Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014, Article ID 324645, 12 pages
http://dx.doi.org/10.1155/2014/324645
Research Article

An Immune Clonal Selection Algorithm for Synthetic Signature Generation

State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210023, China

Received 14 March 2014; Accepted 18 May 2014; Published 2 June 2014

Academic Editor: Erik Cuevas

Copyright © 2014 Mofei Song and Zhengxing Sun. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. K. R. Radhika, G. N. Sekhar, and M. K. Venkatesha, “Pattern recognition techniques in on-line hand written signature verification: a survey,” in Proceedings of the International Conference on Multimedia Computing and Systems (ICMCS '09), pp. 216–221, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  2. K. Barkoula, G. Economou, and S. Fotopoulos, “Online signature verification based on signatures turning angle representation using longest common subsequence matching,” International Journal on Document Analysis and Recognition, vol. 16, no. 3, pp. 261–272, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. M. Parodi and J. C. Gómez, “Legendre polynomials based feature extraction for online signature verification: consistency analysis of feature combinations,” Pattern Recognition, vol. 47, no. 1, pp. 128–140, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. M. A. Ferrer, M. Diaz-Cabrera, and A. Morales, “Synthetic off-line signature image generation,” in Proceedings of the International Conference on Biometrics (ICB '13), pp. 1–7, 2013.
  5. C. Rabasse, R. M. Guest, and M. C. Fairhurst, “A new method for the synthesis of signature data with natural variability,” IEEE Transactions on Systems, Man, and Cybernetics B: Cybernetics, vol. 38, no. 3, pp. 691–699, 2008. View at Publisher · View at Google Scholar · View at Scopus
  6. J. Galbally, R. Plamondon, J. Fierrez, and J. Ortega-Garcia, “Synthetic on-line signature generation. Part I: methodology and algorithms,” Pattern Recognition, vol. 45, no. 7, pp. 2610–2621, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Galbally, J. Fierrez, M. Martinez-Diaz, and J. Ortega-Garcia, “Improving the enrollment in dynamic signature verification with synthetic samples,” in Proceedings of the 10th International Conference on Document Analysis and Recognition (ICDAR '09), pp. 1295–1299, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. M. Djioua, C. O'Reilly, and R. Plamondon, “An interactive trajectory synthesizer to study outlier patterns in handwriting recognition and signature verification,” in Proceedings of the 18th International Conference on Pattern Recognition (ICPR '06), vol. 1, pp. 1124–1127, August 2006. View at Publisher · View at Google Scholar · View at Scopus
  9. C. Oliveira, C. A. Kaestner, F. Bortolozzi, and R. Sabourin, “Generation of signatures by deformations,” in Advances in Document Image Analysis, N. A. Murshed and F. Bortolozzi, Eds., vol. 1339 of Lecture Notes in Computer Science, pp. 283–298, Springer, Berlin, Germany, 1997. View at Google Scholar
  10. C. Rabasse, R. M. Guest, and M. C. Fairhurst, “A method for the synthesis of dynamic biometric signature data,” in Proceedings of the 9th International Conference on Document Analysis and Recognition (ICDAR '07), vol. 1, pp. 168–172, September 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. L. Ballard, D. Lopresti, and F. Monrose, “Forgery quality and its implications for behavioral biometric security,” IEEE Transactions on Systems, Man, and Cybernetics B: Cybernetics, vol. 37, no. 5, pp. 1107–1118, 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. B. Fang and Y. Y. Tang, “Improved class statistics estimation for sparse data problems in offline signature verification,” IEEE Transactions on Systems, Man and Cybernetics C: Applications and Reviews, vol. 35, no. 3, pp. 276–286, 2005. View at Publisher · View at Google Scholar · View at Scopus
  13. L. N. de Castro and F. J. von Zuben, “Learning and optimization using the clonal selection principle,” IEEE Transactions on Evolutionary Computation, vol. 6, no. 3, pp. 239–251, 2002. View at Publisher · View at Google Scholar · View at Scopus
  14. S. Forrest, L. Allen, A. S. Perelson, and R. Cherukuri, “Self-nonself discrimination in a computer,” in Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 202–212, May 1994. View at Scopus
  15. T. Li, “An immunity based network security risk estimation,” Science in China F: Information Sciences, vol. 48, no. 5, pp. 557–578, 2005. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  16. U. Aickelin, J. Greensmith, and J. Twycross, “Immune system approaches to intrusion detection: a review,” in Artificial Immune Systems, G. Nicosia, V. Cutello, P. J. Bentley, and J. Timmis, Eds., vol. 3239 of Lecture Notes in Computer Science, pp. 316–329, Springer, Berlin, Germany, 2004. View at Google Scholar
  17. W. Zheng, D. Qi, K. Xu, and H. Han, “A rapid r-continuous bits matching algorithm for large-scale immunocomputing,” in Proceedings of the International Conference on Computer Science and Software Engineering (CSSE '08), vol. 1, pp. 431–434, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  18. Z. X. Sun, B. Yuan, and J. Yin, “Online composite sketchy shape recognition using dynamic programming,” in Graphics Recognition. Ten Years Review and Future Perspectives, W. Liu and J. Llads, Eds., vol. 3926 of Lecture Notes in Computer Science, pp. 255–266, Springer, Berlin, Germany, 2006. View at Google Scholar
  19. D. Y. Yeung, H. Chang, Y. Xiong et al., “Svc2004: first international signature verification competition,” in Biometric Authentication, D. Zhang and A. K. Jain, Eds., vol. 3072 of Lecture Notes in Computer Science, pp. 16–22, Springer, Berlin, Germany, 2004. View at Google Scholar
  20. J. Fierrez, J. Ortega-Garcia, D. Ramos, and J. Gonzalez-Rodriguez, “HMM-based on-line signature verification: feature extraction and signature modeling,” Pattern Recognition Letters, vol. 28, no. 16, pp. 2325–2334, 2007. View at Publisher · View at Google Scholar · View at Scopus