Research Article

A Mobile Computing Method Using CNN and SR for Signature Authentication with Contour Damage and Light Distortion

Table 6

Comparison of signature authentication algorithms.

Authentication algorithmAccuracyTime consumption

CNNHigherModest

RSModestShortest

SIA algorithmHighestShort