scispace - formally typeset
Search or ask a question
Topic

Signature recognition

About: Signature recognition is a research topic. Over the lifetime, 2138 publications have been published within this topic receiving 37605 citations.


Papers
More filters
Proceedings ArticleDOI
26 Oct 2004
TL;DR: The combination of three classifiers for handwritten word recognition with different architectures is studied and a new ensemble method working with several base classifiers is applied and the results are compared to the results of the combination of theThree classifiers.
Abstract: The study of multiple classifier systems has become an area of intensive research in pattern recognition recently. Also in handwriting recognition, systems combining several classifiers have been investigated. In this paper the combination of three classifiers for handwritten word recognition with different architectures is studied. In addition a new ensemble method working with several base classifiers is applied and the results of the ensemble method are compared to the results of the combination of the three classifiers. In the experiments a large-scale handwritten word recognition task is considered.

9 citations

Journal ArticleDOI
TL;DR: It is shown that wavelet transform coefficients are the most universal feature used in biometric person recognition systems – it is among five frequently used features used in all five popular traits.
Abstract: In this paper biometric feature systems and multimodal databases for biometric recognition systems are analyzed on the basis of scientific publications in IEEE Xplore digital library. It is shown that wavelet transform coefficients are the most universal feature used in biometric person recognition systems – it is among five frequently used features used in all five popular traits. Moreover, face is the most frequently used trait in multimodal person recognition systems – it is used along with 48 % of iris, 44 % of fingerprint, 33 % of voice and 24 % of signature multimodal systems. Analysis of 15 multimodal databases reveals the fact, that older multimodal databases, e. g., XM2VTS, are still widely used for comparison. However databases such as Biosecure are more versatile and should become more popular soon if a free access will be provided.

9 citations

Patent
06 Apr 2015
TL;DR: In this paper, a cryptographic key is generated using biometric data and a hierarchy of biometric descriptors including multiple levels, wherein a biometric descriptor at a first level is associated with a subset of the biometric features at the next lower level.
Abstract: A cryptographic key is generated using biometric data and a hierarchy of biometric descriptors. The hierarchy of biometric descriptors includes multiple levels, wherein a biometric descriptor at a first level is associated with a subset of the biometric descriptors at the next lower level. To generate a cryptographic key, biometric data is collected and compared to the biometric descriptors at the first level of the hierarchy. One of the biometric descriptors is selected at the first level, and a first key component is generated based on the first selected biometric descriptor. The biometric data is then compared to the subset of biometric descriptors at the second level of the hierarchy associated with the first selected biometric descriptor. This process of selecting a biometric descriptor and generating a key component continues for each level of the hierarchy. The key components are then used to generate a cryptographic key.

9 citations

Proceedings ArticleDOI
08 Dec 2003
TL;DR: Improved principal component analysis (IPCA) for pattern recognition is proposed and it is shown that the face recognition rate obtained from the conventional PCA is bad, because the aim of the conventionalPCA is dimension curtailment for compression of data and isn't dimension curtailments for recognition.
Abstract: At the general recognition process, the feature vectors that are obtained from some facial images are transformed into recognition space by Fisher's linear discriminate method (Fisher's method) and principal component analysis (PCA). But at Fisher's method we must recalculate all recognition space when adding a registrant or registrant's learning patterns. In contrast, though at PCA we only recalculate added registrant's pace when adding, the face recognition rate obtained from the conventional PCA is bad, because the aim of the conventional PCA is dimension curtailment for compression of data and isn't dimension curtailment for recognition. Therefore we proposed improved principal component analysis (IPCA) for pattern recognition.

9 citations

Journal ArticleDOI
Daeyoung Kim1, C.K. Un1
TL;DR: The authors propose a probabilistic vector mapping method with trajectory information for noise-robust speech recognition using not only the current noisy vector but also adjacent vectors in the form of a trajectory pattern.
Abstract: The authors propose a probabilistic vector mapping method with trajectory information for noise-robust speech recognition. The proposed method estimates a speech vector using not only the current noisy vector but also adjacent vectors in the form of a trajectory pattern. According to our isolated word recognition experiment, the new method yields a better recognition rate than the probabilistic vector mapping method previously proposed.

9 citations


Network Information
Related Topics (5)
Feature extraction
111.8K papers, 2.1M citations
89% related
Image segmentation
79.6K papers, 1.8M citations
85% related
Feature (computer vision)
128.2K papers, 1.7M citations
85% related
Convolutional neural network
74.7K papers, 2M citations
83% related
Deep learning
79.8K papers, 2.1M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202310
202219
202122
202028
201925
201832