Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Signature" wg kryterium: Temat


Tytuł:
An algorithm for the evolutionary-fuzzy generation of on-line signature hybrid descriptors
Autorzy:
Zalasiński, Marcin
Cpałka, Krzysztof
Laskowski, Łukasz
Wunsch II, Donald C.
Przybyszewski, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/1837539.pdf
Data publikacji:
2020
Wydawca:
Społeczna Akademia Nauk w Łodzi. Polskie Towarzystwo Sieci Neuronowych
Tematy:
biometrics
on-line signature
dynamic signature
dynamic signature verification
evolutionary-fuzzy signature partitioning
horizontal partitioning
vertical partitioning
Opis:
In biometrics, methods which are able to precisely adapt to the biometric features of users are much sought after. They use various methods of artificial intelligence, in particular methods from the group of soft computing. In this paper, we focus on on-line signature verification. Such signatures are complex objects described not only by the shape but also by the dynamics of the signing process. In standard devices used for signature acquisition (with an LCD touch screen) this dynamics may include pen velocity, but sometimes other types of signals are also available, e.g. pen pressure on the screen surface (e.g. in graphic tablets), the angle between the pen and the screen surface, etc. The precision of the on-line signature dynamics processing has been a motivational springboard for developing methods that use signature partitioning. Partitioning uses a well-known principle of decomposing the problem into smaller ones. In this paper, we propose a new partitioning algorithm that uses capabilities of the algorithms based on populations and fuzzy systems. Evolutionary-fuzzy partitioning eliminates the need to average dynamic waveforms in created partitions because it replaces them. Evolutionary separation of partitions results in a better matching of partitions with reference signatures, eliminates disproportions between the number of points describing dynamics in partitions, eliminates the impact of random values, separates partitions related to the signing stage and its dynamics (e.g. high and low velocity of signing, where high and low are imprecise-fuzzy concepts). The operation of the presented algorithm has been tested using the well-known BioSecure DS2 database of real dynamic signatures.
Źródło:
Journal of Artificial Intelligence and Soft Computing Research; 2020, 10, 3; 173-187
2083-2567
2449-6499
Pojawia się w:
Journal of Artificial Intelligence and Soft Computing Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Safe Electronic Signature in Administrative Proceedings
Autorzy:
Samulska, Katarzyna
Powiązania:
https://bibliotekanauki.pl/articles/956494.pdf
Data publikacji:
2018
Wydawca:
Akademia im. Jakuba z Paradyża w Gorzowie Wielkopolskim
Tematy:
electronic signature
secure electronic signature
modern technologies
digitalization
computerization
Opis:
This article explains some of the important issue of electronic signature. Discussed are the dynamic changes in the use of electronic signature, the introduction of its various types, as well as its significance and consequences under European Union legislation and as a consequence of Polish legislation, and its current legal status and context. Various types of electronic signatures are described, with a particular emphasis on qualified electronic signatures.
Źródło:
Studia Administracji i Bezpieczeństwa; 2018, 5; 95-106
2543-6961
Pojawia się w:
Studia Administracji i Bezpieczeństwa
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Preprocessing Techniques for Online Signature Verification and Identification
Metody wstępnego przetwarzania dla weryfikacji i identyfikacji podpisu dynamicznego
Autorzy:
Pień, A.
AdamskI, M.
Powiązania:
https://bibliotekanauki.pl/articles/88406.pdf
Data publikacji:
2018
Wydawca:
Politechnika Białostocka. Oficyna Wydawnicza Politechniki Białostockiej
Tematy:
podpis dynamiczny
wstępne przetwarzanie
identyfikacja
online signature
signature preprocessing
identification
Opis:
Handwritten signature is a behavioral biometric that can be used for automatic signer verification and identification. Online signature, in addition to visual shape, incorporates dynamics of the writing process such as trajectory, velocity and additional characteristics such as pen pressure and angles. While there are many approaches to online signature verification proposed in the literature, only few works related to preprocessing and its effect on the system performance. In this work selected preprocessing techniques were investigated such as: normalization, noise filtering and resampling. The evaluation was carried out in verification and identification tasks based on DTW distance measure and signatures from SVC2004 database.
Podpis odręczny jest behawioralną cechą biometryczną która umożliwia automatyczną weryfikację i identyfikację autora podpisu. Podpis dynamiczny, oprócz informacji o kształcie, zawiera również dane dotyczące dynamiki składania podpisu takie jak trajektoria kreślenia, prędkość, zmiana nacisku i kątów nachylenia pióra. W literaturze można znaleźć wiele podejść do automatycznej weryfikacji podpisu, brakuje jednak prac z szerszą analizą metod wstępnego przetwarzania i oceną ich wpływu na poprawność pracy całego systemu. W niniejszej pracy zbadano wybrane techniki wstępnego przetwarzania takie jak: normalizacja, filtracja, próbkowanie oraz oceniono ich użyteczność w procesie weryfikacji i identyfikacji podpisu. W badaniach wykorzystano system bazujący na mierze odległości Dynamic Time Warping. Eksperymenty przeprowadzono na podpisach dynamicznych z bazy SVC2004.
Źródło:
Advances in Computer Science Research; 2018, 14; 163-176
2300-715X
Pojawia się w:
Advances in Computer Science Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Hidden Signature for DTW Signature Verification in Authorizing Payment Transactions
Autorzy:
Putz-Leszczyńska, J.
Kudelski, M.
Powiązania:
https://bibliotekanauki.pl/articles/308543.pdf
Data publikacji:
2010
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
dynamic time warping
hidden signature
payment transactions
signature verification
Opis:
Traditional use of dynamic time warping for signature verification consists of forming some dissimilarity measure between the signature in question and a set of "template signatures". In this paper, we propose to replace this set with the hidden signature and use it to calculate the normalized errors of signature under verification. The approach was tested on the MCYT database, using both genuine signatures and skilled forgeries. Moreover, we present the real-world application of the proposed algorithm, namely the complete biometric system for authorizing payment transactions. The authorization is performed directly at a point of sale by the automatic signature verification system based on the hidden signature.
Źródło:
Journal of Telecommunications and Information Technology; 2010, 4; 59-67
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Offline signature identification and verification using noniterative shape context algorithm
Autorzy:
Adamski, M.
Saeed, K.
Powiązania:
https://bibliotekanauki.pl/articles/333019.pdf
Data publikacji:
2009
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
weryfikacja podpisu
offline signature verification (SV)
signature identification
shape context method
Opis:
The paper presents experimental results on offline signature identification and verification. At the first stage of the presented system, the binary image of the signature undergoes skeletonization process using KMM algorithm to have a thinned, one pixel-wide line, to which a further reduction is applied. For each thinned signature image a fixed number of points comprising the skeleton line are selected. The recognition process is based on comparing the reference signatures with the questioned samples using distance measure computed by means of Shape Context algorithm. The experiments were carried out using a database containing signatures of 20 individuals. For the verification process random forgeries were used to asses the system error. The main advantage of the presented approach lies in utilizing only one reference signature for both identification and verification tasks, whereas the achieved results are comparable with respect to the systems that use several training samples per subject.
Źródło:
Journal of Medical Informatics & Technologies; 2009, 13; 47-52
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Lightweight digital signature with secretly embedded warning
Autorzy:
Kutyłowski, M.
Kubiak, P.
Powiązania:
https://bibliotekanauki.pl/articles/205577.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
coercion
digital signature
kleptography
funkspiel
Opis:
We show how a signatory can indicate coercion by embedding a secret message into the signature. Our scheme is practical and applies to standard signature schemes unlike the recent construction of Durnoga et al. (2013). The construction follows directly from kleptographic techniques due to Moti Yung and Adam Young.
Źródło:
Control and Cybernetics; 2013, 42, 4; 825-827
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Opis kolekcji pasów kontuszowych sporządzony przez Krystynę Potocką
Krystyna Potocka’s description of the collection of kontush sashes
Autorzy:
Biedrońska-Słota, Beata
Powiązania:
https://bibliotekanauki.pl/articles/1998215.pdf
Data publikacji:
2019
Wydawca:
Muzeum Pałacu Króla Jana III w Wilanowie
Tematy:
archive
inventory
collection
sashes
signature
Opis:
The Potocki of Krzeszowice Family Archive held in the National Archives in Krakow contains an inventory of kontush sashes compiled by Krystyna Potocka née Tyszkiewicz (1866-1952). The collection was created by Katarzyna Potocka née Branicka, the wife of Adam (1825-1907), for her son Andrzej. Many sashes came from family possessions; others were gifts from friends or purchases from antique dealers. The collection was first sketchily described by Katarzyna Potocka herself, and then in years 1898-1904 by Andrzej Potocki's wife Krystyna. It was she who compiled a kind of an inventory, with 133 entries written on 135 wide-lined pages of a notebook, one page dedicated to each sash. The description accurately depicts characteristic features of the items, with notes on their size, make, colours, decoration and the state of preservation. Signatures have been meticulously copied and some entries are even accompanied by drawings of the most interesting details, placed besides the signatures.
Źródło:
Studia Wilanowskie; 2019, XXVI; 305-324
0137-7329
2720-0116
Pojawia się w:
Studia Wilanowskie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wykorzystanie internetu w prowadzeniu dzialalnosci gospodarczej w sektorze MSP
EFFECTIVE USE OF THE INTERNET BY THE SME SECTOR
Autorzy:
Dagmara, Wach
Powiązania:
https://bibliotekanauki.pl/articles/419253.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Gdański. Wydział Ekonomiczny
Tematy:
ELECTRONIC SIGNATURE
ONLINE ACCOUNTING
SME SECTOR
Opis:
This article is a part of series of publications on the effective use of the Internet in business activity by Small and Medium Enterprises (SME). This publication describes the issues that entrepreneurs face in the early stages of company development, like business registration, bookkeeping, billing, tax office, ZUS (social insurance) and other entities of public administration in Poland.
Źródło:
Współczesna Gospodarka; 2012, 3, 2; 1-8
2082-677X
Pojawia się w:
Współczesna Gospodarka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ID-based, Proxy, Threshold Signature Scheme
Autorzy:
Pomykała, Jacek
Kułakowski, Henryk
Sapiecha, Piotr
Grela, Błażej
Powiązania:
https://bibliotekanauki.pl/articles/1844644.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
ID-based
proxy
threshold
signature
scheme
Opis:
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. The description of the system architecture and the possible application of the protocol in edge computing designs is enclosed.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 2; 201-205
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Using Character Strengths to Address English Writing Anxiety
Autorzy:
Gregersen, Tammy
MacIntyre, Peter D.
Buck, Rachel
Powiązania:
https://bibliotekanauki.pl/articles/1371429.pdf
Data publikacji:
2021-07-09
Wydawca:
Wydawnictwo Uniwersytetu Śląskiego
Tematy:
signature strengths
writing anxiety
positive psychology
Opis:
Positive psychology has been introduced to the applied linguistics literature with the broad goal of improving the experience of language learners and teachers through a variety of interventions (MacIntyre & Mercer, 2014; Gabryś-Barker & Gałajda, 2016). “The aim of positive psychology is to catalyze a change in psychology from preoccupation only with repairing the worst things in life to also building the best qualities in life” (Seligman &Csikszentmihalyi, 2000, p. 5). One significant contribution of this young field has been a series of empirically-tested positive psychology interventions (PPIs) that have been shown to increase positive emotion, reduce distress, and/or improve well-being (Seligman, Steen, Park, & Peterson, 2005; Sin & Lyubormirsky, 2009). In the present research, we examine one application of a PPI involving a focus on using character strengths as a way to address language anxiety. Through a case study analysis, we demonstrate the ways that this intervention was beneficial for the student.             
Źródło:
Theory and Practice of Second Language Acquisition; 2021, 7, 2; 11-35
2450-5455
2451-2125
Pojawia się w:
Theory and Practice of Second Language Acquisition
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A new strong multiple designated verifiers signature for broadcast propagation
Autorzy:
Tian, H.
Liu, Y.
Powiązania:
https://bibliotekanauki.pl/articles/206230.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
designated verifier signature
asymmetric group key agreement protocol
signature scheme of Schnorr
broadcast propagation
Opis:
A strong multiple designated verifiers signature (SMDVS) enables a signer to convince a set of verifiers by generating one signature, of which the verification needs a private key of a verifier. After a brief survey of current SMDVS schemes, we find no schemes suitable to a broadcast propagation, where the simulation needs only one verifier's private key. Motivated by this discovery, we propose a broadcast SMDVS scheme. The new scheme is proven secure in the random oracle model.
Źródło:
Control and Cybernetics; 2012, 41, 2; 297-315
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Content-based image retrieval using a signature graph and a self-organizing map
Autorzy:
Van, T. T.
Le, T. M.
Powiązania:
https://bibliotekanauki.pl/articles/330159.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
binary signature
similarity measure
signature graph
image retrieval
sygnatura binarna
miara podobieństwa
wyszukiwanie obrazu
Opis:
In order to effectively retrieve a large database of images, a method of creating an image retrieval system CBIR (content-based image retrieval) is applied based on a binary index which aims to describe features of an image object of interest. This index is called the binary signature and builds input data for the problem of matching similar images. To extract the object of interest, we propose an image segmentation method on the basis of low-level visual features including the color and texture of the image. These features are extracted at each block of the image by the discrete wavelet frame transform and the appropriate color space. On the basis of a segmented image, we create a binary signature to describe the location, color and shape of the objects of interest. In order to match similar images, we provide a similarity measure between the images based on binary signatures. Then, we present a CBIR model which combines a signature graph and a self-organizing map to cluster and store similar images. To illustrate the proposed method, experiments on image databases are reported, including COREL, Wang and MSRDI.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2016, 26, 2; 423-438
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Signature verification: A comprehensive study of the hidden signature method
Autorzy:
Putz-Leszczyńska, J.
Powiązania:
https://bibliotekanauki.pl/articles/331346.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
signature verification
online recognition
time warping
hidden signature
weryfikacja podpisu
rozpoznawanie online
podpis ukryty
Opis:
Many handwritten signature verification algorithms have been developed in order to distinguish between genuine signatures and forgeries. An important group of these methods is based on dynamic time warping (DTW). Traditional use of DTW for signature verification consists in forming a misalignment score between the verified signature and a set of template signatures. The right selection of template signatures has a big impact on that verification. In this article, we describe our proposition for replacing the template signatures with the hidden signature—an artificial signature which is created by minimizing the mean misalignment between itself and the signatures from the enrollment set. We present a few hidden signature estimation methods together with their comprehensive comparison. The hidden signature opens a number of new possibilities for signature analysis. We apply statistical properties of the hidden signature to normalize the error signal of the verified signature and to use the misalignment on the normalized errors as a verification basis. A result, we achieve satisfying error rates that allow creating an on-line system, ready for operating in a real-world environment.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2015, 25, 3; 659-674
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Instytucja ratyfikacji umów międzynarodowych i konsekwencje zmiany jej charakteru prawnego z perspektywy historycznej
The Ratification of International Treaties and the Consequences of the Change of its Legal Character from the Historical Perspective
Autorzy:
Szymański, Janusz
Powiązania:
https://bibliotekanauki.pl/articles/621668.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet w Białymstoku. Wydawnictwo Uniwersytetu w Białymstoku
Tematy:
treaty, ratification, signature, accession, Full Power
Opis:
In this article, the meaning and nature of ratification is discussed. It is shown that in early practice and doctrine, ratification was a confirmation that what had been signed had been duly and properly signed – an acknowledgment by a principal of the act of his agent. No doubt, this theory was not a strict acceptance of the doctrine of private law agency, even at a time when private law analogies were more freely accepted than they are today. For ratification of an act of an agent concluded within the limits of his authority is not strictly necessary in private law. But the difference is purely formal. In both cases – treaties and contracts made by agents – the signed document created obligations. In international law the document was not perfectly binding until a ratification was issued. It is, at any rate, clear that the private law analogy was valid in the seventeenth, and the greater part of the eighteenth, centuries to this extent: the duty to ratify – i.e. to acknowledge publicly the binding force of a signed treaty – was held not to apply when the agent had exceeded his instructions. This was the only generally recognized ground for refusing a ratification. The French and American Revolutions changed all this. They attempted to banish from public law the notion of absolute power. Indeed, for a short interval, as has been shown, the treaty– making power was vested in a national assembly – in France, the National Convention, in the United States, in Congress. But this was found impracticable, and in the United States the Senate reserved only the power to sanction and participate in the final act of ratification. When this deliberative element was introduced into the process of ratification, it became apparent that ratification could no longer be regarded as obligatory. An account of ratification in theory and in practice is incomplete without a study of the formal clauses in treaties with regard to the date of their coming into force. It is clear that, in many cases, ratification is dispensed with, either for reasons of expedition, or because ratification does not require any deliberation according to the constitutional practice of the States concerned. On the other hand, the development of the multipartite treaty caused signature or accession to supplant ratification, in the increasingly common case of States becoming parties to a treaty to which they are not original signatories. The very large number of constitutional texts prescribing a specific procedure for the conclusion of treaties, the changed character of ratification, and the existence in formal documents, and in treaties themselves, of clear stipulations as to satisfaction of constitutional requirements, it is impossible to ignore the relevance of such provisions in international law.
Źródło:
Miscellanea Historico-Iuridica; 2012, 11; 157-190
1732-9132
2719-9991
Pojawia się w:
Miscellanea Historico-Iuridica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On-line signature partitioning using a population based algorithm
Autorzy:
Zalasiński, Marcin
Łapa, Krystian
Cpałka, Krzysztof
Przybyszewski, Krzysztof
Yen, Gary G.
Powiązania:
https://bibliotekanauki.pl/articles/91729.pdf
Data publikacji:
2020
Wydawca:
Społeczna Akademia Nauk w Łodzi. Polskie Towarzystwo Sieci Neuronowych
Tematy:
on-line signature
biometrics
signature partitioning
population-based algorithm
podpis on-line
biometria
partycjonowanie sygnatur
algorytm populacyjny
Opis:
The on-line signature is a biometric attribute which can be used for identity verification. It is a very useful characteristic because it is commonly accepted in societies across the world. However, the verification process using this particular biometric feature is a rather difficult one. Researchers working on identity verification involving the on-line signature might face various problems, including the different discriminative power of signature descriptors, the problem of a large number of descriptors, the problem of descriptor generation, etc. However, population-based algorithms (PBAs) can prove very useful when resolving these problems. Hence, we propose a new method for on-line signature partitioning using a PBA in order to improve the verification process effectiveness. Our method uses the Differential Evolution algorithm with a properly defined evaluation function for creating the most characteristic partitions of the dynamic signature. We present simulation results of the proposed method for the BioSecure DS2 database distributed by the BioSecure Association.
Źródło:
Journal of Artificial Intelligence and Soft Computing Research; 2020, 10, 1; 5-13
2083-2567
2449-6499
Pojawia się w:
Journal of Artificial Intelligence and Soft Computing Research
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies