2011
DOI: 10.1007/s10032-011-0180-6
|View full text |Cite
|
Sign up to set email alerts
|

Multi-feature extraction and selection in writer-independent off-line signature verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
83
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
1
1

Relationship

3
5

Authors

Journals

citations
Cited by 76 publications
(83 citation statements)
references
References 28 publications
0
83
0
Order By: Relevance
“…For instance, compared to state-of-the-art WI-SV systems (system 3), where both the FV and SV systems rely on a single prototype for authentication, the proposed FV bio-cryptosystem has shown similar accuracy, while employing only 20 features instead of the 555 features present in the SV system [29]. Thus, applying our proposed GLDM learning approach maintained the performance, while decreasing the representation complexity by about 96% (from 555 to only 20 features).…”
Section: Results Of the Gldm-based Fv Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…For instance, compared to state-of-the-art WI-SV systems (system 3), where both the FV and SV systems rely on a single prototype for authentication, the proposed FV bio-cryptosystem has shown similar accuracy, while employing only 20 features instead of the 555 features present in the SV system [29]. Thus, applying our proposed GLDM learning approach maintained the performance, while decreasing the representation complexity by about 96% (from 555 to only 20 features).…”
Section: Results Of the Gldm-based Fv Systemmentioning
confidence: 99%
“…In this paper, the distance metric defined by Equation (4) is optimized based on a mixture of Feature-Distance (FD) space [28,29] and dissimilarity matrix analysis. Figure 2 illustrates the different distance metric computational spaces.…”
Section: Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The feature dissimilarity thresholds are modeled in this space. This method is originally introduced by Rivard et al, to develop writer-independent offline signature verification systems [7]. Recently, we adapted these systems for specific users by tuning their universal representations for specific users [8].…”
Section: Application To the Offline Signature Biometricsmentioning
confidence: 99%
“…Recent work on the area explore a variety of different feature descriptors: Extended Shadow Code (ESC) and Directional-Probabilistic Density Function (DPDF) [4], [5]; Local Binary Patterns (LBP), Gray-Level Co-occurrence Matrix (GLCM) and Histogram of Oriented Gradients (HOG) [6], [7]; Curvelet transform [8], among others. Instead of relying on hand-engineered feature extractors, we investigate feature learning algorithms applied to this task.…”
Section: Introductionmentioning
confidence: 99%