Pirlo, 1994 - Google Patents
Algorithms for signature verificationPirlo, 1994
- Document ID
- 13270062173383653301
- Author
- Pirlo G
- Publication year
- Publication venue
- Fundamentals in Handwriting Recognition
External Links
Snippet
Algorithms for Signature Verification Page 1 Algorithms for Signature Verification Giuseppe Pirlo
Dipartimento di Informatica, Universita degli Studi di Bari via Amendola 173, 70126 Bari, Italy 1.
Introduction The need to assure that only the right people are authorized to high-security …
- 238000000034 method 0 description 42
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/00158—Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
- G06K9/00046—Image acquisition by using geometrical optics, e.g. using prisms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00885—Biometric patterns not provided for under G06K9/00006, G06K9/00154, G06K9/00335, G06K9/00362, G06K9/00597; Biometric specific functions not specific to the kind of biometric
- G06K9/00892—Use of multiple biometrics
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00885—Biometric patterns not provided for under G06K9/00006, G06K9/00154, G06K9/00335, G06K9/00362, G06K9/00597; Biometric specific functions not specific to the kind of biometric
- G06K9/00899—Spoof detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Pirlo | Algorithms for signature verification | |
| Coetzer et al. | Offline signature verification using the discrete radon transform and a hidden Markov model | |
| Lin et al. | Palmprint verification using hierarchical decomposition | |
| Hou et al. | A survey of off-line signature verification | |
| Fischer et al. | Signature verification based on the kinematic theory of rapid human movements | |
| US5333209A (en) | Method of recognizing handwritten symbols | |
| Kekre et al. | Off-line signature recognition systems | |
| Hashim et al. | A comparative study among handwritten signature verification methods using machine learning techniques | |
| Wessels et al. | A hybrid system for signature verification | |
| Plamondon et al. | Online signature verification | |
| Dimauro et al. | Component-oriented algorithms for signature verification | |
| Kholmatov | Biometric identity verification using on-line & off-line signature verification | |
| Huang et al. | On-line signature verification based on dynamic segmentation and global and local matching | |
| Leung et al. | Palmprint verification for controlling access to shared computing resources | |
| Kiran et al. | On-line signature verification system using probabilistic feature modelling | |
| Houtinezhad et al. | Writer-independent signature verification based on feature extraction fusion | |
| Mushtaq et al. | Signature verification: A study | |
| Munich et al. | Visual signature verification using affine arc-length | |
| Nyssen et al. | A multi-stage online signature verification system | |
| Houtinezhad et al. | Off-line signature verification system using features linear mapping in the candidate points | |
| Kutsman et al. | Dynamic handwritten signature identification using spiking neural network | |
| Singh et al. | Survey on offline signature recognition and verification schemes | |
| Tolba | GloveSignature: A virtual-reality-based system for dynamic signature verification | |
| Rashidi et al. | Local features analysis of on-line signature using modified distance of DTW | |
| Afsar et al. | Wavelet transform based global features for online signature recognition |