{"title":"离线签名识别的对比分析","authors":"Rahul Dubey, D. Agrawal","doi":"10.1109/ICCICT.2012.6398093","DOIUrl":null,"url":null,"abstract":"Biometrics (or biometric authentication) assigns to the confirmation of humans by their biological features. Computer science, biometrics to be specific, is used as an aspect of determination and access control. It is also used to determine individuals in groups that are under examination. Handwriting is one of the most widely used biometric systems for authentication of person as well as document. Online and offline signature is existing in person identification and authentication problems. Offline signature categorizes the signature into two classes: genuine and forged. In this paper, we discuss various features of offline signature recognition and verification process. We review and compare existing techniques, their results and methods of feature extraction.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Comparative analysis of off-line signature recognition\",\"authors\":\"Rahul Dubey, D. Agrawal\",\"doi\":\"10.1109/ICCICT.2012.6398093\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Biometrics (or biometric authentication) assigns to the confirmation of humans by their biological features. Computer science, biometrics to be specific, is used as an aspect of determination and access control. It is also used to determine individuals in groups that are under examination. Handwriting is one of the most widely used biometric systems for authentication of person as well as document. Online and offline signature is existing in person identification and authentication problems. Offline signature categorizes the signature into two classes: genuine and forged. In this paper, we discuss various features of offline signature recognition and verification process. We review and compare existing techniques, their results and methods of feature extraction.\",\"PeriodicalId\":319467,\"journal\":{\"name\":\"2012 International Conference on Communication, Information & Computing Technology (ICCICT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on Communication, Information & Computing Technology (ICCICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCICT.2012.6398093\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCICT.2012.6398093","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparative analysis of off-line signature recognition
Biometrics (or biometric authentication) assigns to the confirmation of humans by their biological features. Computer science, biometrics to be specific, is used as an aspect of determination and access control. It is also used to determine individuals in groups that are under examination. Handwriting is one of the most widely used biometric systems for authentication of person as well as document. Online and offline signature is existing in person identification and authentication problems. Offline signature categorizes the signature into two classes: genuine and forged. In this paper, we discuss various features of offline signature recognition and verification process. We review and compare existing techniques, their results and methods of feature extraction.