Academic literature on the topic 'Writer authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Writer authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Writer authentication"
Journal, Baghdad Science. "The Writer Authentication by Using Syllables Frequency." Baghdad Science Journal 5, no. 2 (2008): 318–23. http://dx.doi.org/10.21123/bsj.5.2.318-323.
Full textSheikh, Aida, and Hassan Khotanlou. "Writer Identity Recognition and Confirmation Using Persian Handwritten Texts." International Journal of Advances in Applied Sciences 6, no. 2 (2017): 98. http://dx.doi.org/10.11591/ijaas.v6.i2.pp98-105.
Full textGuo, Wen Zhuo. "An Optimized RFID Unidirectional Authentication Method." Applied Mechanics and Materials 490-491 (January 2014): 1734–38. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1734.
Full textFang, Lei, Xue Rao, Ling Li, and Huan Li. "A RFID-Based Security Authentication System Model for Electric Vehicle Charging Station." Applied Mechanics and Materials 741 (March 2015): 623–28. http://dx.doi.org/10.4028/www.scientific.net/amm.741.623.
Full textKamal, Parves, Faisal Rahman, and Saad Mustafiz. "A Robust Authentication System Handwritten Documents using Local Features for Writer Identification." Journal of Computing Science and Engineering 8, no. 1 (2014): 11–16. http://dx.doi.org/10.5626/jcse.2014.8.1.11.
Full textKumari, Kamlesh, and Sanjeev Rana. "A Robust Approach to Authentication of Handwritten Signature Using Voting Classifier." Journal of Computational and Theoretical Nanoscience 17, no. 9 (2020): 4654–59. http://dx.doi.org/10.1166/jctn.2020.9294.
Full textKerniakevych-Tanasiichuk, Yuliia V., Viktor S. Sezonov, Iryna M. Nychytailo, Maryna A. Savchuk, and Iryna V. Tsareva. "Problems of forensic identification of handwriting in forensic examination." Journal of the National Academy of Legal Sciences of Ukraine 28, no. 1 (2021): 195–204. http://dx.doi.org/10.37635/jnalsu.28(1).2021.195-204.
Full textKurowski, Mariusz, Andrzej Sroczyński, Georgis Bogdanis, and Andrzej Czyżewski. "An Automated Method for Biometric Handwritten Signature Authentication Employing Neural Networks." Electronics 10, no. 4 (2021): 456. http://dx.doi.org/10.3390/electronics10040456.
Full textKutzner, Tobias, Carlos Pazmiño-Zapatier, Matthias Gebhard, Ingrid Bönninger, Wolf-Dietrich Plath, and Carlos Travieso. "Writer Identification Using Handwritten Cursive Texts and Single Character Words." Electronics 8, no. 4 (2019): 391. http://dx.doi.org/10.3390/electronics8040391.
Full textBegum, Nasima, Md Azim Hossain Akash, Sayma Rahman, Jungpil Shin, Md Rashedul Islam, and Md Ezharul Islam. "User Authentication Based on Handwriting Analysis of Pen-Tablet Sensor Data Using Optimal Feature Selection Model." Future Internet 13, no. 9 (2021): 231. http://dx.doi.org/10.3390/fi13090231.
Full textDissertations / Theses on the topic "Writer authentication"
Hagström, Adrian, and Rustam Stanikzai. "Writer identification using semi-supervised GAN and LSR method on offline block characters." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-43316.
Full textOlander, Sahlén Simon. "Feature Analysis in Online Signature Verification on Digital Whiteboard : An analysis on the performance of handwritten signature authentication using local and global features with Hidden Markov models." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-224661.
Full textBengtsson, Johnny. "Forensisk hårddiskkloning och undersökning av hårddiskskrivskydd." Thesis, Linköping University, Department of Science and Technology, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2378.
Full textBooks on the topic "Writer authentication"
French, Derek. 19. Acting for a company: agency and attribution. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198815105.003.0019.
Full textHinton, David A. Symbols of Power. Edited by Christopher Gerrard and Alejandra Gutiérrez. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780198744719.013.59.
Full textFrench, Derek, Stephen W. Mayson, and Christopher L. Ryan. 19. Acting for a company: agency and attribution. Oxford University Press, 2016. http://dx.doi.org/10.1093/he/9780198778301.003.0019.
Full textBook chapters on the topic "Writer authentication"
Yu, Kun, Yunhong Wang, and Tieniu Tan. "Writer Identification Using Dynamic Features." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_70.
Full textTapiador, Marino, and Juan A. Sigüenza. "Writer Identification Method Based on Forensic Knowledge." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_76.
Full textHangai, Seiichiro, and Takeshi Higuchi. "Writer Identification Using Finger-Bend in Writing Signature." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25976-3_21.
Full textMeng, Ming, ZhongCheng Wu, Ping Fang, YunJian Ge, and Yong Yu. "On-line Writer Verification Using Force Features of Basic Strokes." In Advances in Biometric Person Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30548-4_74.
Full textJin, Wenfeng, Yunhong Wang, and Tieniu Tan. "Text-Independent Writer Identification Based on Fusion of Dynamic and Static Features." In Advances in Biometric Person Authentication. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11569947_25.
Full textBrouillette, Sarah. "Zulfikar Ghose and Cosmopolitan Authentication." In Postcolonial Writers in the Global Literary Marketplace. Palgrave Macmillan UK, 2007. http://dx.doi.org/10.1057/9780230288171_6.
Full textAl-Hamad, Abu Malik Shayba. "Jumbled Words and Authentication for the Important Period Prior to Shaykh Al-Shekawi’s Allegiance Which Made the Umma Happy." In The Boko Haram Reader. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190908300.003.0064.
Full textAyoade, John, and Judith Symonds. "An Evaluation of the RFID Security Benefits of the APF System." In Emerging Pervasive and Ubiquitous Aspects of Information Systems. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-487-5.ch003.
Full textAyoade, John, and Judith Symonds. "An Evaluation of the RFID Security Benefits of the APF System." In Ubiquitous and Pervasive Computing. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-960-1.ch085.
Full textYahya Ebrahim, Anwar, and Hoshang Kolivand. "New Attributes Extraction System for Arabic Autograph as Genuine and Forged through a Classification Techniques." In Pattern Recognition [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.96561.
Full textConference papers on the topic "Writer authentication"
Yu, Kun, Yunhong Wang, and Tieniu Tan. "Writer authentication based on the analysis of strokes." In Defense and Security, edited by Anil K. Jain and Nalini K. Ratha. SPIE, 2004. http://dx.doi.org/10.1117/12.541917.
Full textAl-Shamaileh, Mohammad Z., Ahmad B. Hassanat, Ahmad S. Tarawneh, M. Sohel Rahman, Ceyhun Celik, and Moohanad Jawthari. "New Online/Offline text-dependent Arabic Handwriting dataset for Writer Authentication and Identification." In 2019 10th International Conference on Information and Communication Systems (ICICS). IEEE, 2019. http://dx.doi.org/10.1109/iacs.2019.8809080.
Full textRenuka R, Suganya V, and Arun Kumar B. "Online hand written character recognition using Digital Pen for static authentication." In 2014 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2014. http://dx.doi.org/10.1109/iccci.2014.6921792.
Full textRadhika, K. R., G. N. Sekhar, and M. K. Venkatesha. "Server-side reconstruction trajectory generation methods for hand written objects authentication - A comparative review." In 2009 International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2009. http://dx.doi.org/10.1109/mmcs.2009.5256700.
Full textYang, Jianguo, Xing Li, Tao Wang, et al. "A Physically Unclonable Function with BER < 0.35% for Secure Chip Authentication Using Write Speed Variation of RRAM." In 48th European Solid-State Device Research Conference (ESSDERC 2018). IEEE, 2018. http://dx.doi.org/10.1109/essderc.2018.8486888.
Full text