survey shows much effort needed to create complete handwritten identification system. Segmentation crucial steps handwriting system extracts significant objects fro...
Bio-Cryptographic systems enforce authenticity of cryptographic applications like data encryption and digital signatures. Instead of simple user passwords, biometrics, such as, fingerprint and handwritten signatures, are employed to access the cryptographic secret keys. The Fuzzy Vault scheme (FV) is massively employed to produce bio-cryptographic systems, as it absorbs variability in biometric...
The various studies conducted for classification of handwritten signatures of people have shown that the task is difficult because there is intra personal differences among the signatures of the same person. The signatures of the same person vary with time, age of the person and also because of the emotional state of a person. The task of classifying the skilled forgery signatures is all the mo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید