The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Doodle-based graphical passwords represent a challenging scenario due to their high variability and the tendency to be graphically simple. Despite this, doodle-based authentication using touch screens is a promising lightweight user verification method. Several works have been published in this field, although they report in general experimental verification results over small and private databases...
Questioned document examination is extensively used by forensic specialists for criminal identification. This paper presents a writer recognition system based on allographic features operating in identification mode (one-to-many). It works at the level of isolated characters, considering that each writer uses a reduced number of shapes for each one. Individual characters of a writer are manually segmented...
This paper evaluates the combination of static image (off-line) and dynamic information (on-line) for signature verification. Two off-line and two on-line recognition approaches exploiting information at the global and local levels are used. Experimental results are given using the BiosecurID database (130 signers, 3,640 signatures). Fusion experiments are done using a trained fusion approach based...
In this paper, we study the impact of an incremental level of skill in the forgeries against signature verification systems. Experiments are carried out using both off-line systems, involving the discrimination of signatures written on a piece of paper, and on-line systems, in which dynamic information of the signing process (such as velocity and acceleration) is also available. We use for our experiments...
One of the biggest challenges in person recognition using biometric systems is the variability in the acquired data. In this paper, we evaluate the effects of an increasing time lapse between reference and test biometric data consisting of static images of handwritten signatures and texts. We use for our experiments two recognition approaches exploiting information at the global and local levels,...
A performance and robustness study for on-line signature verification is presented. Experiments are carried out on the MCYT database comprising 16,500 signatures from 330 subjects, which are parameterized by means of a 100-feature set which can be divided into four different groups according to the signature information they contain, namely: (i) time, (ii) speed and acceleration, (iii) direction,...
A biometric template protection system for dynamic signature verification is presented. The approach uses auxiliary (helper) data that allows the matching with secure templates but do not provide information to a potential attacker. The performance of the proposed system is evaluated using the MCYT signature database comprising 330 users, with 25 genuine signatures and 25 skilled forgeries per user...
In the present contribution, the applicability of off-line handwritten signatures to the fuzzy vault construction is studied. Feature extraction is based on quantized maxima and minima from upper and lower envelopes of the signature. Baseline results are reported for skilled and random forgeries of the MCYT off-line signature database, showing that the proposed scheme is suitable for signers with...
Two different genetic algorithm (GA) architectures are applied to a feature selection problem in on-line signature verification. The standard GA with binary coding is first used to find a suboptimal subset of features that minimizes the verification error rate of the system. The curse of dimensionality phenomenon is further investigated using a GA with integer coding. Results are given on the MCYT...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.