{"title":"手写签名验证的调查","authors":"A. Sanmorino, S. Yazid","doi":"10.1109/URKE.2012.6319582","DOIUrl":null,"url":null,"abstract":"Signature verification is the process used to recognize an individual's handwritten signature. Signature verification can be divided into two main areas depending on the data acquisition method, off-line and on-line signature verification. In this paper we attempt to survey the signature verification based on three categories. First, judging from how to get the data signature which is off-line and on-line verification. Second, based on the technique used, that is rule-based approach, neural networks, hidden Markov model and support vector machine. Third, based on preprocessing and feature extraction, which is thinning and line segmentation. Based on the survey, it was concluded that any method of verification has advantages and disadvantages. However, if viewed from the ease of implementation and performance, using neural networks or hidden Markov models are the right choice. Depending on the data acquisition method, on-line verification is recommended to use than off-line verification.","PeriodicalId":277189,"journal":{"name":"2012 2nd International Conference on Uncertainty Reasoning and Knowledge Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"31","resultStr":"{\"title\":\"A survey for handwritten signature verification\",\"authors\":\"A. Sanmorino, S. Yazid\",\"doi\":\"10.1109/URKE.2012.6319582\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Signature verification is the process used to recognize an individual's handwritten signature. Signature verification can be divided into two main areas depending on the data acquisition method, off-line and on-line signature verification. In this paper we attempt to survey the signature verification based on three categories. First, judging from how to get the data signature which is off-line and on-line verification. Second, based on the technique used, that is rule-based approach, neural networks, hidden Markov model and support vector machine. Third, based on preprocessing and feature extraction, which is thinning and line segmentation. Based on the survey, it was concluded that any method of verification has advantages and disadvantages. However, if viewed from the ease of implementation and performance, using neural networks or hidden Markov models are the right choice. Depending on the data acquisition method, on-line verification is recommended to use than off-line verification.\",\"PeriodicalId\":277189,\"journal\":{\"name\":\"2012 2nd International Conference on Uncertainty Reasoning and Knowledge Engineering\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-10-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"31\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 2nd International Conference on Uncertainty Reasoning and Knowledge Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/URKE.2012.6319582\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 2nd International Conference on Uncertainty Reasoning and Knowledge Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/URKE.2012.6319582","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Signature verification is the process used to recognize an individual's handwritten signature. Signature verification can be divided into two main areas depending on the data acquisition method, off-line and on-line signature verification. In this paper we attempt to survey the signature verification based on three categories. First, judging from how to get the data signature which is off-line and on-line verification. Second, based on the technique used, that is rule-based approach, neural networks, hidden Markov model and support vector machine. Third, based on preprocessing and feature extraction, which is thinning and line segmentation. Based on the survey, it was concluded that any method of verification has advantages and disadvantages. However, if viewed from the ease of implementation and performance, using neural networks or hidden Markov models are the right choice. Depending on the data acquisition method, on-line verification is recommended to use than off-line verification.