Submit Search
Upload
A Fusion of Statistical Distance and Signature Length Based Approach for Offline Signature Verification
•
0 likes
•
89 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i7/IRJET-V4I7377.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
IRJET Journal
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET Journal
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face Recognition
IRJET Journal
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
IRJET Journal
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET Journal
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detection
IRJET Journal
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET Journal
50120130406045
50120130406045
IAEME Publication
Recommended
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
IRJET Journal
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET Journal
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face Recognition
IRJET Journal
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
IRJET Journal
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET Journal
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detection
IRJET Journal
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET Journal
50120130406045
50120130406045
IAEME Publication
Signature recognition
Signature recognition
Vijju Lakkundi
IRJET- VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
IRJET Journal
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
IJERA Editor
Offline and online signature verification systems a survey
Offline and online signature verification systems a survey
eSAT Publishing House
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologies
iosrjce
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET Journal
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
IJECEIAES
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET Journal
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
IOSR Journals
IRJET- A Review on Automated Systems for Deformation Detection in Glasses
IRJET- A Review on Automated Systems for Deformation Detection in Glasses
IRJET Journal
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET Journal
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET Journal
A Review on Fabric Defect Detection Techniques
A Review on Fabric Defect Detection Techniques
IRJET Journal
1725 1731
1725 1731
Editor IJARCET
Survey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chain
ijcseit
Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature System
IRJET Journal
Choudhary2015
Choudhary2015
Amit Kabra
Cursive Handwriting Recognition System using Feature Extraction and Artif...
Cursive Handwriting Recognition System using Feature Extraction and Artif...
IRJET Journal
Signature Verification System using CNN & SNN
Signature Verification System using CNN & SNN
IRJET Journal
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
IRJET Journal
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
eSAT Publishing House
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection Techniques
IRJET Journal
More Related Content
What's hot
Signature recognition
Signature recognition
Vijju Lakkundi
IRJET- VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
IRJET Journal
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
IJERA Editor
Offline and online signature verification systems a survey
Offline and online signature verification systems a survey
eSAT Publishing House
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologies
iosrjce
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET Journal
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
IJECEIAES
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET Journal
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
IOSR Journals
IRJET- A Review on Automated Systems for Deformation Detection in Glasses
IRJET- A Review on Automated Systems for Deformation Detection in Glasses
IRJET Journal
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET Journal
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET Journal
A Review on Fabric Defect Detection Techniques
A Review on Fabric Defect Detection Techniques
IRJET Journal
1725 1731
1725 1731
Editor IJARCET
Survey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chain
ijcseit
What's hot
(15)
Signature recognition
Signature recognition
IRJET- VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Offline and online signature verification systems a survey
Offline and online signature verification systems a survey
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologies
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic Algorithm
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
IRJET- A Review on Automated Systems for Deformation Detection in Glasses
IRJET- A Review on Automated Systems for Deformation Detection in Glasses
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection System
A Review on Fabric Defect Detection Techniques
A Review on Fabric Defect Detection Techniques
1725 1731
1725 1731
Survey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chain
Similar to A Fusion of Statistical Distance and Signature Length Based Approach for Offline Signature Verification
Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature System
IRJET Journal
Choudhary2015
Choudhary2015
Amit Kabra
Cursive Handwriting Recognition System using Feature Extraction and Artif...
Cursive Handwriting Recognition System using Feature Extraction and Artif...
IRJET Journal
Signature Verification System using CNN & SNN
Signature Verification System using CNN & SNN
IRJET Journal
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
IRJET Journal
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
eSAT Publishing House
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection Techniques
IRJET Journal
Privacy Preservation using Partition Technique
Privacy Preservation using Partition Technique
IRJET Journal
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
IRJET Journal
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET Journal
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
IRJET Journal
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET Journal
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...
IRJET Journal
Ijetcas14 337
Ijetcas14 337
Iasir Journals
Cryptography and error correction code for iris biometric recognition system
Cryptography and error correction code for iris biometric recognition system
IRJET Journal
Biometric Ear Recognition System
Biometric Ear Recognition System
IRJET Journal
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET Journal
Introduction To Palmprint Recognition
Introduction To Palmprint Recognition
IRJET Journal
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
IRJET Journal
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET Journal
Similar to A Fusion of Statistical Distance and Signature Length Based Approach for Offline Signature Verification
(20)
Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature System
Choudhary2015
Choudhary2015
Cursive Handwriting Recognition System using Feature Extraction and Artif...
Cursive Handwriting Recognition System using Feature Extraction and Artif...
Signature Verification System using CNN & SNN
Signature Verification System using CNN & SNN
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection Techniques
Privacy Preservation using Partition Technique
Privacy Preservation using Partition Technique
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...
Ijetcas14 337
Ijetcas14 337
Cryptography and error correction code for iris biometric recognition system
Cryptography and error correction code for iris biometric recognition system
Biometric Ear Recognition System
Biometric Ear Recognition System
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
Introduction To Palmprint Recognition
Introduction To Palmprint Recognition
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
LewisJB
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
C Sai Kiran
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
asadnawaz62
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Dr SOUNDIRARAJ N
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Chandu841456
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
Effects of rheological properties on mixing
Effects of rheological properties on mixing
viprabot1
Recently uploaded
(20)
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Effects of rheological properties on mixing
Effects of rheological properties on mixing
A Fusion of Statistical Distance and Signature Length Based Approach for Offline Signature Verification
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1779 A Fusion of Statistical Distance and Signature Length Based Approach for Offline Signature Verification Yashpal jitarwal1, Pawan mangal2, Tabrej ahamad khan3 1Govt. polytechnic college , sheopur 2,3 DR. B.R. Ambedkar NIT Jalandhar ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In today’s society signatures are the most accepted form of identity verification. However, they have the unfortunate side-effect of being easily abused by those who would feign the identification or intent of an individual. A great deal of work has been done in the area of off-line signature verification over the past two decades. Off-line systems are of interest in scenarios where only hard copies of signatures are available, especially where a large number of documents need to be authenticated Key Words: Thining,Smoothing, Binarization , Gravity, Statistical distance. 1.INTRODUCTION Humans usually recognize each other based on theirvarious characteristics for ages. We recognize others by their face when we meet them and by their voice as we speak to them. These characteristics are their identity. To achieve more reliable verification or identification we should use something that really recognizes the given person. 1.1 BIOMETRICS The term "Biometrics" is gotten from the Greek words bio (life) and metric (to measure). Biometrics implies the automatic identification of a person based on his/her physiological or behavioral characteristics. This method of verification is preferred over traditional methods involving passwords and PIN numbers for its accuracy and case sensitiveness. A biometric system is essentially a pattern recognition system which makes a personal identificationby determining the authenticity of a specific physiological or behavioral characteristic possessed by the user 1.2 SIGNATURE VERIFICATION Signature verification is a common behavioral biometric to identify human beings for purposes of verifying their identity. Signatures are particularly useful for identification of a particular person because each person’s signature is highly unique, especially if the dynamic properties of the signature are considered in addition to the static features of the signature. Even if skilled forgers can accurately reproduce the shape of signatures, but it isunlikelythatthey can simultaneously reproduce the dynamic properties as well. 2. Literature survey Literature survey regarding the previous work and related approach about offline signature verification is presented. Signature from a special classofhandwritinginwhichlegible letters or words may not be exhibited. They provide secure means for authentication attestation and authorization in legal, banking or other high security environments. Signature verification problem pertains to determining where a particular signature is verily written by a person so that forgeries can be detected. Based on the hardware front- end, a signature verification can be classified aseitheroffline or online. 2 FEATURE EXTRACTIONS AND SELECTION Feature extraction is the process of extracting the characteristics of a preprocessed signature image. This process must be supported by feature selection that will highly influence the results in the evaluation of the comparison method. It is paramount to choose and extract feature that are computationally feasible. Lead to good classification rate sample system with low false rejection rate and low false acceptance rate. Reduce the problem data intoa manageableamount of information without affecting the signature structure 2.1 Global Feature Extraction kai et al. [1] also proposed a method with the help NN architecture. Here various static features e.g. slant or height etc. and dynamic features e.g. pressure or velocity etc. are extracted and then used for training the Neural Network. Many Network topologies are also tested and then accuracy of all of them is compared. This system performed very well and has an error rate of 3.3% (Best case).
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1780 2.2.2 Grid Based Feature Peter et al. [6] proposed Feature point extraction method in which Vertical and horizontal splittingofthesignatureimage was done to extract a total of 60 featurepoints (30each).The features are based upon the 2 sets of points in two dimensional plane. The vertical splitting of the signature image produces 30 feature points (v1, v2, v3, v30) and horizontal splitting produces 30 feature points (h1, h2, h3 ,, h30). Central geometric point of the signature image is used to obtain these 60 feature points 3. WORK RELATED TO VERIFICATION STRATGIES This section categorizes some research in offline signature verification according to the technique used to perform verification, that is, Distance Classifiers, Artificial Neural Networks, Hidden Markov Models, Dynamic Time Warping, Support Vector Machines, Structural Techniques and Bayesian Networks. 2.3.1 Template Matching Approach It is a process of pattern comparison so it is called “template matching”. A test signature is matched with templates of genuine signatures stored in a knowledge base; the most common approaches use Dynamic Time Wrapping (DTW) for signature matching. 2.3.2 Neural Networks Approach The main reasons for the widespread usage of neural networks (NNs) in pattern recognition are their power (the sophisticated techniques used in NNs allow a capability of modeling quite complex functions) and ease of use (as NNs learn by example it is only necessary for a user to gather a highly representative data set and then invoke training algorithms to learn the underlying structureofthedata).The signature verification process parallels this learning mechanism. There are many ways to structure the NN training, but a very simple approach is to firstly extract a feature set representing the signature 2.3.2 Neural Networks Approach The main reasons for the widespread usage of neural networks (NNs) in pattern recognition are their power (the sophisticated techniques used in NNs allow a capability of modeling quite complex functions) and ease of use (as NNs learn by example it is only necessary for a user to gather a highly representative data set and then invoke training algorithms to learn the underlying structureofthedata).The signature Verification process parallels this learning mechanism. There are many ways to structure the NN training, but a very simple approach is to firstly extract a feature set representing the signature 3. PROPOSED SYSTEM. We proposed a scheme for signature verification using signature length features and Statistical based features. The proposed system is organized into following sections. Section 3.1 describes database management, Section 3.2 describes preprocessingstepsusedinthesystem,Section3.3 introduces feature extraction technique,Section3.4explains training and Section 3.5 describes signature verification. 3.1 DATABASE MANAGEMENT This modules handles the various aspect of database management like creation, modification, deletion and training for signature instance. Data acquisition of static features is carried out using high resolutionscanners.Figure 3.1 shows modular structure of an integrated signature verification system. 3.2 PREPROCESSING The signature image cannot be directly used for any feature extraction method. The image might containcertain noise or might be subjected to damage because it’s an old signature or the signature or signature under consideration may vary in size and thickness. Here some kind of enhancement operation need to be performed and they are carried out in this phase. The pre-processing step is applied both in training and testing phases. The pre-processing phases normally includes many techniques appliedfor binarization, noise removal, skew detection, slant correction, normalization, contour making and skeleton like processes to make character image easy to extract relevant features. The purpose of this phase is to make signature standard and
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1781 ready for feature extraction. The pre-processing stage improves quality of the image and makes it suitable for feature extraction. 3.3 FEATURE EXTRACTION Feature extraction stage is one of the crucial stages of an off- line signature verificationsystem.Featurescansbeclassified as global or local, where global features represents signature’s properties a whole and local ones correspond to properties specific to a samplingpoint.Twotypesoffeatures are used in the proposed work: 1.Signature length 2.Statistical Distance 3.4 TRAINING Recent research in the field of machine learning focuses on the design of efficient classifier. The main characteristics of any classifier to correctly classify unseen data which were not present in the train set. Support vectormachine(SVM)is used as the classifier for this research. The goal of SVM is to produce a model based on training set which predicts the target class of test data 3.4.1 Support Vector Machines In general there are two approaches to develop classifiers: a parametric approach where a priori knowledge of data distributions is assumed, and a non-parametric approach where no a priori knowledge is assumed. Support Vector Machine (SVM) is a non-parametric binary linear classifier and supervised learning model used for classification and regression analysis 3.4.2 SIGNATURE VERIFICATION In signature verification stage a signature to be tested is preprocessed and feature are extracted from the image as explained in the preprocessing and feature extraction section. Then it is fed into the trained support vector machine (SVM) which will classify it as genuine or forged signature 4. Experimental setup and results 4.1 LIBSVM LIBSVM is an open source machine learning library developed at National Taiwan University. LIBSVM implements theSMOalgorithmforkernelizedsupportvector machines (SVMs), supporting classification and regression [42]. It is an integrated software for support vectorclassification, (C-SVC,nu-SVC),regression(epsilon- SVR, nu-SVR)anddistributionestimation(one-classSVM). It supports multi-class classification. LIBSVM provides a simple interface where users can easilylink itwiththeirown programs. 4.2 EXPERIMENTATION ON CEDAR DATASET The experimental setups are performed four times onentire data set. In the first experimental set up, say ES1, The experiment process is carried out on each CEDAR signature set by randomly choosing 4 genuine and 4 forgery signature for training, while the remaining 20 genuine and 20 forgery signatures will be used for testing from each writer’s signature. After the SVM is trained with signaturelengthand statistical distance. The SVM is trained with labels ‘1’ and‘2’, respectively denoting forgery and genuine signature. The trained network is tested against with remaining20genuine samples along with 20 forgery samples of the respective class. After intra class testing signatures some class of the signatures giving 60, 62.5, 65, 72.5, 75, 77.5, 80, 82.5, 90, 92.5, and 97.5 5. CONCLUSIONS we proposed a novel approach for offline signature verification, in this we presented an automatic offline signature verification based on statistical distance and signature length. Statistical distance (mean and standard deviation) and signature length feature are used in different combination to construct feature vector. If statistical distance and signature length is used separately the performance of proposed system reduces significantly individually, statistical distance feature give better result than signature length this is a multi-algorithm system, and such system combines the advantage of individual feature sets and improve the accuracy rate. The algorithm can distinguish both random and skilled forgery with less error. SVM is a powerful classifier whichoutflanksnumerousother existing classifier. The purpose of the SVM is to correctly classify test data using model trained from the reference data. The SVM is trained with the genuine and forged reference signatures. REFERENCES [1] Kai Huang, Hong Yan,” Off-Line Signature Verification Based On Geometric Feature ExtractionandNeural Network Classification”, Proceedings of International Conference on Pattern Recognition (ICPR), Vol.30, Elsevier, pp. 9-17, 1997. [2]M. C. Fairhurst, “Signature verification revisited: promoting practical exploitationof biometrictechnology”,in Electronics & Communication Engineering journal,273-280 ,1997. [3]Peter Shao, Hua Deng, “Wavelet-based off-line handwritten signature verification”, Proceedings of Computer Vision and Image Understanding (CVIU), Vol.76, Issue 3,173-190, 1999.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1782 [4]Edson J. R. Justino, Abdenaimel Yacoubi,FlaviobOrtolozzi and Roberts Abourin, “An Off-Line Signature Verification System Using Hidden Markov Model and Cross-Validation” , ProceedingsofInternational ConferenceonNeural Networks for Signal Processing (ICNNSP), IEEE, pp. 859–868, 2000. [5]Katsuhiko Ueda, “Investigation of Off-Line Japanese Signature Verification Using a Pattern Matching”, Proceedings of International Conference on document analysis and recognition (ICDAR), IEEE, pp. 951-955, 2003. [6]Z. Lin. W. Liang. And R. C. Zhao, “Offline signature verification Incorporating prior model,” Proceedings of International Conference on Machine Learning and Cybernetics (ICMLC), IEEE, vol. 3, pp. 1602–1606, 2003. [7]J. Coetzer, B. M. Herbst, J. A. du Preez, “Offline Signature Verification Using DiscreteRadon Transform and a Hidden Markov Model”, in EURASIP Journal on Applied Signal Processing, vol. 4, pp. 559–571, 2004. [8]Hou Weiping, Xiufen Ye, and Keiun Wang,“Asurveyof off- line signature verification,” Proceedings of International Conference on Intelligent Mechatronics and Automation (ICIMA), pp. 536-541, 2004.
Download now