Research Article

A Mobile Computing Method Using CNN and SR for Signature Authentication with Contour Damage and Light Distortion

Figure 4

Original signature images: (a) true and (b) fake.
(a)
(b)