2008 Second International Conference on Future Generation Communication and Networking Symposia 2008
DOI: 10.1109/fgcns.2008.55
|View full text |Cite
|
Sign up to set email alerts
|

Offline Signature Verification Using Critical Region Matching

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(17 citation statements)
references
References 9 publications
0
17
0
Order By: Relevance
“…A number of structural (i.e. string, tree, or graph-based) signature verification frameworks have been proposed in the last decade [13][14][15][16][17]. Graphs, actually the most general data structure, allow to represent the inherent topological handwriting characteristics of signatures in a natural and comprehensive way.…”
Section: Introductionmentioning
confidence: 99%
“…A number of structural (i.e. string, tree, or graph-based) signature verification frameworks have been proposed in the last decade [13][14][15][16][17]. Graphs, actually the most general data structure, allow to represent the inherent topological handwriting characteristics of signatures in a natural and comprehensive way.…”
Section: Introductionmentioning
confidence: 99%
“…The graph based approach has two limitations: (1) It works on relatively small window sizes (32*64) and (2) It doesn't work when the test signature is a superset of the original signature. Based on geometrical shape of the critical regions of the signature, a graph matching based signature verification technique is introduced in [13]. The comparison of two signatures is reduced to the comparison of their respective graph representations.…”
Section: Previous Workmentioning
confidence: 99%
“…In a sliding window, the center point is , the max value is and the min value is , where represents all of the pixel values. The definition of Bernsen algorithm in sliding window is (1) Then, the binarization result can be obtained by (2) The shortcoming of Bersen algorithm is over-segmentation in uniform brightness regions. So it is not reasonable to get a threshold image by equation (2) when the difference between the max and min is too small.…”
Section: Contour Detection Preprocessingmentioning
confidence: 99%
“…Text-dependent methods require writers to write the same fixed text with the training handwritings. Signature verification [2,3], which is widely used in credit cards, is one of text-dependent writer identification. In text-independent methods, any handwriting documents with different text will be useful.…”
Section: Introductionmentioning
confidence: 99%