On-line signature recognition via fusion of dynamic features into dissimilarity space

Author(s):  
Ilias Theodorakopoulos ◽  
George Economou ◽  
Spiros Fotopoulos ◽  
Apostolos Ifantis
Manufacturing ◽  
2003 ◽  
Author(s):  
Anping Guo ◽  
Steve Batzer ◽  
John Roth

In this paper, the dynamic characteristics of micro-drilling process under different cutting conditions and the resulting correlation to tool wear have been studied. Two types of drills, three spindle speeds and two kinds of workpiece materials were used. In-process cutting forces and accelerations were measured. The signals were analyzed in both the time and frequency domains. Some interesting phenomena were observed in the dynamic time-history response during drilling. Progressive functions with the proper order were obtained to describe the curve of the average thrust force with the number of the holes drilled. Dynamic features which were sensitive to tool wear were found. The changing trends of these dynamic features as the drill wear progresses show a feasibility to develop an on-line drill wear monitoring system by evaluating the changes in dynamic features.


Author(s):  
Marlene Goncalves ◽  
Alberto Gobbi

Location-based Skyline queries select the nearest objects to a point that best meet the user's preferences. Particularly, this chapter focuses on location-based Skyline queries over web-accessible data. Web-accessible may have geographical location and be geotagged with documents containing ratings by web users. Location-based Skyline queries may express preferences based on dynamic features such as distance and changeable ratings. In this context, distance must be recalculated when a user changes his position while the ratings must be extracted from external data sources which are updated each time a user scores an item in the Web. This chapter describes and empirically studies four solutions capable of answering location-based Skyline queries considering user's position change and information extraction from the Web inside an area search around the user. They are based on an M-Tree index and Divide & Conquer principle.


Author(s):  
Emanuele Maiorana ◽  
Patrizio Campisi ◽  
Alessandro Neri

With the widespread diffusion of biometrics-based recognition systems, there is an increasing awareness of the risks associated with the use of biometric data. Significant efforts are therefore being dedicated to the design of algorithms and architectures able to secure the biometric characteristics, and to guarantee the necessary privacy to their owners. In this work we discuss a protected on-line signature-based biometric recognition system, where the considered biometrics are secured by applying a set of non-invertible transformations, thus generating modified templates from which retrieving the original information is computationally as hard as random guessing it. The advantages of using a protection method based on non-invertible transforms are exploited by presenting three different strategies for the matching of the transformed templates, and by proposing a multi-biometrics approach based on score-level fusion to improve the performances of the considered system. The reported experimental results, evaluated on the public MCYT signature database, show that the achievable recognition rates are only slightly affected by the proposed protection scheme, which is able to guarantee the desired security and renewability for the considered biometrics.


2007 ◽  
Vol 40 (3) ◽  
pp. 981-992 ◽  
Author(s):  
Marcos Faundez-Zanuy

2015 ◽  
Vol 11 (6) ◽  
pp. 49 ◽  
Author(s):  
Dong Huang ◽  
Jian Gao

With the development of pen-based mobile device, on-line signature verification is gradually becoming a kind of important biometrics verification. This thesis proposes a method of verification of on-line handwritten signatures using both Support Vector Data Description (SVM) and Genetic Algorithm (GA). A 27-parameter feature set including shape and dynamic features is extracted from the on-line signatures data. The genuine signatures of each subject are treated as target data to train the SVM classifier. As a kernel based one-class classifier, SVM can accurately describe the feature distribution of the genuine signatures and detect the forgeries. To improving the performance of the authentication method, genetic algorithm (GA) is used to optimise classifier parameters and feature subset selection. Signature data form the SVC2013 database is used to carry out verification experiments. The proposed method can achieve an average Equal Error Rate (EER) of 4.93% of the skill forgery database.


2006 ◽  
Vol 06 (3) ◽  
pp. 55-65
Author(s):  
Jitti Boonkueng ◽  
Dr.Pusadee Seresangtakul

Author(s):  
Emanuele Maiorana ◽  
Patrizio Campisi ◽  
Julian Fierrez ◽  
Javier Ortega-Garcia ◽  
Alessandro Neri

Sign in / Sign up

Export Citation Format

Share Document