Research Article
A Mobile Computing Method Using CNN and SR for Signature Authentication with Contour Damage and Light Distortion
Table 5
Signature authentication comparisons.
| Segmentation algorithm | Error rate | Segmentation effect |
| Maximum entropy | Modest | Better |
| Iterative method | Maximum | Ordinary |
| MPT algorithm | Minimum | Best |
|
|