Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 8
Page No. 2687 - 2694

Offline Recognition of Handwritten Signatures Based on the SURF and SVM Algorithms

Authors : Hossam E. Abd El Munim, Ali Khaleel Ibrahim Hamadly and Hoda K. Mohamed

References

Abaza, A., A. Ross, C. Hebert, M.A.F. Harrison and M.S. Nixon, 2013. A survey on ear biometrics. ACM. Comput. Surv., 45: 1-35.
CrossRef  |  Direct Link  |  

Abboud, A.J. and O.S. Saleh, 2014. Sustainable IT: A realisation survey among academic institutions of Ira. Intl. J. Enhanced Res. Sci. Technol. Eng., 3: 25-31.
Direct Link  |  

Abboud, A.J. and S.A. Jassim, 2010. Image quality guided approach for adaptive modelling of biometric intra-class variations. Proceedings of the SPIE Conference on Mobile Multimedia/Image Processing, Security and Applications Vol. 7708, April 28, 2010, SPIE, Orlando, Florida, USA., pp: 1-10.

Abboud, A.J. and S.A. Jassim, 2012. Biometric Templates Selection and Update using Quality Measures. In: Mobile Multimedia/Image Processing, Security and Applications 2012, Agaian, S.S., S.A. Jassim and E.Y. Du (Eds.). SPIE Press, ‎Bellingham, Washington, USA., ISBN: 9780819490841, pp: 1-9.

Abboud, A.J., 2011. Quality aware adaptive biometric systems. Ph.D Thesis, University of Buckingham, Buckingham, England.

Abboud, A.J., 2015. Multifactor authentication for software protection. Diyala J. Eng. Sci., 8: 479-492.
Direct Link  |  

Abboud, A.J., 2015. Protecting documents using visual cryptography. Intl. J. Eng. Res. General Sci., 3: 464-470.

Abboud, A.J., A.N. Albu-Rghaif and A.K. Jassim, 2018. Balancing compression and encryption of satellite imagery. Intl. J. Electr. Comput. Eng., 8: 3568-3586.
CrossRef  |  

Abboud, A.J., H. Sellahewa and S.A. Jassim, 2009. Quality Based Approach for Adaptive Face Recognition. In: Mobile Multimedia/Image Processing, Security and Applications 2009, Agaian, S.S. and S.A. Jassim (Eds.). SPIE Press, ‎Bellingham, Washington, USA., ISBN: 9780819476173, pp: 1-10.

Al-Assam H., A. Abboud, H. Sellahewa and S. Jassim, 2012. Exploiting Relative Entropy and Quality Analysis in Cumulative Partial Biometric Fusion. In: Transactions on Data Hiding and Multimedia Security VIII, Shi, Y.Q. and S. Katzenbeisser (Eds.). Springer, Berlin, Germany, ISBN:978-3--642-31971-6, pp: 1-18.

Al-Assam, H., A. Abboud and S. Jassim, 2011. Exploiting samples quality in evaluating and improving performance of biometric systems. Intl. J. Digital Soc., 2: 462-468.
CrossRef  |  Direct Link  |  

Al-Assam, H., A. Abboud and S. Jassim, 2011. Hidden assumption of face recognition evaluation under different quality conditions. Proceedings of the 2011 International Conference on Information Society (i-Society), June 27-29, 2011, IEEE, London, UK., ISBN:978-1-61284-148-9, pp: 27-32.

Albu-Rghaif, A.N., A.K. Jassim and A.J. Abboud, 2018. A data structure encryption algorithm based on circular queue to enhance data security. Proceedings of the 2018 Joint 1st and 3rd International Scientific and Engineering Sciences Scientific Conference on Engineering Science (ISCES), January 10-11, 2018, IEEE, Diyala, Iraq, ISBN:978-1-5386-1498-3, pp: 24-29.

Ali, N.M., S.W. Jun, M.S. Karis, M.M. Ghazaly and M.S.M. Aras, 2016. Object classification and recognition using Bag-of-words (BoW) model. Proceedings of the IEEE 12th International Colloquium on Signal Processing and its Applications (CSPA), March 4-6, 2016, IEEE, Malacca, Malaysia, ISBN:978-1-4673-8781-1, pp: 216-220.

Cheng, G., Y. Wan, A.N. Saudagar, K. Namuduri and B.P. Buckles, 2015. Advances in human action recognition: A survey. Prepr., 1: 1-30.
Direct Link  |  

Farhan, L., L. Alzubaidi, M. Abdulsalam, A.J. Abboud and M. Hammoudeh et al., 2018. An efficient data packet scheduling scheme for Internet of Things networks. Proceedings of the 2018 1st and 3rd International Scientific Conference on Engineering Sciences (ISCES), January 10-11, 2018, IEEE, Diyala, Iraq, ISBN:978-1-5386-1499-0, pp: 1-6.

Gruber, C., T. Gruber, S. Krinninger and B. Sick, 2010. Online signature verification with support vector machines based on LCSS kernel functions. IEEE. Trans. Syst. Man Cybern. Part B. Cybern., 40: 1088-1100.
CrossRef  |  Direct Link  |  

Impedovo, D., G. Pirlo and R. Plamondon, 2012. Handwritten signature verification: New advancements and open issues. Proceedings of the International Conference on Frontiers in Handwriting Recognition, September 18-20, 2012, IEEE, Bari, Italy, ISBN:978-1-4673-2262-1, pp: 367-372.

Jassim, A.J., H. Al-Assam, A.J. Abbound and H. Sellahewa, 2010. Analysis of relative entropy, accuracy and quality of face biometric. Proceedings of the Workshop on Pattern Recognition for IT, September 21, 2010, DAGM, Stuttgart, Germany, pp: 1-8.

Kaur, H. and S. Kaur, 2014. Offline Hindi signature recognition using surf feature extraction and neural networks approach. Intl. J. Sci. Res., 3: 1141-1146.

Liwicki, M., M.I. Malik, C.E.V.D. Heuvel, X. Chen and C. Berger et al., 2011. Signature verification competition for online and offline skilled forgeries (SigComp2011). Proceedings of the International Conference on Document Analysis and Recognition, September 18-21, 2011, IEEE, Beijing, China, ISBN:978-1-4577-1350-7, pp: 1480-1484.

McTear, M., Z. Callejas and D. Griol, 2016. The Conversational Interface: Talking to Smart Devices. Springer, Berlin, Germany, ISBN:9783319329659, Pages: 422.

Oloyede, M.O. and G.P. Hancke, 2016. Unimodal and multimodal biometric sensing systems: A review. IEEE. Access., 4: 7532-7555.
CrossRef  |  Direct Link  |  

Pansare, A. and S. Bhatia, 2012. Article: Handwritten signature verification using neural network. Int. J. Applied Inf. Syst., 1: 44-49.
Direct Link  |  

Parodi, M., J.C. Gomez and M. Liwicki, 2012. Online signature verification based on Legendre series representation: Robustness assessment of different feature combinations. Proceedings of the International Conference on Frontiers in Handwriting Recognition, September 18-20, 2012, IEEE, Bari, Italy, ISBN:978-1-4673-2262-1, pp: 379-384.

Plamondon, R. and S.N. Srihari, 2000. On-line and off-line handwriting recognition: A comprehensive survey. 1EEE Trans. Pattern Anal. Mach., 22: 63-84.
CrossRef  |  Direct Link  |  

Richiardi, J., H. Ketabdar and A. Drygajlo, 2005. Local and global feature selection for on-line signature verification. Proceedings of the 8th International Conference on Document Analysis and Recognition (ICDAR'05), August 31-September 1, 2005, IEEE, Seoul, South Korea, ISBN:0-7695-2420-6, pp: 625-629.

Sae-Bae, N. and N. Memon, 2014. Online signature verification on mobile devices. IEEE. Trans. Inf. Forensics Secur., 9: 933-947.
CrossRef  |  Direct Link  |  

Shamir, A. and Y. Tauman, 2001. Improved Online/Offline Signature Schemes. In: Advances in Cryptology-CRYPTO 2001, Kilian, J. (Ed.). Springer, Berlin, Germany, ISBN:978-3-540-42456-7, pp: 355-367.

Viola, P. and M.J. Jones, 2004. Robust real-time face detection. Int. J. Comput. Vision, 57: 137-154.
CrossRef  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved