Security enhancement of dynamic signature by utilizing local features with individual threshold
Dynamic signature has potential to replace conventional signature in verifying an authorised person since it is legal and widely accepted by society. To date, most of the existing researches emphasise in obtaining a high performance of Genuine Acceptance Rate (GAR). However, at the same time, a high...
| Main Authors: | Suryanti, Awang, Nor Faradilla, Mohamed Idris, Junaida, Sulaiman |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
American Scientific Publisher
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/19446/ http://umpir.ump.edu.my/id/eprint/19446/1/56.%20Security%20Enhancement%20of%20Dynamic%20Signature%20by%20Utilizing%20Local%20Features%20with%20Individual%20Threshold1.pdf |
Similar Items
Comparison of accuracy performance based on normalization techniques for the features fusion of face and online signature
by: Suryanti, Awang, et al.
Published: (2017)
by: Suryanti, Awang, et al.
Published: (2017)
Feature fusion using a modified genetic algorithm for face and signature recognition system
by: Suryanti, Awang
Published: (2015)
by: Suryanti, Awang
Published: (2015)
Feature level fusion of face and signature using a modified feature selection technique
by: Suryanti, Awang, et al.
Published: (2013)
by: Suryanti, Awang, et al.
Published: (2013)
Postprocessing algorithm for security features extraction
by: Rozita, Mohd Yusof, et al.
Published: (2012)
by: Rozita, Mohd Yusof, et al.
Published: (2012)
A novel statistical feature analysis-based global and local method for face recognition
by: Ahmed Talab, Mohammed, et al.
Published: (2020)
by: Ahmed Talab, Mohammed, et al.
Published: (2020)
Online signature verification based on dynamic feature discriminators
by: Omar, Nazaruddin
Published: (2009)
by: Omar, Nazaruddin
Published: (2009)
A review of feature selection on text classification
by: Nur Syafiqah, Mohd Nafis, et al.
Published: (2018)
by: Nur Syafiqah, Mohd Nafis, et al.
Published: (2018)
Feature extraction analysis, techniques and issues in vehicle types recognition
by: Nor'Aqilah, Misman, et al.
Published: (2018)
by: Nor'Aqilah, Misman, et al.
Published: (2018)
Enhanced global and local curvature properties for corner detection
by: Suraya, Abu Bakar, et al.
Published: (2020)
by: Suraya, Abu Bakar, et al.
Published: (2020)
Online signature verification discriminators
by: Omar, Nazaruddin, et al.
Published: (2006)
by: Omar, Nazaruddin, et al.
Published: (2006)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
The assimilation of multi-type information for seasonal precipitation forecasting using modular neural network
by: Junaida, Sulaiman, et al.
Published: (2017)
by: Junaida, Sulaiman, et al.
Published: (2017)
Performance evaluation of hybrid feature selection technique for sentiment classification based on food reviews
by: Suryanti, Awang, et al.
Published: (2021)
by: Suryanti, Awang, et al.
Published: (2021)
Security mediated certificateless signatures
by: Yap, Nvun-She, et al.
Published: (2007)
by: Yap, Nvun-She, et al.
Published: (2007)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Threshold center-symmetric local binary convolutional neural networks for bilingual handwritten digit recognition
by: Saleh Al-Wajih, Ebrahim Qasem
Published: (2022)
by: Saleh Al-Wajih, Ebrahim Qasem
Published: (2022)
A New Proxy Signature Scheme As Secure As ElGamal Signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Region-Based Distance Analysis of Keyphrases: A New Unsupervised Method for Extracting Keyphrases Feature from Articles
by: Miah, Mohammad Badrul Alam, et al.
Published: (2021)
by: Miah, Mohammad Badrul Alam, et al.
Published: (2021)
Suspicious activity trigger system using YOLOv6 convolutional neural network
by: Suryanti, Awang, et al.
Published: (2023)
by: Suryanti, Awang, et al.
Published: (2023)
Name-signature lookup system: a security enhancement to named data networking
by: Song, Zhicheng, et al.
Published: (2021)
by: Song, Zhicheng, et al.
Published: (2021)
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
The evaluation of accuracy performance in an enhanced embedded feature selection for unstructured text classification
by: Nur Syafiqah, Mohd Nafis, et al.
Published: (2020)
by: Nur Syafiqah, Mohd Nafis, et al.
Published: (2020)
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013)
by: Ali, Sellami, et al.
Published: (2013)
An enhanced hybrid feature selection technique using term frequency-inverse document frequency and support vector machine-recursive feature elimination for sentiment classification
by: Nur Syafiqah, Mohd Nafis, et al.
Published: (2021)
by: Nur Syafiqah, Mohd Nafis, et al.
Published: (2021)
Dynamic signature verification system
by: Lim, Wai Loon
Published: (2011)
by: Lim, Wai Loon
Published: (2011)
Dynamic threshold and quality meter based routing for cooperative broadband wireless networks
by: Chong, Eng Tan, et al.
Published: (2009)
by: Chong, Eng Tan, et al.
Published: (2009)
Dynamic fast local Laplacian completed local ternary pattern (dynamic FLapCLTP) for face recognition
by: Sam, Yin Yee
Published: (2020)
by: Sam, Yin Yee
Published: (2020)
Robust partitioning and indexing for iris biometric database based on local features
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
Enhancement of glove-based approach to dynamic signature verification by reducing number of sensors
by: N.S., Kamel, et al.
Published: (2008)
by: N.S., Kamel, et al.
Published: (2008)
Enhancement of Glove-Based Approach to Dynamic Signature Verification by Reducing Number of Sensors
by: Shohel, Sayeed, et al.
Published: (2008)
by: Shohel, Sayeed, et al.
Published: (2008)
Multiple watermarking technique using optimal threshold
by: Noruhida, Alias, et al.
Published: (2020)
by: Noruhida, Alias, et al.
Published: (2020)
KDA: An unsupervised approach for analyzing keyphrases distance from news articles as a feature of keyphrase extraction
by: Alam Miah, Mohammad Badrul, et al.
Published: (2022)
by: Alam Miah, Mohammad Badrul, et al.
Published: (2022)
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019)
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019)
Embedded feature importance with threshold-based selection for optimal feature subset in autism screening
by: Ainie Hayati, Noruzman, et al.
Published: (2026)
by: Ainie Hayati, Noruzman, et al.
Published: (2026)
Relations among security notions for undeniable signature schemes
by: Kurosawa, Kaoru, et al.
Published: (2006)
by: Kurosawa, Kaoru, et al.
Published: (2006)
The security of the FDH variant of Chaum's undeniable signature scheme
by: Ogata, Wakaha, et al.
Published: (2006)
by: Ogata, Wakaha, et al.
Published: (2006)
On Analysis and Effectiveness of Signature Based in Detecting Metamorphic Virus
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
Maintaining the Malay local quality of life by utilizing vernacular functional spatial features
by: GhaffarianHoseini, AmirHosein, et al.
Published: (2010)
by: GhaffarianHoseini, AmirHosein, et al.
Published: (2010)
An adaptive large DCT psychovisual threshold in image compression
by: Ernawan, Ferda, et al.
Published: (2019)
by: Ernawan, Ferda, et al.
Published: (2019)
Multi-Scale Skin Sample Approach for Dynamic Skin Color Detection: An Analysis
by: Mohd Zamri, Osman, et al.
Published: (2018)
by: Mohd Zamri, Osman, et al.
Published: (2018)
Similar Items
-
Comparison of accuracy performance based on normalization techniques for the features fusion of face and online signature
by: Suryanti, Awang, et al.
Published: (2017) -
Feature fusion using a modified genetic algorithm for face and signature recognition system
by: Suryanti, Awang
Published: (2015) -
Feature level fusion of face and signature using a modified feature selection technique
by: Suryanti, Awang, et al.
Published: (2013) -
Postprocessing algorithm for security features extraction
by: Rozita, Mohd Yusof, et al.
Published: (2012) -
A novel statistical feature analysis-based global and local method for face recognition
by: Ahmed Talab, Mohammed, et al.
Published: (2020)