2013
DOI: 10.4103/2228-7477.124871
|View full text |Cite
|
Sign up to set email alerts
|

Authentication based on pole-zero models of signature velocity

Abstract: With the increase of communication and financial transaction through internet, on-line signature verification is an accepted biometric technology for access control and plays a significant role in authenticity and authorization in modernized society. Therefore, fast and precise algorithms for the signature verification are very attractive. The goal of this paper is modeling of velocity signal that pattern and properties is stable for persons. With using pole-zero models based on discrete cosine transform, prec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 41 publications
0
3
0
Order By: Relevance
“…As exhibited in Tables 5–7, regardless of the systems proposed in [2, 5, 9, 11, 12, 25, 35, 43] is yielding better EER values contrasted with the proposed framework, the essential pitfall with these models is that these models are assessed with only one category, i.e. S_01, R_01.…”
Section: Experimentation and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…As exhibited in Tables 5–7, regardless of the systems proposed in [2, 5, 9, 11, 12, 25, 35, 43] is yielding better EER values contrasted with the proposed framework, the essential pitfall with these models is that these models are assessed with only one category, i.e. S_01, R_01.…”
Section: Experimentation and Resultsmentioning
confidence: 99%
“…Whereas, the proposed model is thoroughly evaluated with wide experimentation in Skilled 1, 5, 10, 15, 20 and Random 1, 5, 10, 15, 20. Hence, its superiority is validated as compared to [2, 5, 9, 11, 12, 25, 35, 43].…”
Section: Experimentation and Resultsmentioning
confidence: 99%
“…Image forgery detection is very important, and researchers are focused on CMFD and have achieved excellent results. According to the studies, CMF can be classified into two general methods[ 7 11 ] based on block and keypoint.…”
Section: Introductionmentioning
confidence: 99%