2021
DOI: 10.1109/tifs.2020.3033442
|View full text |Cite
|
Sign up to set email alerts
|

Intrapersonal Parameter Optimization for Offline Handwritten Signature Augmentation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 62 publications
0
2
0
Order By: Relevance
“…Our model overcomes the pre-trained model. [36] 98.49% -Jampour and Naserasadi (2019) [37] 98.76% -Li Liu et al (2021) [38] -6.74 Maruyama et al (2021) [39] -0.82 Alsuhimat and Mohamad [40] 87.7% 11.40 Kadhm et al [41] 99.7% -Proposed Method 100% 0.0…”
Section: 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 =mentioning
confidence: 99%
“…Our model overcomes the pre-trained model. [36] 98.49% -Jampour and Naserasadi (2019) [37] 98.76% -Li Liu et al (2021) [38] -6.74 Maruyama et al (2021) [39] -0.82 Alsuhimat and Mohamad [40] 87.7% 11.40 Kadhm et al [41] 99.7% -Proposed Method 100% 0.0…”
Section: 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 =mentioning
confidence: 99%
“…Maruyama et al 26 designed an intrapersonal parameter optimization method for offline handwritten signature augmentation and used in an automatic signature verification system (ASVS). The goal of the ASVS is to increase the accuracy of signature sample and predicts the writer’s variability and features.…”
Section: Related Workmentioning
confidence: 99%
“…signal vs. time) [5][6][7] or static-offline (i.e. image) [8][9][10][11][12][13]. An alternative classification of offline signature verification methodologies divides them into a) handcrafted methods, which mainly utilize image processing and computer vision techniques and b) data-driven or learningbased approaches with typical representatives Bags of Visual Words [14,15] sparse representation [11] and deep learning methodologies [8,12,[16][17][18][19][20][21][22][23][24][25][26].…”
Section: Introductionmentioning
confidence: 99%
“…A number of deep learning based topologies are obtained by examining different loss functions [31] and similarity strategies [8,10,30] commonly used on the dominant SigNet architecture. Also, post feature management methods are applied, exploiting the effectiveness of the extracted vectors [13,33].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation