Do you want to publish a course? Click here

Using Multi-Sets of Features to improve the Performance of Automatic Signature Verification Systems

استخدام مجموعات الخصائص المتعددة لرفع أداء أنظمة التحقق من صحة التواقيع

1251   0   22   0 ( 0 )
 Publication date 2010
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

For decades, published Automatic Signature Verification (ASV) works depended on using one feature set. Some researchers selected this feature set based on their experience, and some others selected it using some feature selection algorithms that can select the best feature set (bfs). In practical systems, the documents containing the signatures could be noisy, and recognition of check writer in multi-signatory accounts is required. Due to the error caused by such requirements and data quality, improving the performance of ASV becomes a necessity. In this paper, a new technique for ASV decision making using Multi-Sets of Features is introduced. The experimental results have shown that the introduced technique gives important improvement in forgery detection and in the overall performance of the system.


Artificial intelligence review:
Research summary
تتناول هذه الورقة البحثية تحسين أداء أنظمة التحقق التلقائي من التوقيعات (ASV) باستخدام مجموعات متعددة من الميزات. تقليديًا، اعتمدت الأعمال المنشورة في هذا المجال على مجموعة واحدة من الميزات، ولكن هذه الورقة تقترح تقنية جديدة تعتمد على استخدام مجموعات متعددة من الميزات لتحسين دقة الكشف عن التزوير. تم اختبار التقنية الجديدة باستخدام بيانات توقيعات متنوعة، وأظهرت النتائج التجريبية تحسنًا ملحوظًا في أداء النظام، خاصة في الكشف عن التزوير المهاري. تتضمن الورقة شرحًا مفصلًا للبيانات المستخدمة، وتقنيات استخراج الميزات، وطرق قياس المسافة، وآلية اتخاذ القرار في التحقق من التوقيعات. كما تقدم الورقة نتائج تجريبية تُظهر فعالية التقنية الجديدة مقارنة بالطرق التقليدية.
Critical review
دراسة نقدية: تعتبر هذه الورقة إضافة مهمة إلى مجال التحقق التلقائي من التوقيعات، حيث تقدم نهجًا مبتكرًا يعتمد على استخدام مجموعات متعددة من الميزات لتحسين دقة النظام. ومع ذلك، يمكن توجيه بعض النقد إلى الدراسة من حيث تعقيد التقنية المقترحة، مما قد يجعل من الصعب تنفيذها في الأنظمة العملية. بالإضافة إلى ذلك، قد يكون من المفيد تقديم مقارنة أكثر تفصيلًا بين الأداء الفعلي للنظام المقترح والأنظمة التقليدية في بيئات مختلفة. كما أن الدراسة قد تستفيد من تحليل أعمق لتأثير الضوضاء على أداء النظام المقترح.
Questions related to the research
  1. ما هي التقنية الجديدة التي تم اقتراحها في الورقة لتحسين أداء أنظمة التحقق التلقائي من التوقيعات؟

    التقنية الجديدة تعتمد على استخدام مجموعات متعددة من الميزات لتحسين دقة الكشف عن التزوير في أنظمة التحقق التلقائي من التوقيعات.

  2. ما هي أنواع الميزات التي يتم استخراجها في أنظمة التحقق التلقائي من التوقيعات؟

    يتم استخراج نوعين من الميزات: الميزات الشكلية مثل ميل الكتابة والميزات الزائفة الديناميكية مثل عامل الضغط العالي.

  3. كيف يتم قياس المسافة بين التوقيع المدخل والتوقيعات المرجعية في النظام؟

    يتم قياس المسافة باستخدام مسافة إقليدية، حيث يتم حسابها من ميزات التوقيع التجريبي باستخدام معادلة محددة.

  4. ما هي الفائدة الرئيسية لاستخدام مجموعات متعددة من الميزات في التحقق من التوقيعات؟

    الفائدة الرئيسية هي تحسين دقة الكشف عن التزوير من خلال جمع الفعالية التي يمكن أن توفرها مجموعات الميزات الفعالة التي لا يمكن التقاطها باستخدام مجموعة ميزات واحدة فقط.


References used
M. Ammar, Y. Yoshida and T. Fukumura, Automatic Off-line Verification of Signatures Based on Pressure Features", IEEE, Trans on Systems Man and Cybernetics, Vol. SMC-16, No 3, pp 39-47, 1986
M. Ammar, et al., A New Effective Approach for Automatic Off-line Verification of Signatures by Using Pressure Features, Proceedings of the 8th Int. Conf. on Pattern Recognition, Paris, pp. 566-569, Oct. 1986
K. Huang and Y. Hong, Off-line signature verification based on geometric feature extraction and neural network classification, Patten Recognition, Vol. 30, No. 1, pp. 9-17, 1997
C. Sansone and M. Vento, Signature verification: increasing performance by a multi-stage system, Pattern Analysis and Applications, Vol. 3, pp. 169-181,2000
rate research

Read More

This research suggests a new method that aims to verify the manual signature image which is written by person, and specify whether this signature back to this person or that forged signature. This was done by extracting geometric features of the sign ature image and applying statistical functions on them as a way to verify the signature of that person. The features from the signature image have been extracted on many stages so a signature image has been transformed from the gray scale to binary format, and then extracting the statistical features from the original signature image which is the maximum value from the most repeated values in the ones' coordination line that determine the signature shape, in addition to the number of ones which also determine the signature shape. Finally two ranges have been identified for the values accepted for original signature image. By the same way, statistical features have been extracted from the foreign signature image and tested if they aggregate within the specified domain of acceptable values. This research also includes the results of the proposed approach that compared with the previous methods in this scope. The proposed method has been tested to the data base consisting of 16200 signatures back to 300 persons, and as a result the signature image has been verified with a good percentage.
We present a generic method to compute thefactual accuracy of a generated data summarywith minimal user effort. We look at the prob-lem as a fact-checking task to verify the nu-merical claims in the text. The verification al-gorithm assumes that the data used to generatethe text is available. In this paper, we describehow the proposed solution has been used toidentify incorrect claims about basketball tex-tual summaries in the context of the AccuracyShared Task at INLG 2021.
The study suggests designing a weighting model for iris features and selection of the best ones to show the effect of weighting and selection process on system performance. The search introduces a new weighting and fusion algorithm depends on the i nter and intra class differences and the fuzzy logic. The output of the algorithm is the feature’s weight of the selected features. The designed system consists of four stages which are iris segmentation, feature extraction, feature weighting_selection_fusion model implementation and recognition. System suggests using region descriptors for defining the center and radius of iris region, then the iris is cropped and transformed into the polar coordinates via rotation and selection of radius-size pixels of fixed window from center to circumference. Feature extraction stage is done by wavelet vertical details and the statistical metrics of 1st and 2nd derivative of normalized iris image. At weighting and fusion step the best features are selected and fused for classification stage which is done by distance classifier. The algorithm is applied on CASIA database which consists of iris images related to 250 persons. It achieved 100% segmentation precision and 98.7% recognition rate. The results show that segmentation algorithm is robust against illumination and rotation variations and occlusion by eye lash and lid, and the weighting_selection_fusion algorithm enhances the system performance.
There are many of Formal Methods for testing security protocols detecting being safe or not. Including Avispa, Casper, ProVerif, Scyther. Previously a comparisons using two of mentioned methods (ProVerif, Scyther). In this, research a comparison b etween the four mentioned methods in terms of the same used parameters in the previous comparison: working style, the modeling language, user interface, input, and output. As a result, the user provided with options to choose the appropriate method depending on the desired parameter. Six different of security protocols have been tested and finally the results have been compared; these protocols are Kao Chow Authentication Protocol, 3-D Secure Protocol, Needham-Schroeder Public Key Protocol, Diffie–Hellman key exchange, Andrew Secure RPC Protocol, and Challenge Handshake Authentication Protocol
The use of traditional methods to analyze massive amounts of data sets is not conducive to the discovery of new knowledge patterns supports the decision-making process So the purpose of this article is designed visual analysis system that supports analysis of data sets through the use of automated analysis, which includes many of the techniques such as assembly process (clustering) and Altnsnev (classification) and the correlation base (association Rule) And the process of visual data exploration techniques Manifesting, and then the comparison with other data sets manifestation techniques and evaluation of the proposed Manifesting system.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا