2016
DOI: 10.1016/j.ins.2016.03.005
|View full text |Cite
|
Sign up to set email alerts
|

Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 27 publications
0
1
0
Order By: Relevance
“…Because of this, most security systems provide some kind of protection such as hashing, digital signature or encryption that are ineffective in spoof attacks [5]. In the last few years there has been an intensive research to provide reliable anti-spoofing systems for biometric traits, including fingerprints [6,7], face [8][9][10], and other biometric features [11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…Because of this, most security systems provide some kind of protection such as hashing, digital signature or encryption that are ineffective in spoof attacks [5]. In the last few years there has been an intensive research to provide reliable anti-spoofing systems for biometric traits, including fingerprints [6,7], face [8][9][10], and other biometric features [11][12][13].…”
Section: Introductionmentioning
confidence: 99%