Research Article

A Mobile Computing Method Using CNN and SR for Signature Authentication with Contour Damage and Light Distortion

Figure 5

Experimental result comparisons of traditional methods and developed methods: (a) the filtering and (b) the segmentation.
(a)
(b)