On-Line and Off-Line Handwriting Recognition: A Comprehensive Survey
IEEE Transactions on Pattern Analysis and Machine Intelligence
Individuality of Handwriting: A Validation Study
ICDAR '01 Proceedings of the Sixth International Conference on Document Analysis and Recognition
Learning Strategies and Classification Methods for Off-Line Signature Verification
IWFHR '04 Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition
On the Power of Feature Analyzer for Signature Verification
DICTA '05 Proceedings of the Digital Image Computing on Techniques and Applications
The Image Processing Handbook, Fifth Edition (Image Processing Handbook)
The Image Processing Handbook, Fifth Edition (Image Processing Handbook)
Offline signature verification using the discrete radon transform and a hidden Markov model
EURASIP Journal on Applied Signal Processing
Time-efficient stroke extraction method for handwritten signatures
ACS'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Computer Science - Volume 7
A general approach to off-line signature verification
WSEAS Transactions on Computers
Analysis of Authentic Signatures and Forgeries
IWCF '09 Proceedings of the 3rd International Workshop on Computational Forensics
Classification approaches in off-line handwritten signature verification
WSEAS Transactions on Mathematics
A study on the consistency and significance of local features in off-line signature verification
Pattern Recognition Letters
Hi-index | 0.00 |
Although the computerized verification of handwritten signatures has been extensively studied in the past three decades, the results on the field are still unsatisfactory. This paper provides a generic analytic approach for modeling different kinds of signature verification systems and estimating their performance limitations based on simple properties of the signature database, which is used to evaluate the system. Although our current approach concentrates only on skilled forgeries, it could be well extended to handle unskilled and random forgeries and thereby provide a model, which is applicable to current commercial signature verification systems.