Ramón Blanco-Gonzalo, O. Miguel-Hurtado, Aitor Mendaza-Ormaza, R. Sánchez-Reillo
{"title":"Handwritten signature recognition in mobile scenarios: Performance evaluation","authors":"Ramón Blanco-Gonzalo, O. Miguel-Hurtado, Aitor Mendaza-Ormaza, R. Sánchez-Reillo","doi":"10.1109/CCST.2012.6393554","DOIUrl":null,"url":null,"abstract":"Following the idea of improving our previous work on dynamic handwritten signature recognition on portable devices, a performance evaluation in a mobile scenario was done. A database with 11 users and 8 mobile devices (using stylus and finger) has been collected in order to study different parameters such as screen size, operative system and the interoperability between the devices. The evaluation was divided by 3 sessions of 20 signatures per device each; 20 skilled forgeries signatures per user were used also. The devices used were mobile phones, tablets, laptops and two specific devices for signing. The algorithm used to assess the signatures was a DTW-based signature recognition algorithm.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"26","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2012.6393554","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 26
Abstract
Following the idea of improving our previous work on dynamic handwritten signature recognition on portable devices, a performance evaluation in a mobile scenario was done. A database with 11 users and 8 mobile devices (using stylus and finger) has been collected in order to study different parameters such as screen size, operative system and the interoperability between the devices. The evaluation was divided by 3 sessions of 20 signatures per device each; 20 skilled forgeries signatures per user were used also. The devices used were mobile phones, tablets, laptops and two specific devices for signing. The algorithm used to assess the signatures was a DTW-based signature recognition algorithm.