Rodrigo Ros-Gomez, Helga C. Quiros-Sandoval, Ramón Blanco-Gonzalo, R. Sánchez-Reillo
{"title":"A comparative analysis on the performance of static handwritten verification systems on realistic scenarios","authors":"Rodrigo Ros-Gomez, Helga C. Quiros-Sandoval, Ramón Blanco-Gonzalo, R. Sánchez-Reillo","doi":"10.1109/CCST.2016.7815679","DOIUrl":null,"url":null,"abstract":"An analysis on realistic conditions for static handwritten signature verification systems is presented. Evaluation conditions are studied so to approximate as accurately as possible the conditions of a real-world operational scenario. Also, the problem of modeling realistic attacks by using databases containing forgeries is considered in the analysis. To do so, a database collected with different levels of knowledge and training is used. Performance evaluation results with these restrictions are given over several databases. Results show the effect of the amount of training and the information available to the forger on the attack resistance of some algorithms.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"61 1","pages":"1-7"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2016.7815679","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
An analysis on realistic conditions for static handwritten signature verification systems is presented. Evaluation conditions are studied so to approximate as accurately as possible the conditions of a real-world operational scenario. Also, the problem of modeling realistic attacks by using databases containing forgeries is considered in the analysis. To do so, a database collected with different levels of knowledge and training is used. Performance evaluation results with these restrictions are given over several databases. Results show the effect of the amount of training and the information available to the forger on the attack resistance of some algorithms.