Research Article
A Mobile Computing Method Using CNN and SR for Signature Authentication with Contour Damage and Light Distortion
Table 3
SIA algorithm for signature authentication.
| Input: | Training samples of the true signature images, testing samples of the signature images, and the given error parameter . |
| Output: | The recognition result for the unknown signature. |
| Step 1: | Filter each sample by using the proposed golden G-L filtering algorithm and obtain the sample set . |
| Step 2: | Segment each sample of using the developed MPT segmentation algorithm and obtain the sample set . |
| Step 3: | Design the CNN structure parameters as per Figure 3. |
| Step 4: | Build the CNN using the sample set and obtain the true signature feature images of and from the designed CNN. |
| Step 5: | Calculate the over-complete dictionary and the sparse coefficient nonzero solutions N by using and . |
| Step 6: | Reconstruct the true signature template . |
| Step 7: | Reconstruct the unknown signature using the same method as the true signature template SR. |
| Step 8: | If , then the test signature is classified as true. Otherwise, the test signature is classified as false. |
|
|