Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

IDENTIFICATION OF SIGNATURE COUNTERFEITS

View through CrossRef
The goal of the Identification of Signature Counterfeits project is to address the urgent problem of fraudulent signature replication in response to the current state of the digital world and the demands for secure authentication techniques. Robust verification procedures are needed since handwritten signatures are crucial in a variety of applications. It is crucial to confirm that a signature comes from the person who intended it to. Because of all the variations, there is very little chance that two signatures are exactly the same, even if they are created by the same person. The fluctuation of several signature traits makes the process of detecting forgeries more difficult. As such, identifying forged signatures is a significant difficulty for authentication procedures. INDEX TERMS—Signature, Counterfeits, Siamese, fraud, genuine.
Title: IDENTIFICATION OF SIGNATURE COUNTERFEITS
Description:
The goal of the Identification of Signature Counterfeits project is to address the urgent problem of fraudulent signature replication in response to the current state of the digital world and the demands for secure authentication techniques.
Robust verification procedures are needed since handwritten signatures are crucial in a variety of applications.
It is crucial to confirm that a signature comes from the person who intended it to.
Because of all the variations, there is very little chance that two signatures are exactly the same, even if they are created by the same person.
The fluctuation of several signature traits makes the process of detecting forgeries more difficult.
As such, identifying forged signatures is a significant difficulty for authentication procedures.
INDEX TERMS—Signature, Counterfeits, Siamese, fraud, genuine.

Related Results

A Practical Way to Limit Counterfeits
A Practical Way to Limit Counterfeits
ABSTRACT The traditional methods of addressing the risk of counterfeits have been viewed as purely a cost to the business that was better than the alternatives. H...
Impact of consumer Attitude towards purchase intention of the counterfeit products: a multigroup analysis between the user and non-user
Impact of consumer Attitude towards purchase intention of the counterfeit products: a multigroup analysis between the user and non-user
The purpose of this study was to investigate the factors which influence a consumer’s decision to buy counterfeit products. The factors are Attitude towards counterfeits by econom...
A Novel Method for Developing Post-quantum Digital Signature Algorithms on Non-commutative Associative Algebras
A Novel Method for Developing Post-quantum Digital Signature Algorithms on Non-commutative Associative Algebras
Introduction: Development of practical post-quantum signature algorithms is a current challenge in the area of cryptography. Recently, several candidates on post-quantum signature ...
Diffusing the boundaries between luxury and counterfeits
Diffusing the boundaries between luxury and counterfeits
PurposeThe aim of this study is to deepen the understanding of luxury consumption by comparing the meanings and the attributes of counterfeit branded products and luxury goods.Desi...
Elderly Signature Identification Using HOG Method and K-Nearest Neighbors Classifier
Elderly Signature Identification Using HOG Method and K-Nearest Neighbors Classifier
Signature is used to legally approve an agreement, treaty, and state administrative activities. Identification of the signature is needed to ensure the ownership of a signature so ...
A post-quantum digital signature scheme on groups with four-dimensional cyclicity
A post-quantum digital signature scheme on groups with four-dimensional cyclicity
Introduction: Development of practical post-quantum signature schemes is a current challenge in the applied cryptography. Recently, several different forms of the hidden discrete l...

Back to Top