期刊文献+

基于遗传算法的离线签名鉴定 被引量:1

Off-line signature verification based on genetic algorithm
下载PDF
导出
摘要 提出一种基于遗传算法的离线签名鉴定方法。将签名图像分成多个子区域,提取各区域的分形维数矢量来描述笔迹的抖动程度,在此基础上,以形状特征、伪动态特征、分形维数作为签名的特征;运用加权欧式距离法构建分类器,并运用遗传算法对不同人的签名样本进行最优阈值选择。实验结果表明该方法能够取得较高的鉴别率。 A method of off-line signature verification based on genetic algorithm is proposed.An image is divided into many small regions to descript the jitter level and then fractal features of each region are calculated.The shape features,pseudo dynamic features and fractal features have been extracted in feature extraction.In particular,we utilize weighted euclidean distance for classification and genetic algorithm is used to find out the optimal threshold for different writers.The experiment result shows that the approach is effective and has encouraged the performance of the verification.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第35期171-173,178,共4页 Computer Engineering and Applications
基金 国家自然科学基金No.79816101~~
关键词 签名鉴定 特征提取 遗传算法 最优阈值 signature verification feature extraction genetic algorithm optimal threshold
  • 相关文献

参考文献7

  • 1Plamondon R,Lorette G.Automatic signature verification and writer identification the state of the art[J].Patten Recognition, 1989,22: 107-131.
  • 2Leelerc F,Plamundon R.Automatic signature verification the state of the art 1989-1993[J].International Journal of Pattern Recognition and Artifical Intelligence,1994,8:409-418.
  • 3Lin Jun,Li Jie-gu.Off-line Chinese signature verification[C]//Pro of International Conference on Image, 1996,1 (2) :205-207.
  • 4柯晶,乔谊正,赵宏.脱机中文签名鉴定系统[J].计算机系统应用,1999,8(2):7-10. 被引量:3
  • 5张济忠.分形[M].5版.北京:清华大学出版社.2005.
  • 6唐晓衡,夏利民.基于Boosting模糊分类的入侵检测[J].计算机工程,2008,34(5):225-227. 被引量:1
  • 7Cha S H,Tappert C C.Automatic detection of handwriting forgery[C]// Proceedings of the 8th International Workshop on Frontiers in Handwriting Recogition, 2002.

二级参考文献11

  • 1陈爱斌,夏利民.基于Boosting算法的入侵检测[J].计算机工程,2004,30(11):98-100. 被引量:1
  • 2张忻中.汉字识别技术[M].清华大学出版社,1992..
  • 3Qi Y,Pattern Recognition,1994年,27卷,12期,1621页
  • 4张忻中,汉字识别技术,1992年,107页
  • 5Anderson J E Computer Security Threat Monitoring and Surveillance[R]. James E Anderson Company, 1980-04.
  • 6Han Sangjun, Cho Sungbae. Detecting Intrusion with Rule-based Integration of Multiple Models[J]. Computers & Security, 2003, 22(7): 613-623.
  • 7Gonzailez A, Perez R. Completeness and Consistency Conditions for Learning Fuzzy Rules[J]. Fuzzy Sets and Systems, 1998, 96(1): 37-51.
  • 8KDD99. KDD99 Cup Dataset[Z]. [2006-10-10]. http://kdd.ics.uci. edu/databases/kddcup99/kddcup99.html.
  • 9柯晶,乔谊正.联机中文签名鉴定的一种局部弹性匹配方法[J].中文信息学报,1998,12(1):57-63. 被引量:4
  • 10夏利民,戴汝为.基于Boosting模糊分类的滚动轴承故障诊断[J].模式识别与人工智能,2003,16(3):323-327. 被引量:14

共引文献2

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部