Rodrigo Ros-Gomez, Helga C. Quiros-Sandoval, Ramón Blanco-Gonzalo, R. Sánchez-Reillo
{"title":"静态手写验证系统在现实场景下的性能对比分析","authors":"Rodrigo Ros-Gomez, Helga C. Quiros-Sandoval, Ramón Blanco-Gonzalo, R. Sánchez-Reillo","doi":"10.1109/CCST.2016.7815679","DOIUrl":null,"url":null,"abstract":"An analysis on realistic conditions for static handwritten signature verification systems is presented. Evaluation conditions are studied so to approximate as accurately as possible the conditions of a real-world operational scenario. Also, the problem of modeling realistic attacks by using databases containing forgeries is considered in the analysis. To do so, a database collected with different levels of knowledge and training is used. Performance evaluation results with these restrictions are given over several databases. Results show the effect of the amount of training and the information available to the forger on the attack resistance of some algorithms.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"61 1","pages":"1-7"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A comparative analysis on the performance of static handwritten verification systems on realistic scenarios\",\"authors\":\"Rodrigo Ros-Gomez, Helga C. Quiros-Sandoval, Ramón Blanco-Gonzalo, R. Sánchez-Reillo\",\"doi\":\"10.1109/CCST.2016.7815679\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An analysis on realistic conditions for static handwritten signature verification systems is presented. Evaluation conditions are studied so to approximate as accurately as possible the conditions of a real-world operational scenario. Also, the problem of modeling realistic attacks by using databases containing forgeries is considered in the analysis. To do so, a database collected with different levels of knowledge and training is used. Performance evaluation results with these restrictions are given over several databases. Results show the effect of the amount of training and the information available to the forger on the attack resistance of some algorithms.\",\"PeriodicalId\":6510,\"journal\":{\"name\":\"2016 IEEE International Carnahan Conference on Security Technology (ICCST)\",\"volume\":\"61 1\",\"pages\":\"1-7\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Carnahan Conference on Security Technology (ICCST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2016.7815679\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2016.7815679","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A comparative analysis on the performance of static handwritten verification systems on realistic scenarios
An analysis on realistic conditions for static handwritten signature verification systems is presented. Evaluation conditions are studied so to approximate as accurately as possible the conditions of a real-world operational scenario. Also, the problem of modeling realistic attacks by using databases containing forgeries is considered in the analysis. To do so, a database collected with different levels of knowledge and training is used. Performance evaluation results with these restrictions are given over several databases. Results show the effect of the amount of training and the information available to the forger on the attack resistance of some algorithms.