Ramón Blanco-Gonzalo, O. Miguel-Hurtado, Aitor Mendaza-Ormaza, R. Sánchez-Reillo
{"title":"移动场景下手写签名识别:性能评估","authors":"Ramón Blanco-Gonzalo, O. Miguel-Hurtado, Aitor Mendaza-Ormaza, R. Sánchez-Reillo","doi":"10.1109/CCST.2012.6393554","DOIUrl":null,"url":null,"abstract":"Following the idea of improving our previous work on dynamic handwritten signature recognition on portable devices, a performance evaluation in a mobile scenario was done. A database with 11 users and 8 mobile devices (using stylus and finger) has been collected in order to study different parameters such as screen size, operative system and the interoperability between the devices. The evaluation was divided by 3 sessions of 20 signatures per device each; 20 skilled forgeries signatures per user were used also. The devices used were mobile phones, tablets, laptops and two specific devices for signing. The algorithm used to assess the signatures was a DTW-based signature recognition algorithm.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"26","resultStr":"{\"title\":\"Handwritten signature recognition in mobile scenarios: Performance evaluation\",\"authors\":\"Ramón Blanco-Gonzalo, O. Miguel-Hurtado, Aitor Mendaza-Ormaza, R. Sánchez-Reillo\",\"doi\":\"10.1109/CCST.2012.6393554\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Following the idea of improving our previous work on dynamic handwritten signature recognition on portable devices, a performance evaluation in a mobile scenario was done. A database with 11 users and 8 mobile devices (using stylus and finger) has been collected in order to study different parameters such as screen size, operative system and the interoperability between the devices. The evaluation was divided by 3 sessions of 20 signatures per device each; 20 skilled forgeries signatures per user were used also. The devices used were mobile phones, tablets, laptops and two specific devices for signing. The algorithm used to assess the signatures was a DTW-based signature recognition algorithm.\",\"PeriodicalId\":405531,\"journal\":{\"name\":\"2012 IEEE International Carnahan Conference on Security Technology (ICCST)\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"26\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE International Carnahan Conference on Security Technology (ICCST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2012.6393554\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2012.6393554","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Handwritten signature recognition in mobile scenarios: Performance evaluation
Following the idea of improving our previous work on dynamic handwritten signature recognition on portable devices, a performance evaluation in a mobile scenario was done. A database with 11 users and 8 mobile devices (using stylus and finger) has been collected in order to study different parameters such as screen size, operative system and the interoperability between the devices. The evaluation was divided by 3 sessions of 20 signatures per device each; 20 skilled forgeries signatures per user were used also. The devices used were mobile phones, tablets, laptops and two specific devices for signing. The algorithm used to assess the signatures was a DTW-based signature recognition algorithm.