SlideShare a Scribd company logo
1 of 7
Download to read offline
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 332
e-ISSN: 2349-9745
p-ISSN: 2393-8161
A Review on Robust identity verification using signature of a person
Khyati P Goswami1
, Prof. Upen Nathwani2
1,2
Department of Computer Engineering, Noble Engineering College, Junagadh, Gujarat 362001,India.
Abstract— Signature is behavioural type biometrics characteristics of human. Signature has been a
distinguishing feature for person identification. In these days increasing number of transactions,
especially related to financial and business are being authorized via signatures. Two types of
verification methods are: Offline signature verification and online signature verification. In this paper
we review various components of offline signature reorganization and verification system, feature
extraction techniques and available techniques.
Keywords-Offline signature verification, types of forgery, feature extraction, FAR, FRR.
I. INTRODUCTION
Pattern recognition deals with the automatic detection and classification of objects and events. The
interest in pattern recognition is so wide that pattern recognition applications attracts researchers and
users belonging to all possible disciplines and areas ranging from business to the most sophisticated
industrial applications. Robust system of recognizing and verifying signature is needed in a wide range
of various banking and civilian applications that involves the use of cellular phones, passports, driver
licenses and automatic teller machines[1].
Fig. 1 Biometric technologies
Signature is a behavioral biometric. One’s signature may change over time and it is not nearly as
unique or difficult to forge as iris patterns or fingerprints, however signature’s widespread acceptance
by the public. This is primarily due to the age old and more usage of handwritten signatures as a means
of personal or human identification and its freedom from association with any privacy leakage or
intrusion related issues. Hence research in developing various biometrics systems that can improve the
accuracy of these handwritten signature verification continues to be of very prime interest to date.
However, it also has the demerits of lower verification and identification precision in comparison with
all the other biometrics because of non-linear changes with size changing and its dependency on time
and emotion [1].
Overall signature verification can be divided into two parts. Offline (static) signature verification and
online (dynamic) signature verification. Off line signature verification make use of image of a
signature which is put on the paper and then scanned by scanner. Online signature verification uses
dynamic properties like pen downs and pen ups, signature trajectory, time stamping, pen pressure, etc.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 333
Which are captured by a pen based tablet or device. Online signature verification is more reliable,
robust, and accurate than offline signature verification as its overall dynamic properties makes the
process of forging or copying an online signature more difficult. In real word these detail is too difficult
to gather. It required lots of observation and detailed recording of it. Offline signature verification do
not required any special hardware. It is simpler and user friendly than online signature verification
system.[2]
II. TYPES OF FORGERY
Signature verification system based on the fact that signature of a person is unique. Signature
verification system is used to authenticate a person’s identity. It determines a genuine signature from
a forgery. In offline signature verification signature is taken on a piece of paper and then scanned by
scanner to convert it into digital form. [3]
Two signatures can be never same. Even it is done by the same person. even if two signatures are
exactly same, then one of them is not a original signature but is a duplicate copy of the other that may
be a machine copy, for e.g., one produced by a photocopier or computer, or a manually produced copy.
So the aim of the signature verification system is to classify between two types: the original and the
forgery. These classifications are related to intrapersonal variability and interpersonal variability. The
variation of signatures of same person is called Intrapersonal Variation. The variation between
genuine/original and forgeries is called as Inter Personal Variation. [3]
Forgery means that some person is trying to make false signature of some another person for
authentication purpose. Forgeries are classified into three types [4]
1. Random/Simple Forgery: This is also called as simple forgery and it is very easy to detect as
compared to others forgery. The person creates a signature in his own style by just knowing the name
of a person whose signature is to be made.
2. Unskilled Forgery: The person creates a signature after observing the signature once or twice without
any previous experience.
3. Skilled Forgery: The person may be a professional in making copy of signatures. He makes a
signature after having a good practice over it. He may be expert in making forgeries. Such signatures
are most difficult to detect.
To evaluate system’s performance generally two types of errors are used. Type-I error and Type – II
error. In type – I error genuine signature is falsely rejected by system. In Type- II error forged signature
is accepted by system. These two errors are known as False Rejection Rate (FRR) and False
Acceptance Rate (FAR). To measure or evaluate the performance of method, the term Equal Error
Rate is used. Equal Error Rate is the point at which both FRR and FAR has the same value.[4]
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 334
III. WORKING SIGNATURE VERIFICATION SYSTEM
Fig: 2 Offline signature verification system
An offline SV includes generally four steps [4]:
1. Data Acquisition and Data pre-processing
2. Feature Extraction
3. Verification
A.Data Acquisition.
On the basis of how data is acquired, there are two categories of systems for signature verification:
offline (static) systems and online (dynamic) systems. Static systems use offline acquisition tablets or
devices that perform data acquisition after the whole signature writing process has been completed. In
this case, the signature is represented as a gray level Image. Instead, dynamic systems use online
acquisition tablets or devices that generate electronic signals that represents signature during the
writing process.
B. Data Pre-processing
A pre-processing stage is done to improve the signature image after scanning it using a scanner device.
This stage will influence the accuracy and reduce the computational time. This block may include
Conversion from RGB to black and white image, inverting the image
, skew detection and correction, noise removal, signature cropping and image normalization (resizing),
thinning the normalised image etc.
C. Feature extraction
It is the process of extracting the characteristics or attributes from an image. The accuracy of
verification in pattern systems depends mainly on the extracted features. We can classify the signature
verification systems in terms of extracted features into two kinds:
Data Acquisition
AND
preprocessing
Feature extraction
block
Verification
Block
Knowledge Base
Result
Input
signature
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 335
1. Global features
Global features describes the signature image as a whole like length, width, density, edge points of
the signature, and wavelet transforms. These features are less sensitive to noise and signature
variations. Global features may include Signature Height, Height-to-Width Ratio, Pure Width, Pure
Height, Image Area, Maximum Horizontal Projection and Maximum Vertical Projection.
2. Local features
Which describe a small area of signature image and extract information in more details from it, it
is more accurate than the global one but the computational time is high, it can be divided into two
groups: statistical and geometrical features.
Statistical features: these are taken from pixel distribution of the signature image
Geometrical features: Geometrical features describe the geometrical characteristics of the signature
image; Geometrical features have the ability to tolerate with distortion, style variations, rotation
variations and certain degree of translation.
D. Verification
In this step, the reference features are compared with test features and signature is verified whether it
is original or forges. Verification techniques usually divided into three parts which are: Template
matching, Structural and Statistical. Template matching includes displacement function, Dynamic
Time Wrapping, Euclidean distance. Structural approach includes String Graph Matching, Structural
Description Graph etc. Statistical approach includes neural networks, hidden markov models etc. Out
of these, most commonly used verification techniques are Neural Network, Hidden Markov Model and
Support Vector Machine.
IV. RELATED WORK
Chuang [4] introduced a method for dividing the signature into three regions (upper, middle, and
lower) out of which a number of global features were extracted. The features and their ratios were
compared with those of the reference signature, using weighted distance as the dissimilarity metric.
Chuang reports a 20% equal error rate for the proposed method. As can be inferred from the results of
the systems, using only global image features is not sufficient.
H. Baltzakis [5] presented a new technique for offline signature recognition and verification. The
proposed system is based on global, grid and texture features. For each one of these feature sets a
special two stage Perceptron OCON (one-class-one-network) classification structure has been
implemented. In the first stage, the classifier combines the decision results of the neural networks and
the Euclidean distance obtained using the three feature sets. The results of the first-stage classifier feed
a second-stage radial base function (RBF) neural network structure, which makes the final decision.
The entire system was extensively tested with large amount of data and yielded a false acceptance rate
is 9.81% and the false rejection rate is 3%. The implementation of neural network is very difficult and
it takes more time to train the database.
Bradley Schafer [7] present an off-line signature verification and recognition system based on a
combination of features extracted such as global features, mask features and grid features. The system
is trained using a database of signatures. For each person, a centroid feature vector is obtained from a
set of his/her genuine samples using the features that were extracted. The centroid signature is then
used as a template which is used to verify a claimed signature. To obtain a satisfactory measure of
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 336
similarity between our template signature and the claimed signature, we use the Euclidean distance in
the feature space. The results were very promising and a success rate of 84.1% was achieved using a
localized threshold.
Debasish Jena [8] proposed Improved Offline Signature Verification Scheme Using Feature Point
Extraction Method. The scheme is based on selecting 60 feature points from the geometric centre of
the signature and compares them with the already trained feature points. these paper is improved
version of scheme proposed by Banshider Majhi. FAR and FRR for proposed scheme gives improve
result than existing scheme. There are few more feature extraction techniques available , we discuss
only some of them
V. CONCLUSION
Offline signature verification system is easy to implement. Also it is highly adaptable. the ease of
embedding the system in a business, organization or industries, without excessively affecting existing
operations.In this paper we presents Offline signature verification system’s overview, stepwise each
block’s functionality. We classify offline signature verification systems in terms of extracted features
type into local and global features and also we classify local features into statistical and geometrical
features. We have tried to analyze and study various methods of offline signature verification and
hence provide a somewhat literature platform.
REFERENCES
[1] Anil K. Jain, Arun Ross and Salil Prabhakar, “An Introduction to Biometric Recognition”, IEEE Transactions on
Circuits and Systems for Video Technology, Vol. 14, No. 1, January 2004.
[2] D. Impedovo and G. Pirlo, "Automatic Signature Verification: The State of the Art", IEEE transactions on systems,
man, and cybernetics, vol.3S, pp. 609-635,200S
[3] Rahul Dubey, Dheeraj K Agrawal” Comparative Analysis of Off-line Signature Recognition: 2012 International
Conference on Communication, Information & Computing Technology (ICCICT), Oct. 19-20, Mumbai, India
[4] Debasish lena, Banshidhar Majhi, Sarojkumar Panigrahy, Sanjay Kumar Jena, "Improved Offline Signature
Verification Scheme Using Feature Point Extraction Method", Proc. 7th IEEE In!. Conference. On Cognitive
Informatics, pp. 475 - 4S0, ICCI 200S.
[5] P. C. Chuang, “Machine Verification of Handwritten Signature Image”, Inn Proceedings of International Conference
on Crime Countermeasure, pp. 105- 109, 1977.
[6] H. Baltzakis, N. Papamarkos, “A new signature verification technique based on a two-stage neural network classifier”,
Engineering Applications of Artificial Intelligence 14,pp.95-103,2001.
[7] Bradley Schafer, Serestina Viriri,” An Off-Line Signature Verification System” International Conference on Signal
and Image Processing Applications, pp.95-100,2009.
[8] Debasish Jena, Saroj Kumar Panigrahy,”Improved Offline Signature Verification Scheme Using Feature Point
Extraction Method”, 7th
IEEE International Conference on Cognitive Informarics, pp 475-480,2008.
[9] Shashi Kumar, K B Raja, R K Chhotaray,” Off-line Signature Verification Based on Grid and Global Features Using
Neural Networks”, International Journal Of Engineering Science and Technology, Vol 2(12), pp 7035-7044, 2010.
[10] Piotr Parwik, “ The compact three stages method of the signature recognition”, 6th
International Conference on
Computer Information systems and Industrial management application (CISIM’07), 2007..
[11] M.S.Shirdhonkar, Manesh Kokare,” Off-line Handwritten Signature Identification Using Rotated Complex Wavelet
Filters”, International Journal Of Computer Science, vol 8, Issue 1,pp 748-753, 2011
[12] Mina Fakhalai, Hamid Reza,”off line signature recognition based on contourlet transform”, International Confernce
on Machine Learning and Computing, vol.3, pp 198-203,2011.
[13] Vu Nguyen, Graham Leedham,”Global features for the off-line signature verification problem ”,10th
International
Conference on Document Analysis and Recognition, pp 1301-1304, 2009.
Shashi Kumar, K B Raja, R K Chhotaray,” Off-line Signature Verification Based on Grid and Global Features Using
Neural Networks”, International Journal Of Engineering Science and Technology, Vol 2(12), pp 7035-7044, 2010.
A Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a person

More Related Content

What's hot

Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...CSCJournals
 
HMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD ParameterHMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD Parameterijtsrd
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011prasanna9
 
User Identity Verification via Mouse Dynamics
User Identity Verification via Mouse DynamicsUser Identity Verification via Mouse Dynamics
User Identity Verification via Mouse DynamicsOuzza Brahim
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesIAEME Publication
 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Bhargav Amin
 
Offline and online signature verification systems a survey
Offline and online signature verification systems a surveyOffline and online signature verification systems a survey
Offline and online signature verification systems a surveyeSAT Publishing House
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febNavin Kumar
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationIRJET Journal
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...Alexander Decker
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometricsanoop80686
 

What's hot (20)

C010221930
C010221930C010221930
C010221930
 
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
 
HMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD ParameterHMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD Parameter
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
Av26303311
Av26303311Av26303311
Av26303311
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
 
User Identity Verification via Mouse Dynamics
User Identity Verification via Mouse DynamicsUser Identity Verification via Mouse Dynamics
User Identity Verification via Mouse Dynamics
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
 
1694 1698
1694 16981694 1698
1694 1698
 
Offline and online signature verification systems a survey
Offline and online signature verification systems a surveyOffline and online signature verification systems a survey
Offline and online signature verification systems a survey
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
Biometric authentication reiew
Biometric authentication reiewBiometric authentication reiew
Biometric authentication reiew
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris Features
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 

Viewers also liked

Viewers also liked (16)

Baleares
BalearesBaleares
Baleares
 
CVJ_30480850_20150816195134
CVJ_30480850_20150816195134CVJ_30480850_20150816195134
CVJ_30480850_20150816195134
 
Calendario Viernes 18 Diciembre 2015
Calendario Viernes 18 Diciembre 2015Calendario Viernes 18 Diciembre 2015
Calendario Viernes 18 Diciembre 2015
 
I c14 e ic15
I c14 e ic15I c14 e ic15
I c14 e ic15
 
0033SportsOS11Sept2015
0033SportsOS11Sept20150033SportsOS11Sept2015
0033SportsOS11Sept2015
 
Session 4 the 5 cardinal points
Session 4 the 5 cardinal points Session 4 the 5 cardinal points
Session 4 the 5 cardinal points
 
20151126 smb maroeska rovers
20151126 smb maroeska rovers20151126 smb maroeska rovers
20151126 smb maroeska rovers
 
Elvetia
ElvetiaElvetia
Elvetia
 
KERAJAAN AWAL ASIA TENGGARA
KERAJAAN AWAL ASIA TENGGARAKERAJAAN AWAL ASIA TENGGARA
KERAJAAN AWAL ASIA TENGGARA
 
Poverty and a 21st Century Welfare System
Poverty and a 21st Century Welfare SystemPoverty and a 21st Century Welfare System
Poverty and a 21st Century Welfare System
 
23 dibuj arte
23   dibuj arte23   dibuj arte
23 dibuj arte
 
Mediciones electricas
Mediciones electricasMediciones electricas
Mediciones electricas
 
Barómetro de GAD3 para ABC 13-14 de marzo
Barómetro de GAD3 para ABC  13-14 de marzoBarómetro de GAD3 para ABC  13-14 de marzo
Barómetro de GAD3 para ABC 13-14 de marzo
 
Dibuj arte tomo 15 especial fondos
Dibuj arte tomo 15   especial fondosDibuj arte tomo 15   especial fondos
Dibuj arte tomo 15 especial fondos
 
Growing OpenStack
Growing OpenStackGrowing OpenStack
Growing OpenStack
 
07 Dashboard Ditties Sept 2015
07 Dashboard Ditties Sept 201507 Dashboard Ditties Sept 2015
07 Dashboard Ditties Sept 2015
 

Similar to A Review on Robust identity verification using signature of a person

OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesIOSR Journals
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkEditor IJMTER
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signatureMazin Alwaaly
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMAM Publications
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodeSAT Publishing House
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...CSCJournals
 
Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Editor Jacotech
 
Comprehensive Review of Offline Signature Verification Mechanisms
Comprehensive Review of Offline Signature Verification MechanismsComprehensive Review of Offline Signature Verification Mechanisms
Comprehensive Review of Offline Signature Verification Mechanismsijtsrd
 
vargas2011.pdf
vargas2011.pdfvargas2011.pdf
vargas2011.pdfHouBou3
 
An appraisal of offline signature verification techniques
An appraisal of offline signature verification techniquesAn appraisal of offline signature verification techniques
An appraisal of offline signature verification techniquesSalam Shah
 
Signature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkSignature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkIAESIJAI
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...eSAT Journals
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
 
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABAM Publications
 
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET Journal
 

Similar to A Review on Robust identity verification using signature of a person (20)

OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
 
B017150823
B017150823B017150823
B017150823
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signature
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
 
Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...Offline Handwritten Signature Identification and Verification using Multi-Res...
Offline Handwritten Signature Identification and Verification using Multi-Res...
 
Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...
 
Comprehensive Review of Offline Signature Verification Mechanisms
Comprehensive Review of Offline Signature Verification MechanismsComprehensive Review of Offline Signature Verification Mechanisms
Comprehensive Review of Offline Signature Verification Mechanisms
 
vargas2011.pdf
vargas2011.pdfvargas2011.pdf
vargas2011.pdf
 
An appraisal of offline signature verification techniques
An appraisal of offline signature verification techniquesAn appraisal of offline signature verification techniques
An appraisal of offline signature verification techniques
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 
Signature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural networkSignature verification based on proposed fast hyper deep neural network
Signature verification based on proposed fast hyper deep neural network
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
 
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetEditor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSEditor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

Recently uploaded

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 

Recently uploaded (20)

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 

A Review on Robust identity verification using signature of a person

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 332 e-ISSN: 2349-9745 p-ISSN: 2393-8161 A Review on Robust identity verification using signature of a person Khyati P Goswami1 , Prof. Upen Nathwani2 1,2 Department of Computer Engineering, Noble Engineering College, Junagadh, Gujarat 362001,India. Abstract— Signature is behavioural type biometrics characteristics of human. Signature has been a distinguishing feature for person identification. In these days increasing number of transactions, especially related to financial and business are being authorized via signatures. Two types of verification methods are: Offline signature verification and online signature verification. In this paper we review various components of offline signature reorganization and verification system, feature extraction techniques and available techniques. Keywords-Offline signature verification, types of forgery, feature extraction, FAR, FRR. I. INTRODUCTION Pattern recognition deals with the automatic detection and classification of objects and events. The interest in pattern recognition is so wide that pattern recognition applications attracts researchers and users belonging to all possible disciplines and areas ranging from business to the most sophisticated industrial applications. Robust system of recognizing and verifying signature is needed in a wide range of various banking and civilian applications that involves the use of cellular phones, passports, driver licenses and automatic teller machines[1]. Fig. 1 Biometric technologies Signature is a behavioral biometric. One’s signature may change over time and it is not nearly as unique or difficult to forge as iris patterns or fingerprints, however signature’s widespread acceptance by the public. This is primarily due to the age old and more usage of handwritten signatures as a means of personal or human identification and its freedom from association with any privacy leakage or intrusion related issues. Hence research in developing various biometrics systems that can improve the accuracy of these handwritten signature verification continues to be of very prime interest to date. However, it also has the demerits of lower verification and identification precision in comparison with all the other biometrics because of non-linear changes with size changing and its dependency on time and emotion [1]. Overall signature verification can be divided into two parts. Offline (static) signature verification and online (dynamic) signature verification. Off line signature verification make use of image of a signature which is put on the paper and then scanned by scanner. Online signature verification uses dynamic properties like pen downs and pen ups, signature trajectory, time stamping, pen pressure, etc.
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 333 Which are captured by a pen based tablet or device. Online signature verification is more reliable, robust, and accurate than offline signature verification as its overall dynamic properties makes the process of forging or copying an online signature more difficult. In real word these detail is too difficult to gather. It required lots of observation and detailed recording of it. Offline signature verification do not required any special hardware. It is simpler and user friendly than online signature verification system.[2] II. TYPES OF FORGERY Signature verification system based on the fact that signature of a person is unique. Signature verification system is used to authenticate a person’s identity. It determines a genuine signature from a forgery. In offline signature verification signature is taken on a piece of paper and then scanned by scanner to convert it into digital form. [3] Two signatures can be never same. Even it is done by the same person. even if two signatures are exactly same, then one of them is not a original signature but is a duplicate copy of the other that may be a machine copy, for e.g., one produced by a photocopier or computer, or a manually produced copy. So the aim of the signature verification system is to classify between two types: the original and the forgery. These classifications are related to intrapersonal variability and interpersonal variability. The variation of signatures of same person is called Intrapersonal Variation. The variation between genuine/original and forgeries is called as Inter Personal Variation. [3] Forgery means that some person is trying to make false signature of some another person for authentication purpose. Forgeries are classified into three types [4] 1. Random/Simple Forgery: This is also called as simple forgery and it is very easy to detect as compared to others forgery. The person creates a signature in his own style by just knowing the name of a person whose signature is to be made. 2. Unskilled Forgery: The person creates a signature after observing the signature once or twice without any previous experience. 3. Skilled Forgery: The person may be a professional in making copy of signatures. He makes a signature after having a good practice over it. He may be expert in making forgeries. Such signatures are most difficult to detect. To evaluate system’s performance generally two types of errors are used. Type-I error and Type – II error. In type – I error genuine signature is falsely rejected by system. In Type- II error forged signature is accepted by system. These two errors are known as False Rejection Rate (FRR) and False Acceptance Rate (FAR). To measure or evaluate the performance of method, the term Equal Error Rate is used. Equal Error Rate is the point at which both FRR and FAR has the same value.[4]
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 334 III. WORKING SIGNATURE VERIFICATION SYSTEM Fig: 2 Offline signature verification system An offline SV includes generally four steps [4]: 1. Data Acquisition and Data pre-processing 2. Feature Extraction 3. Verification A.Data Acquisition. On the basis of how data is acquired, there are two categories of systems for signature verification: offline (static) systems and online (dynamic) systems. Static systems use offline acquisition tablets or devices that perform data acquisition after the whole signature writing process has been completed. In this case, the signature is represented as a gray level Image. Instead, dynamic systems use online acquisition tablets or devices that generate electronic signals that represents signature during the writing process. B. Data Pre-processing A pre-processing stage is done to improve the signature image after scanning it using a scanner device. This stage will influence the accuracy and reduce the computational time. This block may include Conversion from RGB to black and white image, inverting the image , skew detection and correction, noise removal, signature cropping and image normalization (resizing), thinning the normalised image etc. C. Feature extraction It is the process of extracting the characteristics or attributes from an image. The accuracy of verification in pattern systems depends mainly on the extracted features. We can classify the signature verification systems in terms of extracted features into two kinds: Data Acquisition AND preprocessing Feature extraction block Verification Block Knowledge Base Result Input signature
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 335 1. Global features Global features describes the signature image as a whole like length, width, density, edge points of the signature, and wavelet transforms. These features are less sensitive to noise and signature variations. Global features may include Signature Height, Height-to-Width Ratio, Pure Width, Pure Height, Image Area, Maximum Horizontal Projection and Maximum Vertical Projection. 2. Local features Which describe a small area of signature image and extract information in more details from it, it is more accurate than the global one but the computational time is high, it can be divided into two groups: statistical and geometrical features. Statistical features: these are taken from pixel distribution of the signature image Geometrical features: Geometrical features describe the geometrical characteristics of the signature image; Geometrical features have the ability to tolerate with distortion, style variations, rotation variations and certain degree of translation. D. Verification In this step, the reference features are compared with test features and signature is verified whether it is original or forges. Verification techniques usually divided into three parts which are: Template matching, Structural and Statistical. Template matching includes displacement function, Dynamic Time Wrapping, Euclidean distance. Structural approach includes String Graph Matching, Structural Description Graph etc. Statistical approach includes neural networks, hidden markov models etc. Out of these, most commonly used verification techniques are Neural Network, Hidden Markov Model and Support Vector Machine. IV. RELATED WORK Chuang [4] introduced a method for dividing the signature into three regions (upper, middle, and lower) out of which a number of global features were extracted. The features and their ratios were compared with those of the reference signature, using weighted distance as the dissimilarity metric. Chuang reports a 20% equal error rate for the proposed method. As can be inferred from the results of the systems, using only global image features is not sufficient. H. Baltzakis [5] presented a new technique for offline signature recognition and verification. The proposed system is based on global, grid and texture features. For each one of these feature sets a special two stage Perceptron OCON (one-class-one-network) classification structure has been implemented. In the first stage, the classifier combines the decision results of the neural networks and the Euclidean distance obtained using the three feature sets. The results of the first-stage classifier feed a second-stage radial base function (RBF) neural network structure, which makes the final decision. The entire system was extensively tested with large amount of data and yielded a false acceptance rate is 9.81% and the false rejection rate is 3%. The implementation of neural network is very difficult and it takes more time to train the database. Bradley Schafer [7] present an off-line signature verification and recognition system based on a combination of features extracted such as global features, mask features and grid features. The system is trained using a database of signatures. For each person, a centroid feature vector is obtained from a set of his/her genuine samples using the features that were extracted. The centroid signature is then used as a template which is used to verify a claimed signature. To obtain a satisfactory measure of
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 336 similarity between our template signature and the claimed signature, we use the Euclidean distance in the feature space. The results were very promising and a success rate of 84.1% was achieved using a localized threshold. Debasish Jena [8] proposed Improved Offline Signature Verification Scheme Using Feature Point Extraction Method. The scheme is based on selecting 60 feature points from the geometric centre of the signature and compares them with the already trained feature points. these paper is improved version of scheme proposed by Banshider Majhi. FAR and FRR for proposed scheme gives improve result than existing scheme. There are few more feature extraction techniques available , we discuss only some of them V. CONCLUSION Offline signature verification system is easy to implement. Also it is highly adaptable. the ease of embedding the system in a business, organization or industries, without excessively affecting existing operations.In this paper we presents Offline signature verification system’s overview, stepwise each block’s functionality. We classify offline signature verification systems in terms of extracted features type into local and global features and also we classify local features into statistical and geometrical features. We have tried to analyze and study various methods of offline signature verification and hence provide a somewhat literature platform. REFERENCES [1] Anil K. Jain, Arun Ross and Salil Prabhakar, “An Introduction to Biometric Recognition”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. 1, January 2004. [2] D. Impedovo and G. Pirlo, "Automatic Signature Verification: The State of the Art", IEEE transactions on systems, man, and cybernetics, vol.3S, pp. 609-635,200S [3] Rahul Dubey, Dheeraj K Agrawal” Comparative Analysis of Off-line Signature Recognition: 2012 International Conference on Communication, Information & Computing Technology (ICCICT), Oct. 19-20, Mumbai, India [4] Debasish lena, Banshidhar Majhi, Sarojkumar Panigrahy, Sanjay Kumar Jena, "Improved Offline Signature Verification Scheme Using Feature Point Extraction Method", Proc. 7th IEEE In!. Conference. On Cognitive Informatics, pp. 475 - 4S0, ICCI 200S. [5] P. C. Chuang, “Machine Verification of Handwritten Signature Image”, Inn Proceedings of International Conference on Crime Countermeasure, pp. 105- 109, 1977. [6] H. Baltzakis, N. Papamarkos, “A new signature verification technique based on a two-stage neural network classifier”, Engineering Applications of Artificial Intelligence 14,pp.95-103,2001. [7] Bradley Schafer, Serestina Viriri,” An Off-Line Signature Verification System” International Conference on Signal and Image Processing Applications, pp.95-100,2009. [8] Debasish Jena, Saroj Kumar Panigrahy,”Improved Offline Signature Verification Scheme Using Feature Point Extraction Method”, 7th IEEE International Conference on Cognitive Informarics, pp 475-480,2008. [9] Shashi Kumar, K B Raja, R K Chhotaray,” Off-line Signature Verification Based on Grid and Global Features Using Neural Networks”, International Journal Of Engineering Science and Technology, Vol 2(12), pp 7035-7044, 2010. [10] Piotr Parwik, “ The compact three stages method of the signature recognition”, 6th International Conference on Computer Information systems and Industrial management application (CISIM’07), 2007.. [11] M.S.Shirdhonkar, Manesh Kokare,” Off-line Handwritten Signature Identification Using Rotated Complex Wavelet Filters”, International Journal Of Computer Science, vol 8, Issue 1,pp 748-753, 2011 [12] Mina Fakhalai, Hamid Reza,”off line signature recognition based on contourlet transform”, International Confernce on Machine Learning and Computing, vol.3, pp 198-203,2011. [13] Vu Nguyen, Graham Leedham,”Global features for the off-line signature verification problem ”,10th International Conference on Document Analysis and Recognition, pp 1301-1304, 2009. Shashi Kumar, K B Raja, R K Chhotaray,” Off-line Signature Verification Based on Grid and Global Features Using Neural Networks”, International Journal Of Engineering Science and Technology, Vol 2(12), pp 7035-7044, 2010.