{"title":"使用机器学习的签名识别","authors":"Shalaw Mshir, Mehmet Kaya","doi":"10.1109/ISDFS49300.2020.9116199","DOIUrl":null,"url":null,"abstract":"Signatures are popularly used as a method of personal identification and confirmation. Many certificates such as bank checks and legal activities need signature verification. Verifying the signature of a large number of documents is a very difficult and time-consuming task. As a result, explosive growth has been observed in biometric personal verification and authentication systems that relate to unique quantifiable physical properties (fingerprints, hand, and face, ear, iris, or DNA scan) or behavioral characteristics (gait, sound, etc.). Several methods are used to describe the ability of the suggested system in specifying the genuine signatures from the forgeries. This approach presents a new technique for signature verification and recognition, using a tow dataset for training the model by a siamese network.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Signature Recognition Using Machine Learning\",\"authors\":\"Shalaw Mshir, Mehmet Kaya\",\"doi\":\"10.1109/ISDFS49300.2020.9116199\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Signatures are popularly used as a method of personal identification and confirmation. Many certificates such as bank checks and legal activities need signature verification. Verifying the signature of a large number of documents is a very difficult and time-consuming task. As a result, explosive growth has been observed in biometric personal verification and authentication systems that relate to unique quantifiable physical properties (fingerprints, hand, and face, ear, iris, or DNA scan) or behavioral characteristics (gait, sound, etc.). Several methods are used to describe the ability of the suggested system in specifying the genuine signatures from the forgeries. This approach presents a new technique for signature verification and recognition, using a tow dataset for training the model by a siamese network.\",\"PeriodicalId\":221494,\"journal\":{\"name\":\"2020 8th International Symposium on Digital Forensics and Security (ISDFS)\",\"volume\":\"114 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 8th International Symposium on Digital Forensics and Security (ISDFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISDFS49300.2020.9116199\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS49300.2020.9116199","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Signatures are popularly used as a method of personal identification and confirmation. Many certificates such as bank checks and legal activities need signature verification. Verifying the signature of a large number of documents is a very difficult and time-consuming task. As a result, explosive growth has been observed in biometric personal verification and authentication systems that relate to unique quantifiable physical properties (fingerprints, hand, and face, ear, iris, or DNA scan) or behavioral characteristics (gait, sound, etc.). Several methods are used to describe the ability of the suggested system in specifying the genuine signatures from the forgeries. This approach presents a new technique for signature verification and recognition, using a tow dataset for training the model by a siamese network.