Research Article
A Mobile Computing Method Using CNN and SR for Signature Authentication with Contour Damage and Light Distortion
Table 4
Signature authentication comparisons.
| Filtering algorithm | Contour damage mending | Filtering result for signature |
| Mean filtering | No | Better |
| Medium filtering | No | Ordinary |
| Gaussian filtering | No | Good |
| G-L filtering | Yes | Best |
|
|