News
In this study, we introduced a hybrid method for extracting features from signature images, wherein a Convolutional Neural Network (CNN) and Histogram of Oriented Gradients (HOG) were used, followed ...
Handwritten Signature verification is an important personal identification. It is widely used in authorizing a cheque or legal documents. Signature verification is either online (dynamic) or offline ...
To address the shortcomings of classical chaotic time series in image encryption algorithms in terms of low complexity, fewer control parameters, and limited range of value domains, this paper ...
This article describes the application of customized proof techniques for proving theorems related to arithmetic circuits in the Coq theorem prover and generating Verilog code from Coq. By ...
In this paper, we proposed a method for feature extraction in online signature verification. We first used signature coordinate points and pen pressure of all signatures, which are available in the ...
With advances in technology, the complexity of functionality implemented in integrated circuits are on the rise. One of the most challenging aspects associated with complex functionality is the ...
This paper studies offline handwritten signature verification and the authenticity of a given signature. The research in this paper develops and compares two algorithms that predict forgery and ...
This paper proposes a Cascade R-CNN steel defect detection method based on improved multi head attention mechanism and dynamic multi-stage loss reweighting, and validates it on the Northeastern ...
The expanded popularity of computerized media has raised genuine worries over its security related issues. Security attacks through listening in, disguising and altering and in numerous different ...
With the rising need for secure authentication and data protection, this paper proposes a multi-layered security framework integrating biometric authentication, encryption, and covert communication.
To address the problems of relying on electronic repositories and being vulnerable to network influence in obtaining key information of literature in mainstream literature management software, an ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results