Research Article

Cubic Bezier Curve Approach for Automated Offline Signature Verification with Intrusion Identification

Table 1

Acceptance criteria based on threshold range.
(a)

SampleInput 1Input 2Input 3Input 4
928039.table.001a928039.table.001b928039.table.001c928039.table.001d

Start point match100%87%80%80%
Behavioral match100%90%45%45%
Start-end points match100%87.5%52%65%
Controlling points match 100%87.1%36%36%
Regional slope match100%70.6%44%44%
Controlling slope match100%85.4%20%20%
Slope distance match100%80.21%12%12%
ResultRejectedAcceptedRejectedRejected

(b)

Input 5Input 6Input 7Input 8Input 9Input 10
928039.table.001e928039.table.001f928039.table.001g928039.table.001h928039.table.001i928039.table.001j

55%85%15%52%78%14.3%
45%84%45.6%44%75%54.3%
58%88%45.8%55%77%15.4%
41%84%56.4%77.5%82%52.6%
52.4%86%88.5%8.5%79.5%45.6%
55.5%82%84.6%11.4%99%44.5%
98%77%55.2%13.5%75.8%100%
RejectedAcceptedRejectedRejectedAcceptedRejected