Handwriting verification - Comparison of a multi-algorithmic and a multi-semantic approach
暂无分享,去创建一个
[1] Ralf Steinmetz,et al. Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.
[2] Yannis Stylianou,et al. Fusion strategies for speech and handwriting modalities in HCI , 2005, IS&T/SPIE Electronic Imaging.
[3] Luc Vandendorpe,et al. Combining face verification experts , 2002, Object recognition supported by user interaction for service robots.
[4] Patrick J. Flynn,et al. Face Recognition Using 2D and 3D Facial Data , 2003 .
[5] Jana Dittmann,et al. Distance-Level Fusion Strategies for Online Signature Verification , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[6] Claus Vielhauer,et al. Analyzing handwriting biometrics in metadata context , 2006, Electronic Imaging.
[7] Berrin Yanikoglu,et al. Combining multiple biometrics to protect privacy , 2004 .
[8] Bernadette Dorizzi,et al. Fusion of HMM's Likelihood and Viterbi Path for On-line Signature Verification , 2004, ECCV Workshop BioAW.
[9] Arun Ross,et al. Multimodal biometrics: An overview , 2004, 2004 12th European Signal Processing Conference.
[10] Claus Vielhauer,et al. Multimodal Biometrics for Voice and Handwriting , 2005, Communications and Multimedia Security.
[11] Michael C. Fairhurst,et al. Biosecure reference systems for on-line signature verification: A study of complementarity , 2007, Ann. des Télécommunications.
[12] Takayuki Hamamoto,et al. A proposal of writer verification of hand written objects , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.
[13] Christiane Schmidt,et al. On-line-Unterschriftenanalyse zur Benutzerverifikation , 1999 .
[14] Arun Ross,et al. Multibiometric systems , 2004, CACM.
[15] Helen C. Shen,et al. Personal Verification Using Palmprint and Hand Geometry Biometric , 2003, AVBPA.
[16] Claus Vielhauer. Biometric User Authentication for it Security - From Fundamentals to Handwriting , 2006, Advances in Information Security.