Voir la notice de l'article provenant de la source Library of Science
@article{IJAMCS_2015_25_3_a15, author = {Putz-Leszczy\'nska, J.}, title = {Signature verification: {A} comprehensive study of the hidden signature method}, journal = {International Journal of Applied Mathematics and Computer Science}, pages = {659--674}, publisher = {mathdoc}, volume = {25}, number = {3}, year = {2015}, language = {en}, url = {http://geodesic.mathdoc.fr/item/IJAMCS_2015_25_3_a15/} }
TY - JOUR AU - Putz-Leszczyńska, J. TI - Signature verification: A comprehensive study of the hidden signature method JO - International Journal of Applied Mathematics and Computer Science PY - 2015 SP - 659 EP - 674 VL - 25 IS - 3 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/IJAMCS_2015_25_3_a15/ LA - en ID - IJAMCS_2015_25_3_a15 ER -
%0 Journal Article %A Putz-Leszczyńska, J. %T Signature verification: A comprehensive study of the hidden signature method %J International Journal of Applied Mathematics and Computer Science %D 2015 %P 659-674 %V 25 %N 3 %I mathdoc %U http://geodesic.mathdoc.fr/item/IJAMCS_2015_25_3_a15/ %G en %F IJAMCS_2015_25_3_a15
Putz-Leszczyńska, J. Signature verification: A comprehensive study of the hidden signature method. International Journal of Applied Mathematics and Computer Science, Tome 25 (2015) no. 3, pp. 659-674. http://geodesic.mathdoc.fr/item/IJAMCS_2015_25_3_a15/
[1] Davis, L. (1991). Handbook of Genetic Algorithms, Vol. 115, Van Nostrand Reinhold, New York, NY.
[2] Durrett, R. (2010). Probability: Theory and Examples, Cambridge University Press, Cambridge.
[3] Faundez-Zanuy, M. (2007). On-line signature recognition based on VQ-DTW, Pattern Recognition 40(3): 981–992.
[4] Fauziyah, S., Azlina, O., Mardiana, B., Zahariah, A.M. and Haroon, H. (2009). Signature verification system using support vector machine, MASAUM Journal of Basic and Applied Sciences 1(2): 291–294.
[5] Galbally, J., Fierrez, J., Freire, M. and Ortega-Garcia, J. (2007). Feature selection based on genetic algorithms for on-line signature verification, IEEE Workshop on Automatic Identification Advanced Technologies, Alghero, Italy, pp. 198–203.
[6] Guru, D. and Prakash, H. (2007). Symbolic representation of on-line signatures, International Conference on Computational Intelligence and Multimedia Applications 2007, Sivakasi, Tamil Nadu, India, pp. 313–317.
[7] Herbst, N. and Liu, C. (1977). Automatic signature verification based on accelerometry, IBM Journal of Research and Development 21(3): 245–253.
[8] Hong-Wei, J. and Zhong-Hua, Q. (2005). Signature Verification Using Wavelet Transform and Support Vector Machine, Springer, Berlin/Heidelberg.
[9] Impedovo, D. and Pirlo, G. (2008). Automatic signature verification: The state of the art, IEEE Transactions on Systems, Man, And Cybernetics, Part C: Applications and Reviews 35(5): 609–635.
[10] Kam, M., Gummadidala, K., Fielding, G. and Conn, R. (2001). Signature authentication by forensic document examiners, Journal of Forensic Sciences 46(4): 884–888.
[11] Kholmatov, A. and Yanikoglu, B. (2005). Identity authentication using improved online signature verification method, Pattern Recognition Letters 26(15): 2400–2408.
[12] Marinai, S., Gori, M. and Soda, G. (2005). Artificial neural networks for document analysis and recognition, IEEE Transactions on Pattern Analysis and Machine Intelligence 27(1): 23–35.
[13] Miguel-Hurtado, O., Mengibar-Pozo, L., Lorenz, M. and Liu-Jimenez, J. (2007). On-line signature verification by dynamic time warping and Gaussian mixture models, 41st Annual IEEE International Carnahan Conference on Security Technology, Ottawa, Canada, pp. 23–29.
[14] Muramatsu, D. and Matsumoto, T. (2003). An HMM online signature verifier incorporating signature trajectories, 7th International Conference on Document Analysis and Recognition, Washington, DC, USA, Vol. 1, pp. 438–442.
[15] Nanni, L. and Lumini, A. (2008). A novel local on-line signature verification system, Pattern Recognition Letters 29(5): 559–568.
[16] Ortega-Garcia, J., Fierrez-Aguilar, J., Simon, D., Gonzalez, J., Faundez-Zanuy, M., Espinosa, V., Satue, A., Hernaez, I., Igarza, J.-J., Vivaracho, C., Escudero, D. and Moro, Q.-I. (2003). MCYT baseline corpus: A bimodal biometric database, IEE Proceedings: Vision, Image and Signal Processing 150(6): 395–401.
[17] Pascual-Gaspar, J.M., Cardenoso-Payo, V. and Vivaracho-Pascual, C.E. (2009). Practical on-line signature verification, in M. Tistarelli and M.S. Nixon (Eds.), Advances in Biometrics, Lecture Notes in Computer Science, Vol. 5558, Springer, Berlin/Heidelberg, pp. 1180–1189.
[18] Putz-Leszczynska, J. and Pacut, A. (2005). Dynamic time warping in subspaces for on-line signature verification, Advances in Graphonomics: Proceedings of IGS 2005, Salerno, Italy, pp. 108–112.
[19] Putz-Leszczynska, J. and Pacut, A. (2009). Model approach to DTW signature verification using error signals, Advances in Graphonomics: Procedings of IGS 2009, Dijon, France, pp. 166–169.
[20] Putz-Leszczynska, J. and Pacut, A. (2013). Universal forgery features idea: A solution for user-adjusted threshold in signature verification, Transactions on Computational Collective Intelligence 7770(9): 152–172.
[21] Quan, Z.-H., Huang, D.-S., Xia, X.-L., Lyu, M.R. and Lok, T.-M. (2006). Spectrum analysis based on windows with variable widths for online signature verification, Proceedings of the International Conference on Pattern Recognition (ICPR ’06), Hong Kong, China, Vol. 2, pp. 1122–1125.
[22] Sakamoto, D., Morita, H., Ohishi, T., Komiya, Y. and Matsumoto, T. (2001). On-line signature verifier incorporating pen position, pen pressure and pen inclination trajectories, AVBPA 2001, Halmstad, Sweden, pp. 318–323.
[23] Schmidt, C. and Kraiss, K.-F. (1997). Establishment of personalized templates for automatic signature verification, Proceedings of the 4th International Conference on Document Analysis and Recognition, Ulm, Germany, Vol. 1, pp. 263–267.
[24] Van, B., Garcia-Salicetti, S. and Dorizzi, B. (2007). On using the Viterbi path along with HMM likelihood information for online signature verification, IEEE Transactions on Systems, Man, and Cybernetics, Part B 37(5): 1237–1247.
[25] WACOM (2015). http://www.wacom.com.
[26] Xiao, X. and Leedham, G. (1999). Signature verification by neural networks with selective attention, Applied Intelligence 11(2): 213–223.
[27] Yoshimura, I. and Yoshimura, M. (1992). On-line signature verification incorporating the direction of pen movement. An experimental examination of the effectiveness, in S. Impedovo and J.C. Simon (Eds.), From Pixels to Features III: Frontiers in Handwriting Recognition, Elsevier, New York, NY, pp. 353–362.