Research Article

Offline Signature Authentication Algorithm Based on the Fuzzy Set

Figure 3

The flowchart of signature authentication.