Research Article

A Mobile Computing Method Using CNN and SR for Signature Authentication with Contour Damage and Light Distortion

Table 5

Signature authentication comparisons.

Segmentation algorithmError rateSegmentation effect

Maximum entropyModestBetter

Iterative methodMaximumOrdinary

MPT algorithmMinimumBest