2020
DOI: 10.1109/tifs.2019.2924195
|View full text |Cite
|
Sign up to set email alerts
|

Investigating the Common Authorship of Signatures by Off-Line Automatic Signature Verification Without the Use of Reference Signatures

Abstract: The version in the Kent Academic Repository may differ from the final published version. Users are advised to check http://kar.kent.ac.uk for the status of the paper. Users should always cite the published version of record.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 62 publications
(108 reference statements)
0
3
0
Order By: Relevance
“…Examines psychological aspects of handwriting to assess authenticity [56] Machine learning Utilizes supervised learning models for signature verification based on training data [23] Local features Identify keypoints or interest points in signatures for robust feature matching. [47] Stroke sequence analysis Studies the order and sequence of strokes in a signature [50] Local binary patterns Encodes texture information for signature representation and comparison [53] Handwriting feature analysis Analyzes individual handwriting features like slant, size, and pressure [68] Graph-based approaches Represent signatures as graphs and analyze structural information for authentication [45] Forensic document analysis Investigates paper, ink, and other physical aspects of the document [55,69] Signature comparison Compares questioned signatures to known reference signatures [17] Biometric authentication Uses biometric data like pen pressure and speed for verification [19] Neural networks Employs deep learning models for complex signature analysis [43,74] signatures of individuals. Additionally, a transparent UBM, which ought to be understood by itself [40], is used as input.…”
Section: Graphology Analysismentioning
confidence: 99%
“…Examines psychological aspects of handwriting to assess authenticity [56] Machine learning Utilizes supervised learning models for signature verification based on training data [23] Local features Identify keypoints or interest points in signatures for robust feature matching. [47] Stroke sequence analysis Studies the order and sequence of strokes in a signature [50] Local binary patterns Encodes texture information for signature representation and comparison [53] Handwriting feature analysis Analyzes individual handwriting features like slant, size, and pressure [68] Graph-based approaches Represent signatures as graphs and analyze structural information for authentication [45] Forensic document analysis Investigates paper, ink, and other physical aspects of the document [55,69] Signature comparison Compares questioned signatures to known reference signatures [17] Biometric authentication Uses biometric data like pen pressure and speed for verification [19] Neural networks Employs deep learning models for complex signature analysis [43,74] signatures of individuals. Additionally, a transparent UBM, which ought to be understood by itself [40], is used as input.…”
Section: Graphology Analysismentioning
confidence: 99%
“…Such methods have achieved superior results in multiple benchmarks. Readers interested in the state of the art of signature verification systems, should please refer to these works and to [28]- [31]. In this section, we cover the core of our work, i.e., signature duplication methods and data augmentation methods in the feature space.…”
Section: Related Workmentioning
confidence: 99%
“…Automatic signature verification techniques are often divided into two groups [6]. One is an online system, while the other is an offline system [7]. Special equipment, such as a digital pen and a digitizer, is used to collect data in an online system.…”
Section: Introductionmentioning
confidence: 99%