• Publications
  • Influence
Identity authentication using improved online signature verification method
We present a system for online handwritten signature verification, approaching the problem as a two-class pattern recognition problem. A test signature's authenticity is established by first aligningExpand
  • 397
  • 32
  • PDF
SUSIG: an on-line signature database, associated protocols and benchmark results
We present a new online signature database (SUSIG). The database consists of two parts that are collected using different pressure-sensitive tablets (one with and the other without an LCD display). AExpand
  • 98
  • 24
Realization of correlation attack against the fuzzy vault scheme
User privacy and template security are major concerns in the use of biometric systems. These are serious concerns based on the fact that once compromised, biometric traits can not be canceled orExpand
  • 98
  • 10
Segmentation of off-line cursive handwriting using linear programming
Abstract Segmentation of cursive words into letters has been one of the major problems in handwriting recognition. We introduce a new segmentation algorithm, guided in part by the globalExpand
  • 117
  • 10
Online Signature Verification Using Fourier Descriptors
We present a novel online signature verification system based on the Fast Fourier Transform. The advantage of using the Fourier domain is the ability to compactly represent an online signature usingExpand
  • 88
  • 8
Combining multiple biometrics to protect privacy
As biometrics are gaining popularity, there is increased concern over the loss of privacy and potential misuse of biometric data held in central repositories. The association of fingerprints withExpand
  • 85
  • 8
  • PDF
Pink Panther: A Complete Environment For Ground-Truthing And Benchmarking Document Page Segmentation
We describe a new approach for the automatic evaluation of document page segmentation algorithms. Unlike techniques that rely on OCR output, our method is region-based: segmentation quality isExpand
  • 107
  • 7
  • PDF
Plant identification using deep neural networks via optimization of transfer learning parameters
We use deep convolutional neural networks to identify the plant species captured in a photograph and evaluate different factors affecting the performance of these networks. Three powerful and popularExpand
  • 156
  • 5
  • PDF
BioSecure signature evaluation campaign (BSEC'2009): Evaluating online signature algorithms depending on the quality of signatures
In this paper, we present the main results of the BioSecure Signature Evaluation Campaign (BSEC'2009). The objective of BSEC'2009 was to evaluate different online signature algorithms on two tasks:Expand
  • 87
  • 5
  • PDF
Sketched symbol recognition with auto-completion
Sketching is a natural mode of communication that can be used to support communication among humans. Recently there has been a growing interest in sketch recognition technologies for facilitatingExpand
  • 23
  • 5
  • PDF