2012 IEEE International Carnahan Conference on Security Technology (ICCST) 2012
DOI: 10.1109/ccst.2012.6393554
|View full text |Cite
|
Sign up to set email alerts
|

Handwritten signature recognition in mobile scenarios: Performance evaluation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(14 citation statements)
references
References 3 publications
0
14
0
Order By: Relevance
“…The most used in the cloudmobile scenario are reported in table I. [6], [8], [9], [11], [15], [32], [49], [56], [57], [91], [93], [94], [97] Model based ANN [106] HMM/GMM [6], [19], [26], [35], [55], [92] SVM [57], [58], [87], [90] Distance-based approaches provide the verification response based on the distance between the test signature and one or more reference signatures. Model-based approaches verify the test signature by estimating fitness on the signature reference model of the user.…”
Section: Training-verificationmentioning
confidence: 99%
“…The most used in the cloudmobile scenario are reported in table I. [6], [8], [9], [11], [15], [32], [49], [56], [57], [91], [93], [94], [97] Model based ANN [106] HMM/GMM [6], [19], [26], [35], [55], [92] SVM [57], [58], [87], [90] Distance-based approaches provide the verification response based on the distance between the test signature and one or more reference signatures. Model-based approaches verify the test signature by estimating fitness on the signature reference model of the user.…”
Section: Training-verificationmentioning
confidence: 99%
“…Blanco-Gonzalo et al [29] evaluated an ASV system based on dynamic time warping (DTW), on seven mobile devices (using stylus and finger): two Wacom tablets, a tactile laptop, a Samsung Galaxy Note, an iPad, a Samsung Galaxy Tab and a Blackberry Playbook. They confronted the system with different acquisition conditions, such as sensor technology, interoperability, visual feedback, and screen size.…”
Section: Related Workmentioning
confidence: 99%
“…A smartphone is usually handheld, while a tablet may be placed on the desktop or sustained by the left arm if the writer is right-handed. The consequence is that verification performance is strongly degraded in mobile conditions [2,15,16,[26][27][28][29][30][31][32][33][34][35][36][37][38][39].In the present paper, we study the online signature biometrics in the framework of uncontrolled mobile conditions. The challenging question then is how to improve verification performance in uncontrolled mobile conditions?…”
mentioning
confidence: 99%
“…In most of the works in the literature, the signature acquisition is done with specific devices, such as digitizer tablets. There are also a few works introducing smart phones and handwritten signature altogether [8]. Nevertheless, in our research the signature information is taken from common devices made not specially for signing but for typical smart phone functions, as well as the possibility of perform the signature with the finger tip instead using a stylus is introduced.…”
Section: Introductionmentioning
confidence: 99%