Research Article
A Mobile Computing Method Using CNN and SR for Signature Authentication with Contour Damage and Light Distortion
Figure 5
Experimental result comparisons of traditional methods and developed methods: (a) the filtering and (b) the segmentation.
(a) |
(b) |