2009 International Conference on Multimedia Computing and Systems 2009
DOI: 10.1109/mmcs.2009.5256701
|View full text |Cite
|
Sign up to set email alerts
|

Pattern recognition techniques in on-line hand written signature verification - A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
8
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 29 publications
1
8
0
Order By: Relevance
“…The key of threshold method is determining the threshold. There are many methods used to determine the threshold, such as the maximum entropy method (Kapur et al, 1985), the minimum interclass variance method (Radhika et al, 2009) and the Otsu method (Otsu, 1979). However, these methods are always complex and timeconsuming.…”
Section: Threshold-based Classificationmentioning
confidence: 99%
“…The key of threshold method is determining the threshold. There are many methods used to determine the threshold, such as the maximum entropy method (Kapur et al, 1985), the minimum interclass variance method (Radhika et al, 2009) and the Otsu method (Otsu, 1979). However, these methods are always complex and timeconsuming.…”
Section: Threshold-based Classificationmentioning
confidence: 99%
“…Another interesting example is the Australian Population Health Research Network Secure Unified Research Environment [41], see [29]. Similar systems include the United Kingdom Office For National Statistics (ONS) Virtual Microdata Laboratory [28], and the UK Secure Data Service, that provides secure remote access to data operated by the Economic and Social Data Service [47].…”
Section: Remote Analysis Systemsmentioning
confidence: 99%
“…1 ePD. 47 Therefore, the storage of communication data falls under the scope of the ePD and the Member States may derogate from the confidentiality of communications guaranteed by Article 5 ePD and the obligation to have traffic data deleted or anonymized by the service providers once they are no longer required under Article 6 ePD. However, the derogation clause of Article 15 para.…”
Section: Consequences Of the Judgmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Thresholds for image segmentation have been calculated based on interclass variation [17] and histogram [18,19]. The limitation of threshold based segmentation technique is that it performs well for images, which have only two components.…”
Section: Introductionmentioning
confidence: 99%