參考文獻 |
[1] Kekre, H. B., & Bharadi, V. A, “Off-Line Signature Recognition Systems,” International Journal of Computer Applications, no. 27, pp. 61-70, 2010.
[2] U. Pal et al., “Signature-based biometric authentication,” in Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, pp. 285-314, 2014.
[3] K. S. Radhika, S. Gopika, “Online and Offline Signature Verification: A Combined Approach,” Procedia Computer Science, vol. 46, pp. 1593-1600, 2015.
[4] M. Saleem and B. Kovari, “Online signature verification using signature down-sampling and signer-dependent sampling frequency,” Neural Computing and Applications, pp. 1-13, 2021.
[5] Y. Zhou, J. Zheng, H. Hu, and Y. Wang, “Handwritten signature verification method based on improved combined features,” Applied Sciences, vol. 11, no. 13: 5867, 2021.
[6] Lu, J.; Qi, H.; Wu, X.; Zhang, C.; Tang, Q, “Research on Authentic Signature Identification Method Integrating Dynamic and Static Features,” Applied Sciences, vol. 12, no. 19: 9904, 2022.
[7] M. R. Pourshahabi, M. H. Sigari and H. R. Pourreza, “Offline Handwritten Signature Identification and Verification Using Contourlet Transform,“ International conference of soft computing and pattern recognition,Malacca, Malaysia, pp. 670-673, 2009.
[8] M.S. Shirdhonkar and M. Corker, “Offline Handwritten Signature Identification and Verification Using Multi-Resolution Gabor Wavelet”, International Journal of Biometrics and Bioinformatics (IJBB), vol. 5, no. 4, pp. 234-248, 201
[9] Zhang, B, “Offline signature verification and identification by hybrid features and Support Vector Machine,“ International Journal of Artificial Intelligence and Soft Computing, vol. 2, no. 4, pp. 302-320, 2011.
[10] Karouni, A., Daya, B., & Bahlak, S, “Offline signature recognition using neural networks approach,“ Procedia Computer Science, vol. 3, pp. 155-161, 2011.
[11] Sam S. M., Kamardin K., Sjarif N. N. A. and Mohamed N, “Offline signature verification using deep learning convolutional neural network (CNN) architectures GoogLeNet inception-v1 and inception-v3,“ Procedia Computer Science, vol. 161, pp. 475-483, 2019.
[12] Xiao, W.; Ding, Y, “A Two-Stage Siamese Network Model for Offline Handwritten Signature Verification,“ Symmetry, vol. 14, no. 6, p. 1216, 2022.
[13] T. Ojala, M. Pietikainen, and T. Maenpaa, “Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns,” in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, no. 7, pp. 971-987, 2002.
[14] Abu-Ain, W., Abdullah, S.N., Bataineh, B., Abu-Ain, T., & Omar, K.B, “Skeletonization Algorithm for Binary Images,“ Procedia Technology, vol. 11, pp. 704-709, 2013.
[15] Rakesh, G., & Rajpreet, K, “Skeletonization algorithm for numeral patterns,“ International Journal of Signal Processing, Image Processing and Pattern Recognition, vol. 1, no. 1, pp.63-72, 2008.
[16] Chattopadhyay, S., Manna, S., Bhattacharya, S., & Pal, U, “SURDS: Self-Supervised Attentionguided Reconstruction and Dual Triplet Loss for Writer Independent Offline Signature
Verification,“ 2022 26th International Conference on Pattern Recognition (ICPR), pp. 1600-1606,2022.
[17] L. G. Hafemann, R. Sabourin and L. S. Oliveira, “Offline handwritten signature verification - Literature review,“ 2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA), pp. 1-8, 2017.
[18] L. G. Hafemann, R. Sabourin and L. S. Oliveira, “Learning features for offline handwritten signature verification using deep convolutional neural networks,“ Pattern Recognition, vol. 70, pp. 163-176, 2017.
[19] Wen-ming, Z., Shao-fa, L., & Xian-gui, Z, “A hybrid scheme for off-line Chinese signature
verification,“ IEEE Conference on Cybernetics and Intelligent Systems, vol. 2, pp. 1402-1405, 2004.
[20] M. I. Malik, M. Liwicki, A. Dengel, “Evaluation of local and global features for offline signature
verification,” In Proceedings of the 1st International Workshop on Automated Forensic Handwriting
Analysis (AFHA), pp. 26-30, 2011.
[21] Wei, C., S. Lichun, et al., “Improved Zhang-Suen thinning algorithm in binary line drawing
applications,“ 2012 International Conference on Systems and Informatics (ICSAI2012), pp. 1947-1950, 2012.
[22] Németh, G., & Palágyi, K, “Topology preserving parallel thinning algorithms,“ International
Journal of Imaging Systems and Technology, vol. 21, pp. 37-41, 2011.
[23] Blum, Harry, “Biological shape and visual science (part I),” Journal of Theoretical Biology, vol.
38, pp. 205-287, 1973.
[24] Zhang, T. Y.; Suen, C. Y, “A fast parallel algorithm for thinning digital patterns,“ Communications of the ACM, vol. 27, no. 3, pp. 236-239, 1984.
[25] Guo, Z, and Hall, R W, “Parallel thinning with two-subiteration algorithms,“ Communications of the ACM, vol. 32, no. 3, pp. 359-373, 1989.
[26] Xing, E. P.; Ng, A. Y.; Jordan, M. I. & Russell, S. J, “Distance Metric Learning with Application to Clustering with Side-Information,“ Advances in Neural Information Processing Systems, vol. 15, pp. 505-512, 2002.
[27] Chopra, S., Hadsell, R., & LeCun, Y, “Learning a similarity metric discriminatively, with application to face verification,“ 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition(CVPR 2005), vol. 1, pp. 539-546, 2005.
[28] Wang, Jun et al. “Two-Stage Metric Learning,” Proceedings of the 31st International Conference on International Conference on Machine Learning, vol. 32, pp. 370-378, 2014.
[29] Z. Liu, P. Luo, X. Wang and X. Tang, “Deep Learning Face Attributes in the Wild,“ IEEE International Conference on Computer Vision (ICCV), Santiago, Chile, pp. 3730-3738, 2014.
[30] F. Schroff, D. Kalenichenko and J. Philbin, “FaceNet: A unified embedding for face recognition and clustering,“ IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, MA, USA, pp. 815-823, 2015.
[31] C.-H. Chen, M.-Y. Lin, and X.-C. Guo, “High-level modeling and synthesis of smart sensor networks for Industrial Internet of Things,” Comput. Electr. Eng, vol. 61, pp. 48-66, Jul. 2017.
[32] K. Yan et al, “Signature Detection, Restoration, and Verification: A Novel Chinese Document Signature Forgery Detection Benchmark,“ 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) , New Orleans, LA, USA, pp. 5159-5168, 2022.
[33] Andrew P. Bradley, “The use of the area under the ROC curve in the evaluation of machine learning algorithms,“ Pattern Recognition, vol. 30, pp. 1145-1159, July, 1997.
[34] Saito T, Rehmsmeier M, “The precision-recall plot is more informative than the ROC plot when
evaluating binary classifiers on imbalanced datasets,“ PLoS One, vol. 10, no. 3, Mar, 2015 |