2020
DOI: 10.2478/jaiscr-2020-0012
|View full text |Cite
|
Sign up to set email alerts
|

An Algorithm for the Evolutionary-Fuzzy Generation of on-Line Signature Hybrid Descriptors

Abstract: AbstractIn biometrics, methods which are able to precisely adapt to the biometric features of users are much sought after. They use various methods of artificial intelligence, in particular methods from the group of soft computing. In this paper, we focus on on-line signature verification. Such signatures are complex objects described not only by the shape but also by the dynamics of the signing process. In standard devices used for signature acquisition (with an LCD touch scre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 44 publications
0
3
0
Order By: Relevance
“…For this reason, the use of an evolutionary algorithm seems to be an interesting solution. The evolutionary algorithms belong to the group of population-based algorithms (Population-Based Algorithms, PBAs [10,11,16,19,36,38]). They are widely used to solve problems in which the evaluation function may be non-differentiable [18].…”
Section: Introductionmentioning
confidence: 99%
“…For this reason, the use of an evolutionary algorithm seems to be an interesting solution. The evolutionary algorithms belong to the group of population-based algorithms (Population-Based Algorithms, PBAs [10,11,16,19,36,38]). They are widely used to solve problems in which the evaluation function may be non-differentiable [18].…”
Section: Introductionmentioning
confidence: 99%
“…The use of PBAs does not guarantee finding an optimal solution, but usually allows finding a satisfactory solution for the adopted evaluation function (fitness function). This and other advantages of PBAs make them readily used in practice [7,10,33,35]. Each PBA usually uses a specific search formula.…”
Section: Introductionmentioning
confidence: 99%
“…Biometric authentication and verification methods [1,2] are divided into contact and contactless methods. An example of a contact method is, among others, analysis of the user's fingerprint [3,4].…”
Section: Introductionmentioning
confidence: 99%