SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 384
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM
USING RELATIVE SLOPE METHOD
P.N .Ganorkar1
, Kalyani Pendke2
1
Mtech, 4th
Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra), India
2
Lecturer, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra), India
Abstract
In the era of growing technology, security is the major concern to avoid fakes and forgeries. There are various biometric
technique which help in personal identification, among those verification systems, one system is Signature Verification System,
Signature is a behavioral biometric.It is not based on figure print ,retina or any facial expression, according to the data available
in the input, signature verification split into two part: Online and Offline. It also referred as static and dynamic. Signature
verification also used to provide authentication to user. The main advantages of signature verification are that it used for e-
business which helps in banking applications. The proposed paper present slope based method to identify the signature using
various parameters like speed, time, pressure, movement of signature, accuracy and matching percentage of two signature etc.
Keywords: Segmentation, Hidden Marko Method, Support Vector Machine. Relative slope algorithm, signature
verification, Gaussian elimination algorithm,
-------------------------------------------------------------------***-------------------------------------------------------------------
1. INTRODUCTION
Human usually recognize each other by various ways like
their voice when we speak them, by their eyes when we
meet them. To achieve more reliable information for
verification and identification we should use something that
really recognize given person signature verification is one in
that .Signature verification techniques utilize many different
characteristics of an individual’s signature in order to
identify that individual. The advantages of using such an
authentication techniques are signatures are widely accepted
by society as a form of identification and verification.
Information required is not sensitive. [2] So, signature
verification is a very popular area for research now days.
Forging of one’s signature does not mean a long-life loss of
that one’s identity .The basic idea is to investigate a
signature verification technique which is not costly to
develop, is reliable even if the individual is under different
emotions, user friendly in terms of configuration. In
signature verification application, the signatures are
processed to extract features that are used for verification.
[1]There are two stages called enrolment and verification.
Two types of signature verification are offline and online
also called static and dynamic signature based on data
available in the input.
Offline signature (static): The input of offline signature
verification is the image of signature and is useful in
automatic verification signature found on bank check and
account.
Online (Dynamic): Signatures that are captured by data
acquisition devices like pressure-sensitive tablets and
webcam that extract dynamic features of a signature in
addition to its shape (static), and can be used in real time
applications like credit card transactions, protection of small
personal devices (e.g. PDA), authorization of computer
users for accessing sensitive data or programs, and
authentication of individuals for access to physical devices
or buildings. In the point of view of adaption in the market
place, signature verification presents three likely advantages
over other biometrics techniques. First nowadays it is a
socially accepted method already in use in banks and credit
card transaction. Second, it is useful for most of the new
generation of portable computers and personal digital
assistants (PDAs) use and writing as the main input channel.
Third, a signature may be changed by the user. Similarly to
a password while it is not possible to change finger prints
iris or retina patterns.
In this paper, section 2 present literature reviews of the
project .section 3 present proposed systems, proposed
architecture of the project. Section 4 represent methodology,
algorithm used, section 5 represent result/analysis of the
project ,section 6 represent conclusion and section 7 present
references for the project.
2. LITERATURE REVIEW
S.Srihari. K. M. Kalera. And A. XU [1], proposed a
system which represent Hidden Markov model is one of the
widely used models for sequence analysis in signature
verification techniques. Using optimized HMM we can
calculate the segment of the signature. It also gives less error
rate than other (18.4%).
H. S. Sridhar and M. Beall [2], suggested that It extracts
the set of feature representing the signature which provide
different sample from several sample. Second step is for NN
to learn the relationship between signature and its class
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 385
either genuine or forgery.The proposed system highly
suitable for global aspect of handwritten signature.
S.Srihari. K. M. Kalera. And A. XU [3], present a system
the gives idea about proposed method used two techniques
based on template matching. one of them is depend on the
optimal matching and the other based on the elastic
matching. The proposed system tested both the binary and
gray signature every time.
Martinez, L.E., Treviso, C.M, Alonso, J.B., and Ferrer,
M. [4] suggested that the proposed system uses global
directional and grid features of the signature and SVM for
classification and verification. Support vector machine used
various techniques like
Lcss-Global and Lcss-Local Lcss is nothing but local
common subsequence used to find the approximate value of
verified signature.
3. Proposed System
3.1 Proposed Approach
This project proposes a new algorithm for slop calculation
which uses digital pen input signature verification .The
algorithm considers writer’s signature in the form of slopes,
The working of process is like, the slope value of input
signature which is already present in the database and the
slope value of signature taken by the digital pen is match. If
the slope value match up to some approximation (i.e.
approximate value decided by user, like 8o%, 70%), then
the signature will be genuine otherwise forgery. In the
verification phase, the scheme computes a difference
between the slope value of signature which is already store
in database and the current slope value of the pen input.
Care needs to be taken in computing the different function
because the length of the input signature different from that
of the digital signature even if the signature is genuine. If
the computed difference does not exceed a threshold value,
the input signature is predicted to be genuine; otherwise it is
predicted to be forgery. System uses various parameters to
match both the signature. Like, threshold value, time of
signing, speed of signing, pen pressure etc. The system take
various stages to verify signature like data acquisition,
prepossessing, feature extraction, relative slope extraction,
two tier time metric extraction.
3.2 Proposed Architecture
Fig1: General Overview of System
4. METHODOLOGY
4.1 Modules
4.1.1 Database Module
The first database module used to sore and represent all the
slope value in the database form. In this module first system
takes the signature through digital pen and pad .This
signature get store in database with all the values like slope
value ,theta value ,vector in the form of matrix, Eigenvector
etc .System use dataset of vb.net to store the value.
4.1.2 Relative Slope Algorithm
In this module system calculate all the slope value of the
store signature. This module helps to calculate all the
parameters of the signature like pen pressure, threshold
value, time, speed etc of the signature. This algorithm use
optimized HMM method to calculate their values like slope
of line, perpendicular, intersection, centroid of the circle etc.
4.1.3 Comparison Module
This is the last module of the project .this module shows the
comparison between two images or signature done by the
pen in that first is already store signature and second is real
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 386
time signature.The comparison done by various parameter
like pen pressure, location, threshold value, speed and time
of the signature and if the both signature matches upto the
mark or upto particular percentage then signature is genuine
otherwise forgery.
4.2 Relative Slope Algorithm:
The proposed paper present relative slope method to provide
input signature through digital pen to identify a person is
genuine or Forgery based on their handwriting..Current
technology in signature verification uses various algorithm
for future point extraction like genetic algorithm, pattern
matching, Markova method, this project proposed slope
based method which divided a signature into various
segment using optimized HMM method, and slope of every
segment is calculated on based on previous segment and
gives approximate result.
Steps:
1) Preprocess and normalize the algorithm.
2) Divide the signature into segment using optimized HMM
method.
3) Based on requirement combine these segments into line
segment.
4) Calculate the relative slope value of each segment with
respect to previous segment.
5) Carry step (4) till all segment are processed else step (6).
6) Store the slope value of each segment which can be used
for verification.
7) End
Using relative slope algorithm we can minimize the time
and maintenance cost. For this purpose the system is
classified in below
1) Data Acquisition
2) Preprocessing
3) Feature Extraction
4) Relative slope Extraction
5) Tier time metric extraction
6) Signature alignment and enrollment
7) Verification
Fig 2 Here Si: =slope of segment i with respect to previous
segment i-1.
Example: The Fig. Shows the Part of Signature
1) Using optimize HMM we can calculate the segment of
the signature. Then segment can be combining to form a line
segment.
2) After the line segment are obtained the relative slope are
calculated.
3) Slope of line: S=dy/dx
Where: dx=x2-x1 dy= y2-y1
4) For the first segment we calculate the slope between the
starting point of the first segment and the ending point of the
last segment.
5) However, the for the further line segment the slope is
calculated based on the previous line segment
In the first step global time required to put the signature and
calculate.
6) The second step used to calculate the length of signature
completed in unit time for this two tier time metric
extraction algorithm is used.
7) And finally in verification step two level verification
algorithm used in first level of verification relative slope
value compare with previous value
8) And the second level extracts the global and local
features consisting of relative slope value, total length and
global time.
If the signature passes the second level of verification it
considered as genuine signature
4.3 Contribution
Before using the method, the accuracy and some parameters
like threshold value, pen pressure, speed, time of signature
was not up to the mark but after using new this method with
new concept and design method the project gives more
accuracy, threshold value ,pressure all are improved and
gives approximate or satisfied result of the project
5. RESULT/ANALYSIS
Fig 2: Screen Shot Of Original Sign Taken By Pen 1st
Time
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 387
Fig 3: Graph Shows Pressure applied by pen
The above graph shows the pressure when signature taken
by the pen 1st
time.
Fig 4: Graph shows XY movement applied by pen
The above graph shows the XY movement of pen when
signature taken by 1st
time by pen
Fig 5 Graph shows XY movement applied by pen
The above fig. xy movement of pen when signature taken
2nd
by the pen to compare it with 1st
Fig 6.Graph Shows The Pressure Appliied By Pen
The above graph shows the pressure applied by pen when
signature taken by pen 2nd
time for comparision.
Fig 7 Graph shows the comparison between old and new
signature
The above fig..shows the comparison between the two
signature taken by the pen .this graph gives the matching
percentage criteria between two signature and if two
signature matches more than 80% then the signature is valid
or the signature of the person is guanine and if not then
forgery
Fig 8 Messagebox Shows The Matching Criteria Between
Two Signature
The above fig shows the message box which gives the
matching percentage between two signatures. The above
signature matches upto 98% means it is genuine.
6. CONCLUSIONS
The proposed paper presents the method to verify whether
the given signature done by the digital pen is genuine or
forgery. For that, system uses particular method i.e. relative
slope method. Before this project the method gives the result
but there are some parameters like pressure, time, speed,
threshold value and accuracy of the project which gives less
accuracy of the result and after using this project the method
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 388
improves this parameter.the above system increase the
accuracy of the signature above 80% and more,which was
less before this system. The level of accuracy increase with
this project. The disadvantage of biometric can avoided by
this project one can’t sign of another person.
REFERENCES
[1]. S.Srihari.K.M.Kalera.AndA.XU,“Offline Signature
Verification and Identification Using Distance Statistics,
”International Journal of Pattern Recognition And Artificial
Intelligence, vol. 18, no. 7, pp. 1339–1360, 2004.
[2]. H S. Sridhar and M.Beall, “Signature Verifications
Using Kolmogron Smirnov Statistic,”Proceedings of
international Graphonomics Society, Salemo Italy, pp. 152–
156, June, 2005.
[3]. Ashwini Pansare, shalini Bhatia,”Handwritten Signature
Verification using Neural Network,” International Journal of
Applied Information Systems (IJAIS)–ISSN:-2249-0868
Foundation of Computer Science FCS, New York, USA,
January 2012.
[4]. Ramachandra A.C,Jyoti hrinivas Rao”Robust Offline
signature verification based on global features” IEEE
International Advance Computing Conference, 2009.
[5]. Martinez, L.E., Treviso, C.M, Alonso, J.B., and Ferrer,
M. Parameterization of a forgery Handwritten Signature
Verification using SVM.IEEE 38thAnnual 2004
International Carnahan Conference on Security Technology,
2004 PP.193-196
[6]. Christian Gruber, Thyme Gruber, “Online Signature
Verification with Support Vector Machines Based on LCSS
Kernel Functions”, IEEE, August 2010
[7]. Sudarsha Madabashi,Vivek Shriniwas,”Online Offline
signature verification using relative slope algorithm.”
international workshop on measurement system IEEE,
March2005.
[8]. H.Morita, T.Ohishi, Y. Komiya,“On-line Signature
Verification Algorithm Incorporating Pen Position, Pen
Pressure and Pen Inclination Trajectories”, IEEE, 2001.
[9]. Enrique Argones Rua, “Online Signature Verification
Based on Generative Models”, IEEE, August 2012.
[10]. Ming Men, Xizang Xi, Sizing Lou,“On-line Signature
Verification Based on Support Vector Data Description and
Genetic Algorithm”, IEEE, 2008.
[11]. T.S. Enturk. E .O zgunduz. and E. Karshgil,
“Handwritten Signature Verification Using Image Invariants
and Dynamic Features, Proceedings of the 13th European
Signal Processing Conference EUSIPCO 2005, Antalya
Turkey, and 4th-8th
September, 2005.

More Related Content

What's hot

Review of different methods of protecting privacy using finger prints
Review of different methods of protecting privacy using finger printsReview of different methods of protecting privacy using finger prints
Review of different methods of protecting privacy using finger printsIAEME Publication
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationseSAT Journals
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkEditor IJMTER
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...IJNSA Journal
 
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...IRJET Journal
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesIJNSA Journal
 
IRJET-Fake Product Review Monitoring
IRJET-Fake Product Review MonitoringIRJET-Fake Product Review Monitoring
IRJET-Fake Product Review MonitoringIRJET Journal
 
Usability of developed multiple file encryption using rijndael algorithm
Usability of developed multiple file encryption using rijndael algorithm Usability of developed multiple file encryption using rijndael algorithm
Usability of developed multiple file encryption using rijndael algorithm Bryan Guibijar
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm IJECEIAES
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...INFOGAIN PUBLICATION
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesIRJET Journal
 
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...IJCSEIT Journal
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsIRJET Journal
 
IRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine LearningIRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine LearningIRJET Journal
 
Optical character recognition an encompassing review
Optical character recognition   an encompassing reviewOptical character recognition   an encompassing review
Optical character recognition an encompassing revieweSAT Journals
 

What's hot (20)

Review of different methods of protecting privacy using finger prints
Review of different methods of protecting privacy using finger printsReview of different methods of protecting privacy using finger prints
Review of different methods of protecting privacy using finger prints
 
20320130406009
2032013040600920320130406009
20320130406009
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applications
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
 
AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEAS...
AUTHENTICATED MEDICAL DOCUMENTS RELEASING  WITH PRIVACY PROTECTION AND RELEAS...AUTHENTICATED MEDICAL DOCUMENTS RELEASING  WITH PRIVACY PROTECTION AND RELEAS...
AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEAS...
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
 
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 
IRJET-Fake Product Review Monitoring
IRJET-Fake Product Review MonitoringIRJET-Fake Product Review Monitoring
IRJET-Fake Product Review Monitoring
 
Usability of developed multiple file encryption using rijndael algorithm
Usability of developed multiple file encryption using rijndael algorithm Usability of developed multiple file encryption using rijndael algorithm
Usability of developed multiple file encryption using rijndael algorithm
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
 
BLIND ASSISTANT SERVICE
BLIND ASSISTANT SERVICEBLIND ASSISTANT SERVICE
BLIND ASSISTANT SERVICE
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection Techniques
 
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID Tags
 
IRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine LearningIRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine Learning
 
Optical character recognition an encompassing review
Optical character recognition   an encompassing reviewOptical character recognition   an encompassing review
Optical character recognition an encompassing review
 

Viewers also liked

Gis in assessing topographical aspects of hilly regions
Gis in assessing topographical aspects of hilly regionsGis in assessing topographical aspects of hilly regions
Gis in assessing topographical aspects of hilly regionseSAT Publishing House
 
Numerical simulation of friction stir butt welding processes for az91 magnesi...
Numerical simulation of friction stir butt welding processes for az91 magnesi...Numerical simulation of friction stir butt welding processes for az91 magnesi...
Numerical simulation of friction stir butt welding processes for az91 magnesi...eSAT Publishing House
 
Analysis of zone routing protocol in manet
Analysis of zone routing protocol in manetAnalysis of zone routing protocol in manet
Analysis of zone routing protocol in maneteSAT Publishing House
 
Integration of artificial intelligence control to the unified power quality c...
Integration of artificial intelligence control to the unified power quality c...Integration of artificial intelligence control to the unified power quality c...
Integration of artificial intelligence control to the unified power quality c...eSAT Publishing House
 
Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...eSAT Publishing House
 
Deflection control in rcc beams by using mild steel strips (an experimental i...
Deflection control in rcc beams by using mild steel strips (an experimental i...Deflection control in rcc beams by using mild steel strips (an experimental i...
Deflection control in rcc beams by using mild steel strips (an experimental i...eSAT Publishing House
 
Comparative analysis of singularities of 3 prs and 3-
Comparative analysis of singularities of 3 prs and 3-Comparative analysis of singularities of 3 prs and 3-
Comparative analysis of singularities of 3 prs and 3-eSAT Publishing House
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Publishing House
 
Design of c slotted microstrip antenna using
Design of c slotted microstrip antenna usingDesign of c slotted microstrip antenna using
Design of c slotted microstrip antenna usingeSAT Publishing House
 
A quantitative risk assessment approach in an integrated cold chain system en...
A quantitative risk assessment approach in an integrated cold chain system en...A quantitative risk assessment approach in an integrated cold chain system en...
A quantitative risk assessment approach in an integrated cold chain system en...eSAT Publishing House
 
A multilevel security scheme using chaos based
A multilevel security scheme using chaos basedA multilevel security scheme using chaos based
A multilevel security scheme using chaos basedeSAT Publishing House
 
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...eSAT Publishing House
 
Buckling analysis of line continuum with new matrices of stiffness and geometry
Buckling analysis of line continuum with new matrices of stiffness and geometryBuckling analysis of line continuum with new matrices of stiffness and geometry
Buckling analysis of line continuum with new matrices of stiffness and geometryeSAT Publishing House
 
The effect of rotor disc clearance on the lift performance of contra rotating...
The effect of rotor disc clearance on the lift performance of contra rotating...The effect of rotor disc clearance on the lift performance of contra rotating...
The effect of rotor disc clearance on the lift performance of contra rotating...eSAT Publishing House
 
“Remedies over the obstacles in implementing automation in indian infrastruct...
“Remedies over the obstacles in implementing automation in indian infrastruct...“Remedies over the obstacles in implementing automation in indian infrastruct...
“Remedies over the obstacles in implementing automation in indian infrastruct...eSAT Publishing House
 
Microstructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holesMicrostructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holeseSAT Publishing House
 
Road signs walking among shapes and colors
Road signs walking among shapes and colorsRoad signs walking among shapes and colors
Road signs walking among shapes and colorseSAT Publishing House
 
Degradation of mono azo dye in aqueous solution using
Degradation of mono azo dye in aqueous solution usingDegradation of mono azo dye in aqueous solution using
Degradation of mono azo dye in aqueous solution usingeSAT Publishing House
 
Mapping of genes using cloud technologies
Mapping of genes using cloud technologiesMapping of genes using cloud technologies
Mapping of genes using cloud technologieseSAT Publishing House
 

Viewers also liked (20)

Gis in assessing topographical aspects of hilly regions
Gis in assessing topographical aspects of hilly regionsGis in assessing topographical aspects of hilly regions
Gis in assessing topographical aspects of hilly regions
 
Numerical simulation of friction stir butt welding processes for az91 magnesi...
Numerical simulation of friction stir butt welding processes for az91 magnesi...Numerical simulation of friction stir butt welding processes for az91 magnesi...
Numerical simulation of friction stir butt welding processes for az91 magnesi...
 
Analysis of zone routing protocol in manet
Analysis of zone routing protocol in manetAnalysis of zone routing protocol in manet
Analysis of zone routing protocol in manet
 
Integration of artificial intelligence control to the unified power quality c...
Integration of artificial intelligence control to the unified power quality c...Integration of artificial intelligence control to the unified power quality c...
Integration of artificial intelligence control to the unified power quality c...
 
Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...
 
Deflection control in rcc beams by using mild steel strips (an experimental i...
Deflection control in rcc beams by using mild steel strips (an experimental i...Deflection control in rcc beams by using mild steel strips (an experimental i...
Deflection control in rcc beams by using mild steel strips (an experimental i...
 
Comparative analysis of singularities of 3 prs and 3-
Comparative analysis of singularities of 3 prs and 3-Comparative analysis of singularities of 3 prs and 3-
Comparative analysis of singularities of 3 prs and 3-
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Design of c slotted microstrip antenna using
Design of c slotted microstrip antenna usingDesign of c slotted microstrip antenna using
Design of c slotted microstrip antenna using
 
A quantitative risk assessment approach in an integrated cold chain system en...
A quantitative risk assessment approach in an integrated cold chain system en...A quantitative risk assessment approach in an integrated cold chain system en...
A quantitative risk assessment approach in an integrated cold chain system en...
 
A multilevel security scheme using chaos based
A multilevel security scheme using chaos basedA multilevel security scheme using chaos based
A multilevel security scheme using chaos based
 
Simulation of convolutional encoder
Simulation of convolutional encoderSimulation of convolutional encoder
Simulation of convolutional encoder
 
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...
 
Buckling analysis of line continuum with new matrices of stiffness and geometry
Buckling analysis of line continuum with new matrices of stiffness and geometryBuckling analysis of line continuum with new matrices of stiffness and geometry
Buckling analysis of line continuum with new matrices of stiffness and geometry
 
The effect of rotor disc clearance on the lift performance of contra rotating...
The effect of rotor disc clearance on the lift performance of contra rotating...The effect of rotor disc clearance on the lift performance of contra rotating...
The effect of rotor disc clearance on the lift performance of contra rotating...
 
“Remedies over the obstacles in implementing automation in indian infrastruct...
“Remedies over the obstacles in implementing automation in indian infrastruct...“Remedies over the obstacles in implementing automation in indian infrastruct...
“Remedies over the obstacles in implementing automation in indian infrastruct...
 
Microstructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holesMicrostructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holes
 
Road signs walking among shapes and colors
Road signs walking among shapes and colorsRoad signs walking among shapes and colors
Road signs walking among shapes and colors
 
Degradation of mono azo dye in aqueous solution using
Degradation of mono azo dye in aqueous solution usingDegradation of mono azo dye in aqueous solution using
Degradation of mono azo dye in aqueous solution using
 
Mapping of genes using cloud technologies
Mapping of genes using cloud technologiesMapping of genes using cloud technologies
Mapping of genes using cloud technologies
 

Similar to Design of digital signature verification algorithm using relative slope method

Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...eSAT Journals
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET Journal
 
A Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personA Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personEditor IJMTER
 
Improvement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of PasswordsImprovement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of PasswordsIJCSIS Research Publications
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemIRJET Journal
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesIAEME Publication
 
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...IJNSA Journal
 
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET Journal
 
A new multimodel approach for human authentication sclera vein and finger ve...
A new multimodel approach for human authentication  sclera vein and finger ve...A new multimodel approach for human authentication  sclera vein and finger ve...
A new multimodel approach for human authentication sclera vein and finger ve...eSAT Journals
 
Ingerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentsIngerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentseSAT Journals
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition systemeSAT Publishing House
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computingeSAT Publishing House
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMAM Publications
 
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...IJERA Editor
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voiceeSAT Publishing House
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques IJECEIAES
 

Similar to Design of digital signature verification algorithm using relative slope method (20)

Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
A Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personA Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a person
 
Improvement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of PasswordsImprovement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of Passwords
 
J1802035460
J1802035460J1802035460
J1802035460
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
H364752
H364752H364752
H364752
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
 
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
 
A new multimodel approach for human authentication sclera vein and finger ve...
A new multimodel approach for human authentication  sclera vein and finger ve...A new multimodel approach for human authentication  sclera vein and finger ve...
A new multimodel approach for human authentication sclera vein and finger ve...
 
Ingerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentsIngerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parents
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
 
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringJuanCarlosMorales19600
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxsomshekarkn64
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineering
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

Design of digital signature verification algorithm using relative slope method

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 384 DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N .Ganorkar1 , Kalyani Pendke2 1 Mtech, 4th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra), India 2 Lecturer, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra), India Abstract In the era of growing technology, security is the major concern to avoid fakes and forgeries. There are various biometric technique which help in personal identification, among those verification systems, one system is Signature Verification System, Signature is a behavioral biometric.It is not based on figure print ,retina or any facial expression, according to the data available in the input, signature verification split into two part: Online and Offline. It also referred as static and dynamic. Signature verification also used to provide authentication to user. The main advantages of signature verification are that it used for e- business which helps in banking applications. The proposed paper present slope based method to identify the signature using various parameters like speed, time, pressure, movement of signature, accuracy and matching percentage of two signature etc. Keywords: Segmentation, Hidden Marko Method, Support Vector Machine. Relative slope algorithm, signature verification, Gaussian elimination algorithm, -------------------------------------------------------------------***------------------------------------------------------------------- 1. INTRODUCTION Human usually recognize each other by various ways like their voice when we speak them, by their eyes when we meet them. To achieve more reliable information for verification and identification we should use something that really recognize given person signature verification is one in that .Signature verification techniques utilize many different characteristics of an individual’s signature in order to identify that individual. The advantages of using such an authentication techniques are signatures are widely accepted by society as a form of identification and verification. Information required is not sensitive. [2] So, signature verification is a very popular area for research now days. Forging of one’s signature does not mean a long-life loss of that one’s identity .The basic idea is to investigate a signature verification technique which is not costly to develop, is reliable even if the individual is under different emotions, user friendly in terms of configuration. In signature verification application, the signatures are processed to extract features that are used for verification. [1]There are two stages called enrolment and verification. Two types of signature verification are offline and online also called static and dynamic signature based on data available in the input. Offline signature (static): The input of offline signature verification is the image of signature and is useful in automatic verification signature found on bank check and account. Online (Dynamic): Signatures that are captured by data acquisition devices like pressure-sensitive tablets and webcam that extract dynamic features of a signature in addition to its shape (static), and can be used in real time applications like credit card transactions, protection of small personal devices (e.g. PDA), authorization of computer users for accessing sensitive data or programs, and authentication of individuals for access to physical devices or buildings. In the point of view of adaption in the market place, signature verification presents three likely advantages over other biometrics techniques. First nowadays it is a socially accepted method already in use in banks and credit card transaction. Second, it is useful for most of the new generation of portable computers and personal digital assistants (PDAs) use and writing as the main input channel. Third, a signature may be changed by the user. Similarly to a password while it is not possible to change finger prints iris or retina patterns. In this paper, section 2 present literature reviews of the project .section 3 present proposed systems, proposed architecture of the project. Section 4 represent methodology, algorithm used, section 5 represent result/analysis of the project ,section 6 represent conclusion and section 7 present references for the project. 2. LITERATURE REVIEW S.Srihari. K. M. Kalera. And A. XU [1], proposed a system which represent Hidden Markov model is one of the widely used models for sequence analysis in signature verification techniques. Using optimized HMM we can calculate the segment of the signature. It also gives less error rate than other (18.4%). H. S. Sridhar and M. Beall [2], suggested that It extracts the set of feature representing the signature which provide different sample from several sample. Second step is for NN to learn the relationship between signature and its class
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 385 either genuine or forgery.The proposed system highly suitable for global aspect of handwritten signature. S.Srihari. K. M. Kalera. And A. XU [3], present a system the gives idea about proposed method used two techniques based on template matching. one of them is depend on the optimal matching and the other based on the elastic matching. The proposed system tested both the binary and gray signature every time. Martinez, L.E., Treviso, C.M, Alonso, J.B., and Ferrer, M. [4] suggested that the proposed system uses global directional and grid features of the signature and SVM for classification and verification. Support vector machine used various techniques like Lcss-Global and Lcss-Local Lcss is nothing but local common subsequence used to find the approximate value of verified signature. 3. Proposed System 3.1 Proposed Approach This project proposes a new algorithm for slop calculation which uses digital pen input signature verification .The algorithm considers writer’s signature in the form of slopes, The working of process is like, the slope value of input signature which is already present in the database and the slope value of signature taken by the digital pen is match. If the slope value match up to some approximation (i.e. approximate value decided by user, like 8o%, 70%), then the signature will be genuine otherwise forgery. In the verification phase, the scheme computes a difference between the slope value of signature which is already store in database and the current slope value of the pen input. Care needs to be taken in computing the different function because the length of the input signature different from that of the digital signature even if the signature is genuine. If the computed difference does not exceed a threshold value, the input signature is predicted to be genuine; otherwise it is predicted to be forgery. System uses various parameters to match both the signature. Like, threshold value, time of signing, speed of signing, pen pressure etc. The system take various stages to verify signature like data acquisition, prepossessing, feature extraction, relative slope extraction, two tier time metric extraction. 3.2 Proposed Architecture Fig1: General Overview of System 4. METHODOLOGY 4.1 Modules 4.1.1 Database Module The first database module used to sore and represent all the slope value in the database form. In this module first system takes the signature through digital pen and pad .This signature get store in database with all the values like slope value ,theta value ,vector in the form of matrix, Eigenvector etc .System use dataset of vb.net to store the value. 4.1.2 Relative Slope Algorithm In this module system calculate all the slope value of the store signature. This module helps to calculate all the parameters of the signature like pen pressure, threshold value, time, speed etc of the signature. This algorithm use optimized HMM method to calculate their values like slope of line, perpendicular, intersection, centroid of the circle etc. 4.1.3 Comparison Module This is the last module of the project .this module shows the comparison between two images or signature done by the pen in that first is already store signature and second is real
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 386 time signature.The comparison done by various parameter like pen pressure, location, threshold value, speed and time of the signature and if the both signature matches upto the mark or upto particular percentage then signature is genuine otherwise forgery. 4.2 Relative Slope Algorithm: The proposed paper present relative slope method to provide input signature through digital pen to identify a person is genuine or Forgery based on their handwriting..Current technology in signature verification uses various algorithm for future point extraction like genetic algorithm, pattern matching, Markova method, this project proposed slope based method which divided a signature into various segment using optimized HMM method, and slope of every segment is calculated on based on previous segment and gives approximate result. Steps: 1) Preprocess and normalize the algorithm. 2) Divide the signature into segment using optimized HMM method. 3) Based on requirement combine these segments into line segment. 4) Calculate the relative slope value of each segment with respect to previous segment. 5) Carry step (4) till all segment are processed else step (6). 6) Store the slope value of each segment which can be used for verification. 7) End Using relative slope algorithm we can minimize the time and maintenance cost. For this purpose the system is classified in below 1) Data Acquisition 2) Preprocessing 3) Feature Extraction 4) Relative slope Extraction 5) Tier time metric extraction 6) Signature alignment and enrollment 7) Verification Fig 2 Here Si: =slope of segment i with respect to previous segment i-1. Example: The Fig. Shows the Part of Signature 1) Using optimize HMM we can calculate the segment of the signature. Then segment can be combining to form a line segment. 2) After the line segment are obtained the relative slope are calculated. 3) Slope of line: S=dy/dx Where: dx=x2-x1 dy= y2-y1 4) For the first segment we calculate the slope between the starting point of the first segment and the ending point of the last segment. 5) However, the for the further line segment the slope is calculated based on the previous line segment In the first step global time required to put the signature and calculate. 6) The second step used to calculate the length of signature completed in unit time for this two tier time metric extraction algorithm is used. 7) And finally in verification step two level verification algorithm used in first level of verification relative slope value compare with previous value 8) And the second level extracts the global and local features consisting of relative slope value, total length and global time. If the signature passes the second level of verification it considered as genuine signature 4.3 Contribution Before using the method, the accuracy and some parameters like threshold value, pen pressure, speed, time of signature was not up to the mark but after using new this method with new concept and design method the project gives more accuracy, threshold value ,pressure all are improved and gives approximate or satisfied result of the project 5. RESULT/ANALYSIS Fig 2: Screen Shot Of Original Sign Taken By Pen 1st Time
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 387 Fig 3: Graph Shows Pressure applied by pen The above graph shows the pressure when signature taken by the pen 1st time. Fig 4: Graph shows XY movement applied by pen The above graph shows the XY movement of pen when signature taken by 1st time by pen Fig 5 Graph shows XY movement applied by pen The above fig. xy movement of pen when signature taken 2nd by the pen to compare it with 1st Fig 6.Graph Shows The Pressure Appliied By Pen The above graph shows the pressure applied by pen when signature taken by pen 2nd time for comparision. Fig 7 Graph shows the comparison between old and new signature The above fig..shows the comparison between the two signature taken by the pen .this graph gives the matching percentage criteria between two signature and if two signature matches more than 80% then the signature is valid or the signature of the person is guanine and if not then forgery Fig 8 Messagebox Shows The Matching Criteria Between Two Signature The above fig shows the message box which gives the matching percentage between two signatures. The above signature matches upto 98% means it is genuine. 6. CONCLUSIONS The proposed paper presents the method to verify whether the given signature done by the digital pen is genuine or forgery. For that, system uses particular method i.e. relative slope method. Before this project the method gives the result but there are some parameters like pressure, time, speed, threshold value and accuracy of the project which gives less accuracy of the result and after using this project the method
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 388 improves this parameter.the above system increase the accuracy of the signature above 80% and more,which was less before this system. The level of accuracy increase with this project. The disadvantage of biometric can avoided by this project one can’t sign of another person. REFERENCES [1]. S.Srihari.K.M.Kalera.AndA.XU,“Offline Signature Verification and Identification Using Distance Statistics, ”International Journal of Pattern Recognition And Artificial Intelligence, vol. 18, no. 7, pp. 1339–1360, 2004. [2]. H S. Sridhar and M.Beall, “Signature Verifications Using Kolmogron Smirnov Statistic,”Proceedings of international Graphonomics Society, Salemo Italy, pp. 152– 156, June, 2005. [3]. Ashwini Pansare, shalini Bhatia,”Handwritten Signature Verification using Neural Network,” International Journal of Applied Information Systems (IJAIS)–ISSN:-2249-0868 Foundation of Computer Science FCS, New York, USA, January 2012. [4]. Ramachandra A.C,Jyoti hrinivas Rao”Robust Offline signature verification based on global features” IEEE International Advance Computing Conference, 2009. [5]. Martinez, L.E., Treviso, C.M, Alonso, J.B., and Ferrer, M. Parameterization of a forgery Handwritten Signature Verification using SVM.IEEE 38thAnnual 2004 International Carnahan Conference on Security Technology, 2004 PP.193-196 [6]. Christian Gruber, Thyme Gruber, “Online Signature Verification with Support Vector Machines Based on LCSS Kernel Functions”, IEEE, August 2010 [7]. Sudarsha Madabashi,Vivek Shriniwas,”Online Offline signature verification using relative slope algorithm.” international workshop on measurement system IEEE, March2005. [8]. H.Morita, T.Ohishi, Y. Komiya,“On-line Signature Verification Algorithm Incorporating Pen Position, Pen Pressure and Pen Inclination Trajectories”, IEEE, 2001. [9]. Enrique Argones Rua, “Online Signature Verification Based on Generative Models”, IEEE, August 2012. [10]. Ming Men, Xizang Xi, Sizing Lou,“On-line Signature Verification Based on Support Vector Data Description and Genetic Algorithm”, IEEE, 2008. [11]. T.S. Enturk. E .O zgunduz. and E. Karshgil, “Handwritten Signature Verification Using Image Invariants and Dynamic Features, Proceedings of the 13th European Signal Processing Conference EUSIPCO 2005, Antalya Turkey, and 4th-8th September, 2005.