Handwritten Signature Authentication Using Statistical Estimation
Citations
3 citations
Cites background from "Handwritten Signature Authenticatio..."
...This is very common, because, algorithm(s) have to handle large sets of image data [19]....
[...]
1 citations
Cites methods from "Handwritten Signature Authenticatio..."
...[4] have proposed a handwritten signature authentication scheme based on statistics....
[...]
Cites background from "Handwritten Signature Authenticatio..."
...This is very common, because, algorithm(s) have to handle large sets of image data [ 14 ]....
[...]
References
12 citations
"Handwritten Signature Authenticatio..." refers background in this paper
...Debnath Bhattacharyya, Samir Kumar Bandyopadhyay and Poulami Das, 2007, have conducted [10] an extensive survey of the existing graphical password schemes and proposed an alternate scheme....
[...]
11 citations
"Handwritten Signature Authenticatio..." refers background in this paper
...Bandyopadhyay and Poulami Das, 2007, have conducted [ 10 ] an extensive survey of the existing graphical password schemes and proposed an alternate scheme....
[...]
10 citations
"Handwritten Signature Authenticatio..." refers background or methods in this paper
...Handwritten signature samples are considered input for the artificial neural network model and typically weights also supplied for recognition [3]....
[...]
...For Handwritten Signature Identification and Authentication - a forward propagation technique is used to authenticate of input image out of the available training images [3]....
[...]
9 citations
"Handwritten Signature Authenticatio..." refers methods in this paper
...Law of Independent Assortment is used to watermarking the processed Handwritten Signature; double lined protection is provided during transmission of Handwritten Signature over network [2]....
[...]
9 citations
"Handwritten Signature Authenticatio..." refers background or methods in this paper
...Estimation is done depending on 100 various training signatures, which are already captured, processed [1] and stored in the storage area at the target where extraction and authentication of the test image has to be done....
[...]
...This drawn image is captured and put into the processes of extracting Region Of Interest (ROI), scaled (the ROI) into a specific size and thinned into single pixel format [1]....
[...]