On-line signature verification algorithm incorporating pen position, pen pressure and pen inclination trajectories

@inproceedings{Sakamoto2001OnlineSV,
  title={On-line signature verification algorithm incorporating pen position, pen pressure and pen inclination trajectories},
  author={D. Sakamoto and Hikaru Morita and Tetsu Ohishi and Yoshimitsu Komiya and Takashi Matsumoto},
  booktitle={ICASSP},
  year={2001}
}
Personal identity verification has a great variety of applications including access to computer terminals, buildings, credit card verification, to name a few[l]. Algorithms for personal identity verification can be roughly classified into four categories depending on staticldynamic and biometric/physical or knowledge-based as shown in Figl.1. (This figure has been partly inspired by a brochure from Cadix Corp, Tokyo.) Fingerprints, iris, retina, DNA, face, blood vessels, for instance, are… CONTINUE READING

Citations

Publications citing this paper.
Showing 1-10 of 21 extracted citations

’Hidden signature’ —- a new solution for on-line verification using DTW

2008 42nd Annual IEEE International Carnahan Conference on Security Technology • 2008

References

Publications referenced by this paper.

On - line Signature Verifi , cation Incorporating the Direction of Pen Movement ”

Hideo TAGUCHI, Koichi KIRIYAMA, +4 authors Toshio KAWASHIMA
Trans . IEICE Jpn . , E • 1993

Similar Papers

Loading similar papers…