SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 03 | Mar-2016, Available @ http://www.ijret.org 228
AUTOMATIC SIGNATURE VERIFICATION WITH CHAIN CODE
USING WEIGHTED DISTANCE AND EUCLIDEAN DISTANCE - A
REVIEW
Abhilash Deshmukh1
, Shashank Desai2
, Tejas Chaure3
, Akshay Chothe4
, Sunil B Wankhade5
1
Student, Computer Engineering, RGIT, Maharashtra, India
2
Student, Computer Engineering, RGIT, Maharashtra, India
3
Student, Computer Engineering, RGIT, Maharashtra, India
4
Student, Computer Engineering, RGIT, Maharashtra, India
5
Professor, Computer Engineering, RGIT, Maharashtra, India
Abstract
The signature forgery can be restricted by either online or offline signature verification techniques. It verifies the signature by
performing a match with the pre-processed signature dynamically by detecting the motion of stylus during signature while on
other hand, offline verifies by performing a match using the two dimensional scanned image of the signature. This paper studies
about the various techniques available in offline signature verification along with their shadows.
Keywords: Signature Verification, Weighted Distance, High Pressure Factor, Normalization, Threshold Value.
---------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
To identify a person in real time instances, it is necessary for
him to be authenticated by the system. Signature verification
is one of the many methods that can be used for
authentication of a person. Signature verification uses
references of many signatures taken and it compares the
current signature in real time instance. There is an
increasing need of using signature verification techniques in
different organizations especially financial institutions. With
the increasing number of transactions, there is a desire of
automatic signature verification to take place for
authentication of the individual persons. Signature
verification is primarily used for two tasks. The first task is
to identify the signature owner; the second task is to take the
decision, whether the signature is genuine or forged.
Signature verification can be classified in two categories:
One is online and other is offline signature verification.
Online signature verification scans the signature of the user
by tracing the different motion on the stroke of the signature
and identifies it against pre-processed signature information.
Offline signature verification gives static signature
verification information. In this method signature is scanned
from the document and is verified against 2D scanned image
of the signature. In this paper, we have studied various
method such as Support vector machines (SVM), Dynamic
time warping (DTW), Neural network (NN), Multi-set
features (MSF), Associative Memory Net (AMN),
Automatic signature verification with four-dimensional
chain code using weighted distance and Euclidian distance
(ASV) to discuss the variations offered in offline signature
verification methods.
2. APPROACHES FOR SIGNATURE
VERIFICATION
V. Vapnik [1] introduced a new learning method SVM. It
uses set of examples from two classes to find the hyper
plane. It refers to hyper plane which has the largest distance
to the nearest training set data point and thus it results in
good separation of classes. The success achieved in hand
written digit recognition made SVM very popular. SVM is
based on the structural risk minimization principle (SRM).
SRM is based on two main principles: The first one is to
control the risk on the training set and the second principle
controls the capacity of decision function which used to
obtain this risk value. SVM has two classes: Linear
separable and Classification problem. Linear separable is
used to find the hyper plane with maximum Euclidean
distance from the training set. There will be just one optimal
hyper plane with the maximal margin d, defined as the sum
of distances from the hyper plane to the closest points of the
classes. This linear classifier threshold is the optimal
separating hyper plane. Then SVM can find an optimal
linear separating hyper plane with the maximal margin in
this higher dimensional feature space. For a two-class
problem, the nonlinear decision function derived from the
SVM classifier can be formulated as the kernel function.
The kernel is not positive definite but offer some theoretical
and empirical explanations.
DTW algorithm is used for the measurement of speed and
time of two sequences [2]. DTW algorithm can be applied to
video, audio, and graphics, and many different applications
such as automatic speech recognition. This algorithm can
also be utilized to establish linear and non-linear dimensions
of the sequences. The basic principle of this method is
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 03 | Mar-2016, Available @ http://www.ijret.org 229
permitting a range of 'steps' in the space of (time frames in
sample as well as in template) and to find the maximum
length path between the aligned time frames, subject to the
constraints implicit in the allowable steps. We determine the
best matching template and sample to find the total
similarity cost. Taking into consideration two signatures
aligned between L and L’, which known as warping path,
denoted as T, and it has two warping function: mean that the
point in L corresponds to the element in L‟. Online context
can be used to match cost between L and L‟. The path
which minimizes the above cost function is the optional
warping path. Dynamic programming is used to solve the
optimization problem of DTW efficiently.
Neural Network is used for authentication and verification
of hand written signature [3].Pattern recognition is the main
area in which NN is used. The signature verification process
parallels this learning mechanism. Neural network uses two
kind of different processes: training and learning. The first
process is training with the help of extraction method a
feature set representing the signature with several samples
from different signers. The second process is learning the
relationship between a signature and its class. After the
second process is completed then the network can be
classified to a particular signer. Hence NNs are highly suited
to modeling global aspects of handwritten signatures. Alan
McCabe et al [4]. He proposed a method for verifying
handwritten signatures by using NN architecture. To train
NN different types of static and dynamic signature features
are extracted. Static features are height, slant etc while
dynamic features are velocity, pen tip pressure etc. Now all
these and other Network topologies are tested and
comparison is made to get accuracy. The resulting system
has an overall error rate of 3.3% that was being reported for
the best case. Rasha Abbas in his earlier research [5]
investigated the suitability of using back propagation neural
networks for the purpose of offline signature verification
however later on multi-layered feed forward neural network
was investigated.
Off-line signatures are signatures which usually use in paper
works like letters, contracts, and bank checks. This method
is related to offline signatures specially. According to Edson
J. R. Justino and F.Bortolozzi[6], ASV is processed with the
one feature set but to increase the usability of designed ASV
in the sense of increasing security best feature set of
signatures is used in this technical method. This method is
popularly known as new novel MSF based ASV technique.
At first, features are examined in two ways these are shape
features like handwriting slants and pseudo dynamic
features. Distance measure and verification threshold are
also calculated. By taking these values for comparison, at
the second stage, probability of forgery is decided if
DM<VTH. In this condition, signature is processed with the
n X n matrix. By fitted signature in the matrices are n X n
matrix, three resulted matrices are calculated which are
backbone of MSF technique, SR (System Reliability), PCR
(Per cent Correct Rejection), PCA (Per cent Correct
Acceptance). As the system reliability PCR, PCA has high
values, and then signature ids totally matched to best
features set that particular sign. There are mainly two steps
in MSF technique:
560 genuine signatures are used in MSF technique and
forgery signatures are obtained from different 26 writers.
The number of genuine signatures and forgeries differ from
one person to another. Signatures were extracted from
various documents like business documents, bank checks so
that the signature data is naturally written under widely
different conditions. Reason behind such an extraction of
signatures is that forgeries were created with a good
attention in order to have convincing forgeries, and some
forgeries are real ones obtained from actual caseworks.
The second step is to extract signature using different
technologies as:
a) Feature extraction: This stage of the signature
verification and feature selection includes pre-
processing. Features in off-line systems have two types
mainly. These are Shape features like handwriting slants
which can be positive, vertical, negative, and horizontal
etc. and relative measures of signature height and width,
middle zone width and signature width .Pseudo dynamic
feature is nothing but High Pressure Factor. These both
type of features are extracted in two ways such as
globally on the signature as a whole and locally on the
signature divided into specific parts.
b) Distance measure: Distance Measure (DM) is used to
calculate similarity between input signature and
reference by using the Euclidean distance.
c) Threshold value: The value of the threshold VTH is
calculated by feature selection technique that selects the
best feature set which minimizes the error rate as well as
maximizes the correct decisions.
d) Verification decision: The verification decision to
determine whether signature is reliable is proceed with
the help of calculated distance measure and threshold
value. There are two cases for determination of genuine
signature.
Effectiveness of the individual features, and their
contribution to the effectiveness of the different feature sets,
if augmented by, to form a new one.
SR (System Reliability = (PCA+PCR)/2).
PCA (Percentage of Correct Acceptance that is percentage
of genuine signatures accepted as genuine) and PCR
(Percentage of Correct Rejection that is percentage of
forgeries rejected and classified as attempted forgeries).
MSF helps to improve the forgery detection. In other words,
the MSF technique is a process of collecting the sparse
effectiveness that can be provided by the EFS but cannot be
captured by the best feature set.
The Associative Memory Net (AMN) detects the forged
signature quickly [7]. To handle the cost function detail
parametric studies and parallel processing using Open MP is
must. These algorithms are used to verify actual signature
and tested with a reference of 10 nearly similar signatures.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 03 | Mar-2016, Available @ http://www.ijret.org 230
The AMN technique finds forgery with accuracy 94.3%,
which can be compare with other methods.
There are various methods for ASV implementation but
there is only one or two signature references used by
considering memory storage as well as current image based
verification speed. There will be 20 signature references.
Each reference signatures is converted to a small number of
pre-computed features resulting in verification speeds in
excess of 60 verifications per second. These features of
specific signer signature are stored in the database. There
are features like edge distribution, pixel, slant, pixel density,
aspect ratio of signature are stored in dataset. Even if
fraudster stole this featured information then also he cannot
predict the how is the signature actually. So, important data
is being safe and loss can be avoided.
The proposed system matches tested signature with
reference signature. Test signature features are considered as
x and n is the reference signature feature stored in database,
where n<=20. System first extract features of the tested
signature and that features match with the extracted features
of reference signatures. Various Algorithms like extracted
features are used for calculating matching function , four-
dimensional chain code and normalization are used for
computing features of signature. As per the value of
matching function, signature is real or fake is decided by
system.
A step-wise method has been followed in this work.
1. Take signature as an input from document which has to
be verified.
2. All the pre-computed features of reference is stored in
database.
3. Extract the features of current input signature like Pixel
Distribution, Chain Code, Pixel Density, or Aspect Ratio
by processing through various stages.
4. Apply Gaussian Filter Formula on the resulted image in
step 3.
5. Calculate pixel density cost and Aspect Ratio cost for
signature has to be verified by using reference.
6. Calculate Average Match Function for number of
references by using formula.
7. If value is 0 then signature is fake and if 100 then it’s
accurately matched.
8. By normalizing Match function by using formulae of
average and standard deviation, it becomes a Match
Function.
9. If value of Match Function is in between 0 to 1 then
signature is totally matched.
The table compares all the different techniques studied
above. Two major criteria that had been used for
comparison are False Acceptance Rate (FAR) and False
Rejection Rate (FAR). Each technique has varying FAR and
FRR. The objective is to choose best technique with
acceptable error rates. Although FAR % for Associative
Memory Net is least but its FRR % is on higher side. Hence
we select ASV as preferred method as it has low FAR and
FRR.
Table -1: Comparison of FAR and FRR
Sr.no Method FAR(%) FRR(%)
1 Support Vector Machine
21.06
15.41
15.41
18.53
15.64
13.12
Linear
Poly
RBF
2 Dynamic Time Wrapping 34.91 28.93
3 Neural Network 13.26 11.89
4 Multi Set Feature For
Offline Signature
Verification
16.36 14.58
5 Associative Memory Net 9.7 17.9
6 Feature Based
Automated Signature
Verification using chain
code with Euclidean’s
distance
12.6 10.2
3. CONCLUSIONS
The signature is becoming most important for authentication
and so it becomes necessary to enhance its application with
automated systems to avoid forgeries and ultimately the
fraud. In this paper we have studied various methods of
Signature Verification on the basis of various factors related
to it like, no. of references, edge distribution, pixel, slant,
pixel density, aspect ratio of signature security, memory
management, accuracy including FAR and FRR, which
plays important role in verification of signature.
REFERENCES
[1]. E.Ozgunduz, T.Senturk and M.E Karsligil, “Off-Line
Signature Verification and Recognition by Support
Vector Machine”, Proceedings of Europian Signal
Processing, 2005.
[2]. M.S Arya and V. S Inamdar, “A Preliminary Study on
Various Off-line Hand Written Signature Verification
Approaches”, Proceeding of International Journal of
Computer Applications, vol. 1, no.9, 2010
[3]. S.A. Daram T. S. Ibiyemi ola, “Offline Signature
Recognition using Hidden Markov Model”, proceeding
of International Journal of Computer Applications, vol.
10, no.2, 2010.
[4]. K. Huang and Y. Hong, Off-line signature verification
based on geometric feature extraction and neural
network classification, Patten Recognition, Vol. 30,
No. 1, pp. 9-17, 1997.
[5]. C. Sansone and M. Vento, Signature verification:
increasing performance by a multi-stage system,
Pattern Analysis and Applications, Vol. 3, pp. 169-181,
2000.
[6]. Anu Rathi, Amrita Ticku, Niti Gupta, Accuracy
enhancement in offline signature verification with the
use of associative memory, IJCSNS International
Journal of computer science and network security,
vol14, no.3,March 2014.
[7]. Priya Metri , Ashwinder Kaur, ”Handwritten Signature
Verification using Instance Based Learning”,
International Journal of Computer Trends and
Technology- March to April Issue 2011.

More Related Content

What's hot

Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkEditor IJMTER
 
The Heuristic Extraction Algorithms for Freeman Chain Code of Handwritten Cha...
The Heuristic Extraction Algorithms for Freeman Chain Code of Handwritten Cha...The Heuristic Extraction Algorithms for Freeman Chain Code of Handwritten Cha...
The Heuristic Extraction Algorithms for Freeman Chain Code of Handwritten Cha...Waqas Tariq
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...IJNSA Journal
 
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...ijscai
 
Handwritten character recognition in
Handwritten character recognition inHandwritten character recognition in
Handwritten character recognition inijaia
 
Mixed Language Based Offline Handwritten Character Recognition Using First St...
Mixed Language Based Offline Handwritten Character Recognition Using First St...Mixed Language Based Offline Handwritten Character Recognition Using First St...
Mixed Language Based Offline Handwritten Character Recognition Using First St...CSCJournals
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...Editor IJMTER
 
Devanagari Character Recognition
Devanagari Character RecognitionDevanagari Character Recognition
Devanagari Character RecognitionPulkit Goyal
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...CSCJournals
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
 
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINEAPPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINEIJNSA Journal
 
Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHarshana Madusanka Jayamaha
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionTejraj Thakor
 

What's hot (19)

Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
 
The Heuristic Extraction Algorithms for Freeman Chain Code of Handwritten Cha...
The Heuristic Extraction Algorithms for Freeman Chain Code of Handwritten Cha...The Heuristic Extraction Algorithms for Freeman Chain Code of Handwritten Cha...
The Heuristic Extraction Algorithms for Freeman Chain Code of Handwritten Cha...
 
40120130406014 2
40120130406014 240120130406014 2
40120130406014 2
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
 
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
 
Handwritten character recognition in
Handwritten character recognition inHandwritten character recognition in
Handwritten character recognition in
 
Mixed Language Based Offline Handwritten Character Recognition Using First St...
Mixed Language Based Offline Handwritten Character Recognition Using First St...Mixed Language Based Offline Handwritten Character Recognition Using First St...
Mixed Language Based Offline Handwritten Character Recognition Using First St...
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
Cc4301455457
Cc4301455457Cc4301455457
Cc4301455457
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
 
Devanagari Character Recognition
Devanagari Character RecognitionDevanagari Character Recognition
Devanagari Character Recognition
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
H364752
H364752H364752
H364752
 
Ijetcas14 337
Ijetcas14 337Ijetcas14 337
Ijetcas14 337
 
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINEAPPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
 
Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural network
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature Recognition
 

Viewers also liked

Learning in content based image retrieval a review
Learning in content based image retrieval  a reviewLearning in content based image retrieval  a review
Learning in content based image retrieval a revieweSAT Journals
 
Public encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsnPublic encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsneSAT Journals
 
Variation in linear density of combed yarn due to dyeing with reactive dye in...
Variation in linear density of combed yarn due to dyeing with reactive dye in...Variation in linear density of combed yarn due to dyeing with reactive dye in...
Variation in linear density of combed yarn due to dyeing with reactive dye in...eSAT Journals
 
Seismic performance of r c buildings on sloping grounds with different types ...
Seismic performance of r c buildings on sloping grounds with different types ...Seismic performance of r c buildings on sloping grounds with different types ...
Seismic performance of r c buildings on sloping grounds with different types ...eSAT Journals
 
Evaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classificationEvaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classificationeSAT Journals
 
Control mouse and computer system using voice commands
Control mouse and computer system using voice commandsControl mouse and computer system using voice commands
Control mouse and computer system using voice commandseSAT Journals
 
Chemical engineering and competences in ecology
Chemical engineering and competences in ecologyChemical engineering and competences in ecology
Chemical engineering and competences in ecologyeSAT Journals
 
Result generation system for cbgs scheme in educational organization
Result generation system for cbgs scheme in educational organizationResult generation system for cbgs scheme in educational organization
Result generation system for cbgs scheme in educational organizationeSAT Journals
 
Digital architecture manifesting an accurate virtual built environment
Digital architecture manifesting an accurate virtual built environmentDigital architecture manifesting an accurate virtual built environment
Digital architecture manifesting an accurate virtual built environmenteSAT Journals
 
Seismic evaluation of rc frame with brick masonry infill walls
Seismic evaluation of rc frame with brick masonry infill wallsSeismic evaluation of rc frame with brick masonry infill walls
Seismic evaluation of rc frame with brick masonry infill wallseSAT Journals
 
Thermal analysis of water cooled charge air cooler in turbo charged diesel en...
Thermal analysis of water cooled charge air cooler in turbo charged diesel en...Thermal analysis of water cooled charge air cooler in turbo charged diesel en...
Thermal analysis of water cooled charge air cooler in turbo charged diesel en...eSAT Journals
 
Meta documents and query extension to enhance information retrieval process
Meta documents and query extension to enhance information retrieval processMeta documents and query extension to enhance information retrieval process
Meta documents and query extension to enhance information retrieval processeSAT Journals
 
How to take dynamic data in life cycle inventory from brazilian sugarcane eth...
How to take dynamic data in life cycle inventory from brazilian sugarcane eth...How to take dynamic data in life cycle inventory from brazilian sugarcane eth...
How to take dynamic data in life cycle inventory from brazilian sugarcane eth...eSAT Journals
 
Real time tracking based on gsm and ir module for running train
Real time tracking based on gsm and ir module for running trainReal time tracking based on gsm and ir module for running train
Real time tracking based on gsm and ir module for running traineSAT Journals
 
Optimization techniques for harmonics minimization in cascaded hybrid multile...
Optimization techniques for harmonics minimization in cascaded hybrid multile...Optimization techniques for harmonics minimization in cascaded hybrid multile...
Optimization techniques for harmonics minimization in cascaded hybrid multile...eSAT Journals
 
Comparison of performance of lateral load resisting systems in multi storey f...
Comparison of performance of lateral load resisting systems in multi storey f...Comparison of performance of lateral load resisting systems in multi storey f...
Comparison of performance of lateral load resisting systems in multi storey f...eSAT Journals
 
Seismic response of multi storey irregular building with floating column
Seismic response of multi storey irregular building with floating columnSeismic response of multi storey irregular building with floating column
Seismic response of multi storey irregular building with floating columneSAT Journals
 

Viewers also liked (18)

Learning in content based image retrieval a review
Learning in content based image retrieval  a reviewLearning in content based image retrieval  a review
Learning in content based image retrieval a review
 
Public encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsnPublic encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsn
 
Variation in linear density of combed yarn due to dyeing with reactive dye in...
Variation in linear density of combed yarn due to dyeing with reactive dye in...Variation in linear density of combed yarn due to dyeing with reactive dye in...
Variation in linear density of combed yarn due to dyeing with reactive dye in...
 
Seismic performance of r c buildings on sloping grounds with different types ...
Seismic performance of r c buildings on sloping grounds with different types ...Seismic performance of r c buildings on sloping grounds with different types ...
Seismic performance of r c buildings on sloping grounds with different types ...
 
Evaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classificationEvaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classification
 
Control mouse and computer system using voice commands
Control mouse and computer system using voice commandsControl mouse and computer system using voice commands
Control mouse and computer system using voice commands
 
Chemical engineering and competences in ecology
Chemical engineering and competences in ecologyChemical engineering and competences in ecology
Chemical engineering and competences in ecology
 
Result generation system for cbgs scheme in educational organization
Result generation system for cbgs scheme in educational organizationResult generation system for cbgs scheme in educational organization
Result generation system for cbgs scheme in educational organization
 
Survey mobile app
Survey mobile appSurvey mobile app
Survey mobile app
 
Digital architecture manifesting an accurate virtual built environment
Digital architecture manifesting an accurate virtual built environmentDigital architecture manifesting an accurate virtual built environment
Digital architecture manifesting an accurate virtual built environment
 
Seismic evaluation of rc frame with brick masonry infill walls
Seismic evaluation of rc frame with brick masonry infill wallsSeismic evaluation of rc frame with brick masonry infill walls
Seismic evaluation of rc frame with brick masonry infill walls
 
Thermal analysis of water cooled charge air cooler in turbo charged diesel en...
Thermal analysis of water cooled charge air cooler in turbo charged diesel en...Thermal analysis of water cooled charge air cooler in turbo charged diesel en...
Thermal analysis of water cooled charge air cooler in turbo charged diesel en...
 
Meta documents and query extension to enhance information retrieval process
Meta documents and query extension to enhance information retrieval processMeta documents and query extension to enhance information retrieval process
Meta documents and query extension to enhance information retrieval process
 
How to take dynamic data in life cycle inventory from brazilian sugarcane eth...
How to take dynamic data in life cycle inventory from brazilian sugarcane eth...How to take dynamic data in life cycle inventory from brazilian sugarcane eth...
How to take dynamic data in life cycle inventory from brazilian sugarcane eth...
 
Real time tracking based on gsm and ir module for running train
Real time tracking based on gsm and ir module for running trainReal time tracking based on gsm and ir module for running train
Real time tracking based on gsm and ir module for running train
 
Optimization techniques for harmonics minimization in cascaded hybrid multile...
Optimization techniques for harmonics minimization in cascaded hybrid multile...Optimization techniques for harmonics minimization in cascaded hybrid multile...
Optimization techniques for harmonics minimization in cascaded hybrid multile...
 
Comparison of performance of lateral load resisting systems in multi storey f...
Comparison of performance of lateral load resisting systems in multi storey f...Comparison of performance of lateral load resisting systems in multi storey f...
Comparison of performance of lateral load resisting systems in multi storey f...
 
Seismic response of multi storey irregular building with floating column
Seismic response of multi storey irregular building with floating columnSeismic response of multi storey irregular building with floating column
Seismic response of multi storey irregular building with floating column
 

Similar to Automatic signature verification with chain code using weighted distance and euclidean distance a review

Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodeSAT Publishing House
 
Signature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkSignature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkIAESIJAI
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemIRJET Journal
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET Journal
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
 
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...IJERD Editor
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Networkijiert bestjournal
 
Study of Distance Measurement Techniques in Context to Prediction Model of We...
Study of Distance Measurement Techniques in Context to Prediction Model of We...Study of Distance Measurement Techniques in Context to Prediction Model of We...
Study of Distance Measurement Techniques in Context to Prediction Model of We...IJSCAI Journal
 
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...ijscai
 
A Review On Recognition Of Online Handwriting In Different Scripts
A Review On Recognition Of Online Handwriting In Different ScriptsA Review On Recognition Of Online Handwriting In Different Scripts
A Review On Recognition Of Online Handwriting In Different ScriptsKarla Adamson
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
 
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...AI Publications
 
A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...Editor IJCATR
 
Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...ijtsrd
 
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition AlgorithmAnalysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithmijcisjournal
 
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...IOSR Journals
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachIJERA Editor
 

Similar to Automatic signature verification with chain code using weighted distance and euclidean distance a review (20)

Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
 
J1802035460
J1802035460J1802035460
J1802035460
 
Signature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkSignature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural network
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Network
 
Study of Distance Measurement Techniques in Context to Prediction Model of We...
Study of Distance Measurement Techniques in Context to Prediction Model of We...Study of Distance Measurement Techniques in Context to Prediction Model of We...
Study of Distance Measurement Techniques in Context to Prediction Model of We...
 
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
 
A Review On Recognition Of Online Handwriting In Different Scripts
A Review On Recognition Of Online Handwriting In Different ScriptsA Review On Recognition Of Online Handwriting In Different Scripts
A Review On Recognition Of Online Handwriting In Different Scripts
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
 
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
 
A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...A Novel Automated Approach for Offline Signature Verification Based on Shape ...
A Novel Automated Approach for Offline Signature Verification Based on Shape ...
 
Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...Handwritten Signature Verification System using Sobel Operator and KNN Classi...
Handwritten Signature Verification System using Sobel Operator and KNN Classi...
 
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition AlgorithmAnalysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
E010122431
E010122431E010122431
E010122431
 
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approach
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniquesEstimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniquesEstimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

Recently uploaded (20)

POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 

Automatic signature verification with chain code using weighted distance and euclidean distance a review

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 05 Issue: 03 | Mar-2016, Available @ http://www.ijret.org 228 AUTOMATIC SIGNATURE VERIFICATION WITH CHAIN CODE USING WEIGHTED DISTANCE AND EUCLIDEAN DISTANCE - A REVIEW Abhilash Deshmukh1 , Shashank Desai2 , Tejas Chaure3 , Akshay Chothe4 , Sunil B Wankhade5 1 Student, Computer Engineering, RGIT, Maharashtra, India 2 Student, Computer Engineering, RGIT, Maharashtra, India 3 Student, Computer Engineering, RGIT, Maharashtra, India 4 Student, Computer Engineering, RGIT, Maharashtra, India 5 Professor, Computer Engineering, RGIT, Maharashtra, India Abstract The signature forgery can be restricted by either online or offline signature verification techniques. It verifies the signature by performing a match with the pre-processed signature dynamically by detecting the motion of stylus during signature while on other hand, offline verifies by performing a match using the two dimensional scanned image of the signature. This paper studies about the various techniques available in offline signature verification along with their shadows. Keywords: Signature Verification, Weighted Distance, High Pressure Factor, Normalization, Threshold Value. ---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION To identify a person in real time instances, it is necessary for him to be authenticated by the system. Signature verification is one of the many methods that can be used for authentication of a person. Signature verification uses references of many signatures taken and it compares the current signature in real time instance. There is an increasing need of using signature verification techniques in different organizations especially financial institutions. With the increasing number of transactions, there is a desire of automatic signature verification to take place for authentication of the individual persons. Signature verification is primarily used for two tasks. The first task is to identify the signature owner; the second task is to take the decision, whether the signature is genuine or forged. Signature verification can be classified in two categories: One is online and other is offline signature verification. Online signature verification scans the signature of the user by tracing the different motion on the stroke of the signature and identifies it against pre-processed signature information. Offline signature verification gives static signature verification information. In this method signature is scanned from the document and is verified against 2D scanned image of the signature. In this paper, we have studied various method such as Support vector machines (SVM), Dynamic time warping (DTW), Neural network (NN), Multi-set features (MSF), Associative Memory Net (AMN), Automatic signature verification with four-dimensional chain code using weighted distance and Euclidian distance (ASV) to discuss the variations offered in offline signature verification methods. 2. APPROACHES FOR SIGNATURE VERIFICATION V. Vapnik [1] introduced a new learning method SVM. It uses set of examples from two classes to find the hyper plane. It refers to hyper plane which has the largest distance to the nearest training set data point and thus it results in good separation of classes. The success achieved in hand written digit recognition made SVM very popular. SVM is based on the structural risk minimization principle (SRM). SRM is based on two main principles: The first one is to control the risk on the training set and the second principle controls the capacity of decision function which used to obtain this risk value. SVM has two classes: Linear separable and Classification problem. Linear separable is used to find the hyper plane with maximum Euclidean distance from the training set. There will be just one optimal hyper plane with the maximal margin d, defined as the sum of distances from the hyper plane to the closest points of the classes. This linear classifier threshold is the optimal separating hyper plane. Then SVM can find an optimal linear separating hyper plane with the maximal margin in this higher dimensional feature space. For a two-class problem, the nonlinear decision function derived from the SVM classifier can be formulated as the kernel function. The kernel is not positive definite but offer some theoretical and empirical explanations. DTW algorithm is used for the measurement of speed and time of two sequences [2]. DTW algorithm can be applied to video, audio, and graphics, and many different applications such as automatic speech recognition. This algorithm can also be utilized to establish linear and non-linear dimensions of the sequences. The basic principle of this method is
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 05 Issue: 03 | Mar-2016, Available @ http://www.ijret.org 229 permitting a range of 'steps' in the space of (time frames in sample as well as in template) and to find the maximum length path between the aligned time frames, subject to the constraints implicit in the allowable steps. We determine the best matching template and sample to find the total similarity cost. Taking into consideration two signatures aligned between L and L’, which known as warping path, denoted as T, and it has two warping function: mean that the point in L corresponds to the element in L‟. Online context can be used to match cost between L and L‟. The path which minimizes the above cost function is the optional warping path. Dynamic programming is used to solve the optimization problem of DTW efficiently. Neural Network is used for authentication and verification of hand written signature [3].Pattern recognition is the main area in which NN is used. The signature verification process parallels this learning mechanism. Neural network uses two kind of different processes: training and learning. The first process is training with the help of extraction method a feature set representing the signature with several samples from different signers. The second process is learning the relationship between a signature and its class. After the second process is completed then the network can be classified to a particular signer. Hence NNs are highly suited to modeling global aspects of handwritten signatures. Alan McCabe et al [4]. He proposed a method for verifying handwritten signatures by using NN architecture. To train NN different types of static and dynamic signature features are extracted. Static features are height, slant etc while dynamic features are velocity, pen tip pressure etc. Now all these and other Network topologies are tested and comparison is made to get accuracy. The resulting system has an overall error rate of 3.3% that was being reported for the best case. Rasha Abbas in his earlier research [5] investigated the suitability of using back propagation neural networks for the purpose of offline signature verification however later on multi-layered feed forward neural network was investigated. Off-line signatures are signatures which usually use in paper works like letters, contracts, and bank checks. This method is related to offline signatures specially. According to Edson J. R. Justino and F.Bortolozzi[6], ASV is processed with the one feature set but to increase the usability of designed ASV in the sense of increasing security best feature set of signatures is used in this technical method. This method is popularly known as new novel MSF based ASV technique. At first, features are examined in two ways these are shape features like handwriting slants and pseudo dynamic features. Distance measure and verification threshold are also calculated. By taking these values for comparison, at the second stage, probability of forgery is decided if DM<VTH. In this condition, signature is processed with the n X n matrix. By fitted signature in the matrices are n X n matrix, three resulted matrices are calculated which are backbone of MSF technique, SR (System Reliability), PCR (Per cent Correct Rejection), PCA (Per cent Correct Acceptance). As the system reliability PCR, PCA has high values, and then signature ids totally matched to best features set that particular sign. There are mainly two steps in MSF technique: 560 genuine signatures are used in MSF technique and forgery signatures are obtained from different 26 writers. The number of genuine signatures and forgeries differ from one person to another. Signatures were extracted from various documents like business documents, bank checks so that the signature data is naturally written under widely different conditions. Reason behind such an extraction of signatures is that forgeries were created with a good attention in order to have convincing forgeries, and some forgeries are real ones obtained from actual caseworks. The second step is to extract signature using different technologies as: a) Feature extraction: This stage of the signature verification and feature selection includes pre- processing. Features in off-line systems have two types mainly. These are Shape features like handwriting slants which can be positive, vertical, negative, and horizontal etc. and relative measures of signature height and width, middle zone width and signature width .Pseudo dynamic feature is nothing but High Pressure Factor. These both type of features are extracted in two ways such as globally on the signature as a whole and locally on the signature divided into specific parts. b) Distance measure: Distance Measure (DM) is used to calculate similarity between input signature and reference by using the Euclidean distance. c) Threshold value: The value of the threshold VTH is calculated by feature selection technique that selects the best feature set which minimizes the error rate as well as maximizes the correct decisions. d) Verification decision: The verification decision to determine whether signature is reliable is proceed with the help of calculated distance measure and threshold value. There are two cases for determination of genuine signature. Effectiveness of the individual features, and their contribution to the effectiveness of the different feature sets, if augmented by, to form a new one. SR (System Reliability = (PCA+PCR)/2). PCA (Percentage of Correct Acceptance that is percentage of genuine signatures accepted as genuine) and PCR (Percentage of Correct Rejection that is percentage of forgeries rejected and classified as attempted forgeries). MSF helps to improve the forgery detection. In other words, the MSF technique is a process of collecting the sparse effectiveness that can be provided by the EFS but cannot be captured by the best feature set. The Associative Memory Net (AMN) detects the forged signature quickly [7]. To handle the cost function detail parametric studies and parallel processing using Open MP is must. These algorithms are used to verify actual signature and tested with a reference of 10 nearly similar signatures.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 05 Issue: 03 | Mar-2016, Available @ http://www.ijret.org 230 The AMN technique finds forgery with accuracy 94.3%, which can be compare with other methods. There are various methods for ASV implementation but there is only one or two signature references used by considering memory storage as well as current image based verification speed. There will be 20 signature references. Each reference signatures is converted to a small number of pre-computed features resulting in verification speeds in excess of 60 verifications per second. These features of specific signer signature are stored in the database. There are features like edge distribution, pixel, slant, pixel density, aspect ratio of signature are stored in dataset. Even if fraudster stole this featured information then also he cannot predict the how is the signature actually. So, important data is being safe and loss can be avoided. The proposed system matches tested signature with reference signature. Test signature features are considered as x and n is the reference signature feature stored in database, where n<=20. System first extract features of the tested signature and that features match with the extracted features of reference signatures. Various Algorithms like extracted features are used for calculating matching function , four- dimensional chain code and normalization are used for computing features of signature. As per the value of matching function, signature is real or fake is decided by system. A step-wise method has been followed in this work. 1. Take signature as an input from document which has to be verified. 2. All the pre-computed features of reference is stored in database. 3. Extract the features of current input signature like Pixel Distribution, Chain Code, Pixel Density, or Aspect Ratio by processing through various stages. 4. Apply Gaussian Filter Formula on the resulted image in step 3. 5. Calculate pixel density cost and Aspect Ratio cost for signature has to be verified by using reference. 6. Calculate Average Match Function for number of references by using formula. 7. If value is 0 then signature is fake and if 100 then it’s accurately matched. 8. By normalizing Match function by using formulae of average and standard deviation, it becomes a Match Function. 9. If value of Match Function is in between 0 to 1 then signature is totally matched. The table compares all the different techniques studied above. Two major criteria that had been used for comparison are False Acceptance Rate (FAR) and False Rejection Rate (FAR). Each technique has varying FAR and FRR. The objective is to choose best technique with acceptable error rates. Although FAR % for Associative Memory Net is least but its FRR % is on higher side. Hence we select ASV as preferred method as it has low FAR and FRR. Table -1: Comparison of FAR and FRR Sr.no Method FAR(%) FRR(%) 1 Support Vector Machine 21.06 15.41 15.41 18.53 15.64 13.12 Linear Poly RBF 2 Dynamic Time Wrapping 34.91 28.93 3 Neural Network 13.26 11.89 4 Multi Set Feature For Offline Signature Verification 16.36 14.58 5 Associative Memory Net 9.7 17.9 6 Feature Based Automated Signature Verification using chain code with Euclidean’s distance 12.6 10.2 3. CONCLUSIONS The signature is becoming most important for authentication and so it becomes necessary to enhance its application with automated systems to avoid forgeries and ultimately the fraud. In this paper we have studied various methods of Signature Verification on the basis of various factors related to it like, no. of references, edge distribution, pixel, slant, pixel density, aspect ratio of signature security, memory management, accuracy including FAR and FRR, which plays important role in verification of signature. REFERENCES [1]. E.Ozgunduz, T.Senturk and M.E Karsligil, “Off-Line Signature Verification and Recognition by Support Vector Machine”, Proceedings of Europian Signal Processing, 2005. [2]. M.S Arya and V. S Inamdar, “A Preliminary Study on Various Off-line Hand Written Signature Verification Approaches”, Proceeding of International Journal of Computer Applications, vol. 1, no.9, 2010 [3]. S.A. Daram T. S. Ibiyemi ola, “Offline Signature Recognition using Hidden Markov Model”, proceeding of International Journal of Computer Applications, vol. 10, no.2, 2010. [4]. K. Huang and Y. Hong, Off-line signature verification based on geometric feature extraction and neural network classification, Patten Recognition, Vol. 30, No. 1, pp. 9-17, 1997. [5]. C. Sansone and M. Vento, Signature verification: increasing performance by a multi-stage system, Pattern Analysis and Applications, Vol. 3, pp. 169-181, 2000. [6]. Anu Rathi, Amrita Ticku, Niti Gupta, Accuracy enhancement in offline signature verification with the use of associative memory, IJCSNS International Journal of computer science and network security, vol14, no.3,March 2014. [7]. Priya Metri , Ashwinder Kaur, ”Handwritten Signature Verification using Instance Based Learning”, International Journal of Computer Trends and Technology- March to April Issue 2011.