Research Article

A Mobile Computing Method Using CNN and SR for Signature Authentication with Contour Damage and Light Distortion

Table 4

Signature authentication comparisons.

Filtering algorithmContour damage mendingFiltering result for signature

Mean filteringNoBetter

Medium filteringNoOrdinary

Gaussian filteringNoGood

G-L filteringYesBest