{"title":"最新技术:签名验证系统","authors":"Tee Wilkin, S. Ooi","doi":"10.1109/ISIAS.2011.6122804","DOIUrl":null,"url":null,"abstract":"This paper presents a review of some online/dynamic and offline/static signature verification system that have been proposed from year 2000 to 2010. There are numerous signature verification systems algorithms and methods been proposed in the last decade. This paper will mainly focus on discussing the signature verification techniques from year 2000 onwards to make a novice summary and conclusion for them.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":"{\"title\":\"State of the art: Signature verification system\",\"authors\":\"Tee Wilkin, S. Ooi\",\"doi\":\"10.1109/ISIAS.2011.6122804\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a review of some online/dynamic and offline/static signature verification system that have been proposed from year 2000 to 2010. There are numerous signature verification systems algorithms and methods been proposed in the last decade. This paper will mainly focus on discussing the signature verification techniques from year 2000 onwards to make a novice summary and conclusion for them.\",\"PeriodicalId\":139268,\"journal\":{\"name\":\"2011 7th International Conference on Information Assurance and Security (IAS)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 7th International Conference on Information Assurance and Security (IAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIAS.2011.6122804\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 7th International Conference on Information Assurance and Security (IAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIAS.2011.6122804","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper presents a review of some online/dynamic and offline/static signature verification system that have been proposed from year 2000 to 2010. There are numerous signature verification systems algorithms and methods been proposed in the last decade. This paper will mainly focus on discussing the signature verification techniques from year 2000 onwards to make a novice summary and conclusion for them.