• No results found

Identity authentication using improved online signature verification method

N/A
N/A
Protected

Academic year: 2021

Share "Identity authentication using improved online signature verification method"

Copied!
9
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Fig. 1. Plot of genuine (blue dots) and forgery signatures (red stars) with respect to the three-dimensional distance vector
Fig. 3. Sample genuine signatures from the database. The top- top-most, left-most signature was very difficult to forge, while the right-most, bottom-most signature was quite easy.

References

Related documents

As can be seen in Table 1, ideas from video game design, Flow Theory, Cognitive Load Theory, and theories of Engagement were used to develop an adaptive video game engine with

The results range from a high 94 per cent of listeners who identify the chocolate example as clearly or more like advertising than other program content, to a more moderate 70

In order to tackle the problems of DSD, several different techniques have been proposed. These techniques range from using different tools, such as instant messaging

Duplicate Database Duplicate Application Environment \REMOTE Database Application Environment Transactions New Progra ms Config Up dates Online Users Operators, Developers,

The biochemical data show that the R144H substitution in the signature helix decreases the ability of LptB to bind ATP, while the F239A substitution in the CTD reduces its ability

Some authors indicated that the concentration of leptin in seminal plasma of men with normal semen sample is significantly lower than pathological groups (4)

koraiensis extract on the retinal vascular dysfunction in Spontaneously Diabetic Torii (SDT) rats, which is a type 2 diabetes animal model.. We also deter- mined the possible

• By using the mean-reverting double exponential jump-diffusion model for the price, the swing pricing problem reduces to solving a partial integro- differential complementarity