Journals
Publish with us
Publishing partnerships
About us
Blog
Wireless Communications and Mobile Computing
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Wireless Communications and Mobile Computing
/
2018
/
Article
/
Tab 6
/
Research Article
A Mobile Computing Method Using CNN and SR for Signature Authentication with Contour Damage and Light Distortion
Table 6
Comparison of signature authentication algorithms.
Authentication algorithm
Accuracy
Time consumption
CNN
Higher
Modest
RS
Modest
Shortest
SIA algorithm
Highest
Short