Login / Signup
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks.
Shilian Yu
Ye Ai
Bo Xu
Yicong Zhou
Weifeng Li
Qingmin Liao
Norman Poh
Published in:
Inf. Sci. (2016)
Keyphrases
</>
signature verification
signature recognition
identity verification
dynamic time warping
global features
document analysis
equal error rate
nearest neighbor
ddos attacks