SlideShare a Scribd company logo
1 of 3
Download to read offline
Journal for Research| Volume 01| Issue 01 | March 2016
ISSN: 2395-7549
All rights reserved by www.journalforresearch.org 85
Online Signature Based Application Locking
System
Aswathi Nambiar Bibin Babu
Amal Jyothi College of Engineering, MG University, Amal Jyothi College of Engineering, MG University,
Kottayam Kottayam
Gokul Gopinadh Sujith John Philip
Amal Jyothi College of Engineering, MG University, Amal Jyothi College of Engineering, MG University,
Kottayam Kottayam
Abstract
Data security and privacy are crucial issues to be addressed for assuring a successful deployment of biometrics-based recognition
systems in real life applications. In this paper, we present a highly efficient and secured authentication scheme by online
verification of signature. This authentication scheme is very simple and can be used for securing the applications and various
elements which can be accessed and interfaced by touch panel’s inputs. This authentication scheme is very simple and can be
used for securing the applications and various elements which can be accessed and interfaced by touch panel’s inputs.
Keywords: Signature Authentication, Data Acquisition, Data Storage
_______________________________________________________________________________________________________
I. INTRODUCTION
Biometric authentication is gaining popularity as a more trustable alternative to password-based security systems. The objective
of the biometric systems is to deduce the identity of individuals. Signature is a behavioural biometric. It is not based on the
physical properties, such as fingerprint or face, of the individual, but behavioural ones. Signature of a person does not change
over time and is a technique that is accepted by the public and is comfortable to the public. Signature authentication can be done
by two ways: one is by offline method and other is online method. Offline method of signature verification takes the signature
input as a image and processes it. Online signature verification uses signatures that are captured by pressure-sensitive tablets and
the dynamic properties of a signature are extracted in addition to its shape. Dynamic features include the number of pixels,
velocity, length of the signature and the time taken to make the signature making it difficult to forge.[1]
In an online signature verification system, the users are first registered by providing details and then can enter 5 signature
templates. Then, when a user presents a signature (test signature) claiming to be a particular individual, this test signature is
compared with the values that are computed from the stored templates .If the dissimilarity is above a certain threshold, the user
won’t be able to login [2].
Verification will be based on a range of parameters that will be derived from the stored 5 templates .The input signature will
be compared with derived values from the stored template of signature. The key advantage is that the user need not remember the
password and can make an easy access to the application. This will make the transactions more secure.
II. SYSTEM OVERVIEW
The proposed method shares the general approach and an idea suggested by some previous systems, but differs from the previous
work in the selection of the features, here all the features are taken in consideration during the verification. The overall process is
outlined below.
During the registration the user inputs 5 signature templates which are used to derive the characteristics of the user’s signature.
The reference set of signatures, together with these parameters, are stored with a unique user identifier in the system’s database.
When a test signature made by the user the signature parameters are compared with the parameters that are derived from the
stored templates. The resulting minimum, maximum range values are derived and whether the input test signature parameter
values lies between them is verified during the authentication.
During authentication we will be comparing the various parameters of the input signature with the derived respective
parameters of the stored 5 templates. The parameters include velocity, pixel points, length of the signature and time taken by user
to make the signature. Verification will be based on a range of parameters that will be derived from the stored 5 templates.
This authentication scheme is very simple and can be used for securing the applications and various elements which can be
accessed and interfaced by touch panel’s inputs. The key advantage is that the user need not remember the password and can
make an easy access to the application. This will make the transactions more secure.
Online Signature Based Application Locking System
(J4R/ Volume 01 / Issue 01 / 015)
All rights reserved by www.journalforresearch.org 86
Fig. 1: Architecture of the proposed model
These steps are explained in detailed in the following subsections:
Data Acquisition:A.
We are using a touch based mobile capable of accepting the input signatures. For each input signature number of pixel points,
length of the signature, speed at which the user makes the signature and the velocity with which the signature is done is extracted
and stored in the database.
Signature Authentication:B.
The characteristics are extracted from the 5 stored signature templates. The parameters like the speed and velocity at which the
signature is done, the number of pixel points and the length of the signature are extracted from the signatures[1]. The minimum
and maximum value for this parameter is derived and the parameters that are extracted from the test input signature are then
compared with the corresponding parameters of the stored template ; if the value lies in the range of the stored template the
signature is genuine otherwise the signatures are not same.
Data Storage:C.
The parameters extracted from the signature are stored in the database. The parameters that are extracted from the signature ie.
the length of the signature, speed at which the signature is done and total pixel points as well as the time taken to make the
signature those values are needed for the authentication of the signature. These derived characters of the signature are stored in
the database.
Signature Length Extraction:D.
The length of the signature is calculated by the adding the distance between each pixel points. We have the total number of pixel
points with those points we can find the distance between the successive points and then continue the step until the last point is
reached. In this way the length of the signature will be based on the number of pixel points not on the distance between the first
and last points [3].
Registration & Login:E.
The use needs to enter some basic details about the user. At the time of registration the user needs to enter 5 signature templates.
The various parameters are extracted from these signatures and are stored in the database. While login an input test signature is
made by the user and the parameters extracted from that signature are then compared with the values that is stored in the
database which was computed from the stored templates .Once the registration is successful the user can login to the system
using his/her signature.
Online Signature Based Application Locking System
(J4R/ Volume 01 / Issue 01 / 015)
All rights reserved by www.journalforresearch.org 87
Signature Verification:F.
The parameters extracted from input signature made by the user is compared with the parameters extracted from the signature
templates and is verified. The number of attempts for a user is restricted. Only 5 attempts can be made by a user. If the signature
is verified and is found to be true then the user will be able to login and can edit the signatures and details that were stored while
the registration process [5].
III. CONCLUSION AND FUTURE SCOPE
In this paper we have presented an online signature verification system with an improved decision criterion to separate genuine
and forgery signatures. The main contribution of our system is that it considers all the four parameters while making the
verification. We have also studied the effects on the performance of some common approaches taken by previous signature
Verification systems and came up with improvements or suggestions for various steps of the process. For instance here all the
parameters are checked while the input signature is verified. Moreover, we showed that the pressure information does not seem
to be a useful feature in distinguishing forgeries from genuine. This model if integrated with a image processing system could
make up a higher secured system for authentication.
REFERENCES
[1] Napa Sae-Bae, Nasir Memon,, "Online Signature Verification on Mobile Devices,” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND
SECURITY, VOL. 9, NO. 6, JUNE 2014 933-947
[2] Alisher Kholmatov, Berrin Yanikoglu, "Identity authentication using improved online signature verification method,” Pattern Recognition Letters 26 (2005)
2400–2408 , April 2005 ,2400-2408
[3] Hansheng Lei, Venu Govindaraju, “A Comparative Study on the consistency of features in online signature verification” Pattern Recognition Letters 26
(2005) 2483–2489, July 2005,2483-2489
[4] Loris Nanni, Alessandra Lumini, “A novel local on-line signature verification system” Pattern Recognition Letters 29 (2008) 559–568,October 2007,559-
568
[5] Andreas Nautsch, Christian Rathgeb, Christoph Busch,”Bridging Gaps: An Application of Feature Warping to online Signature Verification “IEEE
TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY.VOL. 7, NO. 9, APRIL 2003 899-901
[6] A. Fallah, M. Jamaati, and A. Soleamani, “A new online signature verification system based on combining Mellin transform, MFCC and neural network,”
Digital Signal Process, vol. 21, no. 2, pp. 404–416, 2011.

More Related Content

What's hot

Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems securitySelf
 
Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...1crore projects
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometricssuniljoshi151
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryptionDeepák Soni
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and SecurityShreyans Jain
 
Online voting job presentation
Online voting job presentationOnline voting job presentation
Online voting job presentationbondito
 
IRJET- Online Voting System using Fingerprint Scanner
IRJET-  	  Online Voting System using Fingerprint ScannerIRJET-  	  Online Voting System using Fingerprint Scanner
IRJET- Online Voting System using Fingerprint ScannerIRJET Journal
 
Secure Internet Voting System
Secure Internet Voting SystemSecure Internet Voting System
Secure Internet Voting Systemtheijes
 
Critical analysis of genetic algorithm based IDS and an approach for detecti...
Critical analysis of genetic algorithm based IDS and an approach  for detecti...Critical analysis of genetic algorithm based IDS and an approach  for detecti...
Critical analysis of genetic algorithm based IDS and an approach for detecti...IOSR Journals
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkIJERA Editor
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networkseSAT Journals
 
A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol Nishmitha B
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
AADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewAADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewakshay hebbar
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET Journal
 
Online e voting
Online e votingOnline e voting
Online e votingMerbinJose
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesIAEME Publication
 

What's hot (20)

Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Online voting job presentation
Online voting job presentationOnline voting job presentation
Online voting job presentation
 
IRJET- Online Voting System using Fingerprint Scanner
IRJET-  	  Online Voting System using Fingerprint ScannerIRJET-  	  Online Voting System using Fingerprint Scanner
IRJET- Online Voting System using Fingerprint Scanner
 
Secure Internet Voting System
Secure Internet Voting SystemSecure Internet Voting System
Secure Internet Voting System
 
Critical analysis of genetic algorithm based IDS and an approach for detecti...
Critical analysis of genetic algorithm based IDS and an approach  for detecti...Critical analysis of genetic algorithm based IDS and an approach  for detecti...
Critical analysis of genetic algorithm based IDS and an approach for detecti...
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networks
 
A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
AADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewAADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - review
 
Convenient voting machine
Convenient voting machineConvenient voting machine
Convenient voting machine
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
 
Online e voting
Online e votingOnline e voting
Online e voting
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 

Similar to ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM

ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONSANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONSijistjournal
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGIRJET Journal
 
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPVIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPIRJET Journal
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Securityijtsrd
 
Student Voting Application for Election – Using SMS (1).pptx
Student Voting Application for Election – Using SMS (1).pptxStudent Voting Application for Election – Using SMS (1).pptx
Student Voting Application for Election – Using SMS (1).pptxShivareddyGangam
 
Improvement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of PasswordsImprovement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of PasswordsIJCSIS Research Publications
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemIRJET Journal
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET Journal
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM csandit
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
 
CHAPTER 9 Design Considerations In this chapter you will
CHAPTER 9 Design Considerations In this chapter you willCHAPTER 9 Design Considerations In this chapter you will
CHAPTER 9 Design Considerations In this chapter you willJinElias52
 
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPNt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPEvelyn Donaldson
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IRJET Journal
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokenseSAT Journals
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokenseSAT Publishing House
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...IJERA Editor
 
ONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docx
ONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docxONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docx
ONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docxcherishwinsland
 

Similar to ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM (20)

E signing application
E signing applicationE signing application
E signing application
 
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONSANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
ANALYSIS OF SECURITY REQUIREMENTS OF FUTURISTIC MOBILE APPLICATIONS
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTING
 
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPVIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
 
Student Voting Application for Election – Using SMS (1).pptx
Student Voting Application for Election – Using SMS (1).pptxStudent Voting Application for Election – Using SMS (1).pptx
Student Voting Application for Election – Using SMS (1).pptx
 
Improvement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of PasswordsImprovement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of Passwords
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
 
eVoting.pptx
eVoting.pptxeVoting.pptx
eVoting.pptx
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
CHAPTER 9 Design Considerations In this chapter you will
CHAPTER 9 Design Considerations In this chapter you willCHAPTER 9 Design Considerations In this chapter you will
CHAPTER 9 Design Considerations In this chapter you will
 
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPNt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 
ONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docx
ONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docxONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docx
ONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docx
 

More from Journal For Research

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Journal For Research
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Journal For Research
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Journal For Research
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016Journal For Research
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...Journal For Research
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015Journal For Research
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014Journal For Research
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...Journal For Research
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...Journal For Research
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012Journal For Research
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...Journal For Research
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009Journal For Research
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008Journal For Research
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002Journal For Research
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001Journal For Research
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021Journal For Research
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...Journal For Research
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023Journal For Research
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024Journal For Research
 

More from Journal For Research (20)

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
 
LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
 

Recently uploaded

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Recently uploaded (20)

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM

  • 1. Journal for Research| Volume 01| Issue 01 | March 2016 ISSN: 2395-7549 All rights reserved by www.journalforresearch.org 85 Online Signature Based Application Locking System Aswathi Nambiar Bibin Babu Amal Jyothi College of Engineering, MG University, Amal Jyothi College of Engineering, MG University, Kottayam Kottayam Gokul Gopinadh Sujith John Philip Amal Jyothi College of Engineering, MG University, Amal Jyothi College of Engineering, MG University, Kottayam Kottayam Abstract Data security and privacy are crucial issues to be addressed for assuring a successful deployment of biometrics-based recognition systems in real life applications. In this paper, we present a highly efficient and secured authentication scheme by online verification of signature. This authentication scheme is very simple and can be used for securing the applications and various elements which can be accessed and interfaced by touch panel’s inputs. This authentication scheme is very simple and can be used for securing the applications and various elements which can be accessed and interfaced by touch panel’s inputs. Keywords: Signature Authentication, Data Acquisition, Data Storage _______________________________________________________________________________________________________ I. INTRODUCTION Biometric authentication is gaining popularity as a more trustable alternative to password-based security systems. The objective of the biometric systems is to deduce the identity of individuals. Signature is a behavioural biometric. It is not based on the physical properties, such as fingerprint or face, of the individual, but behavioural ones. Signature of a person does not change over time and is a technique that is accepted by the public and is comfortable to the public. Signature authentication can be done by two ways: one is by offline method and other is online method. Offline method of signature verification takes the signature input as a image and processes it. Online signature verification uses signatures that are captured by pressure-sensitive tablets and the dynamic properties of a signature are extracted in addition to its shape. Dynamic features include the number of pixels, velocity, length of the signature and the time taken to make the signature making it difficult to forge.[1] In an online signature verification system, the users are first registered by providing details and then can enter 5 signature templates. Then, when a user presents a signature (test signature) claiming to be a particular individual, this test signature is compared with the values that are computed from the stored templates .If the dissimilarity is above a certain threshold, the user won’t be able to login [2]. Verification will be based on a range of parameters that will be derived from the stored 5 templates .The input signature will be compared with derived values from the stored template of signature. The key advantage is that the user need not remember the password and can make an easy access to the application. This will make the transactions more secure. II. SYSTEM OVERVIEW The proposed method shares the general approach and an idea suggested by some previous systems, but differs from the previous work in the selection of the features, here all the features are taken in consideration during the verification. The overall process is outlined below. During the registration the user inputs 5 signature templates which are used to derive the characteristics of the user’s signature. The reference set of signatures, together with these parameters, are stored with a unique user identifier in the system’s database. When a test signature made by the user the signature parameters are compared with the parameters that are derived from the stored templates. The resulting minimum, maximum range values are derived and whether the input test signature parameter values lies between them is verified during the authentication. During authentication we will be comparing the various parameters of the input signature with the derived respective parameters of the stored 5 templates. The parameters include velocity, pixel points, length of the signature and time taken by user to make the signature. Verification will be based on a range of parameters that will be derived from the stored 5 templates. This authentication scheme is very simple and can be used for securing the applications and various elements which can be accessed and interfaced by touch panel’s inputs. The key advantage is that the user need not remember the password and can make an easy access to the application. This will make the transactions more secure.
  • 2. Online Signature Based Application Locking System (J4R/ Volume 01 / Issue 01 / 015) All rights reserved by www.journalforresearch.org 86 Fig. 1: Architecture of the proposed model These steps are explained in detailed in the following subsections: Data Acquisition:A. We are using a touch based mobile capable of accepting the input signatures. For each input signature number of pixel points, length of the signature, speed at which the user makes the signature and the velocity with which the signature is done is extracted and stored in the database. Signature Authentication:B. The characteristics are extracted from the 5 stored signature templates. The parameters like the speed and velocity at which the signature is done, the number of pixel points and the length of the signature are extracted from the signatures[1]. The minimum and maximum value for this parameter is derived and the parameters that are extracted from the test input signature are then compared with the corresponding parameters of the stored template ; if the value lies in the range of the stored template the signature is genuine otherwise the signatures are not same. Data Storage:C. The parameters extracted from the signature are stored in the database. The parameters that are extracted from the signature ie. the length of the signature, speed at which the signature is done and total pixel points as well as the time taken to make the signature those values are needed for the authentication of the signature. These derived characters of the signature are stored in the database. Signature Length Extraction:D. The length of the signature is calculated by the adding the distance between each pixel points. We have the total number of pixel points with those points we can find the distance between the successive points and then continue the step until the last point is reached. In this way the length of the signature will be based on the number of pixel points not on the distance between the first and last points [3]. Registration & Login:E. The use needs to enter some basic details about the user. At the time of registration the user needs to enter 5 signature templates. The various parameters are extracted from these signatures and are stored in the database. While login an input test signature is made by the user and the parameters extracted from that signature are then compared with the values that is stored in the database which was computed from the stored templates .Once the registration is successful the user can login to the system using his/her signature.
  • 3. Online Signature Based Application Locking System (J4R/ Volume 01 / Issue 01 / 015) All rights reserved by www.journalforresearch.org 87 Signature Verification:F. The parameters extracted from input signature made by the user is compared with the parameters extracted from the signature templates and is verified. The number of attempts for a user is restricted. Only 5 attempts can be made by a user. If the signature is verified and is found to be true then the user will be able to login and can edit the signatures and details that were stored while the registration process [5]. III. CONCLUSION AND FUTURE SCOPE In this paper we have presented an online signature verification system with an improved decision criterion to separate genuine and forgery signatures. The main contribution of our system is that it considers all the four parameters while making the verification. We have also studied the effects on the performance of some common approaches taken by previous signature Verification systems and came up with improvements or suggestions for various steps of the process. For instance here all the parameters are checked while the input signature is verified. Moreover, we showed that the pressure information does not seem to be a useful feature in distinguishing forgeries from genuine. This model if integrated with a image processing system could make up a higher secured system for authentication. REFERENCES [1] Napa Sae-Bae, Nasir Memon,, "Online Signature Verification on Mobile Devices,” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 6, JUNE 2014 933-947 [2] Alisher Kholmatov, Berrin Yanikoglu, "Identity authentication using improved online signature verification method,” Pattern Recognition Letters 26 (2005) 2400–2408 , April 2005 ,2400-2408 [3] Hansheng Lei, Venu Govindaraju, “A Comparative Study on the consistency of features in online signature verification” Pattern Recognition Letters 26 (2005) 2483–2489, July 2005,2483-2489 [4] Loris Nanni, Alessandra Lumini, “A novel local on-line signature verification system” Pattern Recognition Letters 29 (2008) 559–568,October 2007,559- 568 [5] Andreas Nautsch, Christian Rathgeb, Christoph Busch,”Bridging Gaps: An Application of Feature Warping to online Signature Verification “IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY.VOL. 7, NO. 9, APRIL 2003 899-901 [6] A. Fallah, M. Jamaati, and A. Soleamani, “A new online signature verification system based on combining Mellin transform, MFCC and neural network,” Digital Signal Process, vol. 21, no. 2, pp. 404–416, 2011.