2011 Carnahan Conference on Security Technology 2011
DOI: 10.1109/ccst.2011.6095930
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of handwritten signature performances using mobile devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
6
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 7 publications
1
6
0
Order By: Relevance
“…The dynamic signature data is generally acquired using devices like digitizing tablets or through the touch screen technologies provided on Tablet PCs, PDAs or smartphones. The dominant attributes captured in the mobile scenario are X and Y pen positions and their timestamps [37] [49], [56], [57], [58]. On the other hand, specifically devoted pads are able to acquire a wider set of data than the pen trajectory, namely pen orientation (azimuth and altitude) and pen pressure.…”
Section: A Data Acquisition and Preprocessingmentioning
confidence: 99%
See 3 more Smart Citations
“…The dynamic signature data is generally acquired using devices like digitizing tablets or through the touch screen technologies provided on Tablet PCs, PDAs or smartphones. The dominant attributes captured in the mobile scenario are X and Y pen positions and their timestamps [37] [49], [56], [57], [58]. On the other hand, specifically devoted pads are able to acquire a wider set of data than the pen trajectory, namely pen orientation (azimuth and altitude) and pen pressure.…”
Section: A Data Acquisition and Preprocessingmentioning
confidence: 99%
“…The most used in the cloudmobile scenario are reported in table I. [6], [8], [9], [11], [15], [32], [49], [56], [57], [91], [93], [94], [97] Model based ANN [106] HMM/GMM [6], [19], [26], [35], [55], [92] SVM [57], [58], [87], [90] Distance-based approaches provide the verification response based on the distance between the test signature and one or more reference signatures. Model-based approaches verify the test signature by estimating fitness on the signature reference model of the user.…”
Section: Training-verificationmentioning
confidence: 99%
See 2 more Smart Citations
“…Online handwritten signature verification on mobile devices such as [26,27] relates to the something-you-know paradigm as well. In such a system, a user uses a stylus to write a handwritten signature on the touchscreen, which is then captured and compared with a template on the device.…”
Section: Related Workmentioning
confidence: 99%