1990
DOI: 10.1016/0031-3203(90)90093-z
|View full text |Cite
|
Sign up to set email alerts
|

Structural description and classification of signature images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0
2

Year Published

1994
1994
2017
2017

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(30 citation statements)
references
References 9 publications
0
28
0
2
Order By: Relevance
“…[45] presents a signature recognition and verification system based on compression neural networks in combination with positional cuttings of the signature being tested. Other approaches to signature recognition systems, previously outlined in the Introduction Section, are [2], [19], [34] and [39]. As far as we know SVM have not been used for signature recognition, but they have been used in other similar applications like handwritten digit recognition or recognition of some Asian characters.…”
Section: Svm and Mlp For Automatic Off-linementioning
confidence: 99%
See 1 more Smart Citation
“…[45] presents a signature recognition and verification system based on compression neural networks in combination with positional cuttings of the signature being tested. Other approaches to signature recognition systems, previously outlined in the Introduction Section, are [2], [19], [34] and [39]. As far as we know SVM have not been used for signature recognition, but they have been used in other similar applications like handwritten digit recognition or recognition of some Asian characters.…”
Section: Svm and Mlp For Automatic Off-linementioning
confidence: 99%
“…Other potential signature recognition applications are in law-enforcement applications, where the identification of perpetrators is a fundamental requirement of the solution, and in the analysis of some historical documents [21]. Some previous works in the area of automatic signature recognition are: Ammar et al [2] that uses a hierarchical scheme of signature descriptors to identify a test signature; Han and Sethi [19], which considers a set of geometric and topologic features to map a signature image into two string of finite symbols; Pavlidis et al [34], which proposes the application of active deformable models for approximating the external shape of a signature; and Riba et al [39], that compares different statistical methods, using a feature extraction preprocessing, to carry out the recognition of signatures. From a theoretical point of view, signature recognition and verification are different and independent problems, recognition is a 1:N matching problem while identification is 1:1.…”
Section: Introductionmentioning
confidence: 99%
“…Irrespective of the above limitations we can still use signature as our best biometric feature, since the signature is a unique identity of an individual and is being used extensively in practical systems. No two signatures can be identical, unless one of them is a forgery or copy of the other [35]. The signature recognition systems find applications in government, legal and commercial areas.…”
Section: B Signature Recognition Systemmentioning
confidence: 99%
“…We use the Grid & Texture Information features [25] & successive geometric center with depth 2 (Two Iterations) [3]. Corresponding extracted feature set is shown in Figure 7 & 8.…”
Section: 3grid Texture Features and Successive Geometric Centersmentioning
confidence: 99%