• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks.

Shilian YuYe AiBo XuYicong ZhouWeifeng LiQingmin LiaoNorman Poh
Published in: Inf. Sci. (2016)
Keyphrases
  • signature verification
  • signature recognition
  • identity verification
  • dynamic time warping
  • global features
  • document analysis
  • equal error rate
  • nearest neighbor
  • ddos attacks