SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1779
A Fusion of Statistical Distance and Signature Length Based
Approach for Offline Signature Verification
Yashpal jitarwal1, Pawan mangal2, Tabrej ahamad khan3
1Govt. polytechnic college , sheopur
2,3 DR. B.R. Ambedkar NIT Jalandhar
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In today’s society signatures are the most
accepted form of identity verification. However, they have the
unfortunate side-effect of being easily abused by those who
would feign the identification or intent of an individual. A
great deal of work has been done in the area of off-line
signature verification over the past two decades. Off-line
systems are of interest in scenarios where only hard copies of
signatures are available, especially where a large number of
documents need to be authenticated
Key Words: Thining,Smoothing, Binarization , Gravity,
Statistical distance.
1.INTRODUCTION
Humans usually recognize each other based on theirvarious
characteristics for ages. We recognize others by their face
when we meet them and by their voice as we speak to them.
These characteristics are their identity. To achieve more
reliable verification or identification we should use
something that really recognizes the given person.
1.1 BIOMETRICS
The term "Biometrics" is gotten from the Greek words bio
(life) and metric (to measure). Biometrics implies the
automatic identification of a person based on his/her
physiological or behavioral characteristics. This method of
verification is preferred over traditional methods involving
passwords and PIN numbers for its accuracy and case
sensitiveness. A biometric system is essentially a pattern
recognition system which makes a personal identificationby
determining the authenticity of a specific physiological or
behavioral characteristic possessed by the user
1.2 SIGNATURE VERIFICATION
Signature verification is a common behavioral biometric to
identify human beings for purposes of verifying their
identity. Signatures are particularly useful for identification
of a particular person because each person’s signature is
highly unique, especially if the dynamic properties of the
signature are considered in addition to the static features of
the signature. Even if skilled forgers can accurately
reproduce the shape of signatures, but it isunlikelythatthey
can simultaneously reproduce the dynamic properties as
well.
2. Literature survey
Literature survey regarding the previous work and related
approach about offline signature verification is presented.
Signature from a special classofhandwritinginwhichlegible
letters or words may not be exhibited. They provide secure
means for authentication attestation and authorization in
legal, banking or other high security environments.
Signature verification problem pertains to determining
where a particular signature is verily written by a person so
that forgeries can be detected. Based on the hardware front-
end, a signature verification can be classified aseitheroffline
or online.
2 FEATURE EXTRACTIONS AND SELECTION
Feature extraction is the process of extracting the
characteristics of a preprocessed signature image. This
process must be supported by feature selection that will
highly influence the results in the evaluation of the
comparison method. It is paramount to choose and extract
feature that are
 computationally feasible.
 Lead to good classification rate sample system with
low false rejection rate and low false acceptance
rate.
 Reduce the problem data intoa manageableamount
of information without affecting the signature
structure

2.1 Global Feature Extraction
kai et al. [1] also proposed a method with the help NN
architecture. Here various static features e.g. slant or height
etc. and dynamic features e.g. pressure or velocity etc. are
extracted and then used for training the Neural Network.
Many Network topologies are also tested and then accuracy
of all of them is compared. This system performed very well
and has an error rate of 3.3% (Best case).
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1780
2.2.2 Grid Based Feature
Peter et al. [6] proposed Feature point extraction method in
which Vertical and horizontal splittingofthesignatureimage
was done to extract a total of 60 featurepoints (30each).The
features are based upon the 2 sets of points in two
dimensional plane. The vertical splitting of the signature
image produces 30 feature points (v1, v2, v3, v30) and
horizontal splitting produces 30 feature points (h1, h2, h3 ,,
h30). Central geometric point of the signature image is used
to obtain these 60 feature points
3. WORK RELATED TO VERIFICATION STRATGIES
This section categorizes some research in offline signature
verification according to the technique used to perform
verification, that is, Distance Classifiers, Artificial Neural
Networks, Hidden Markov Models, Dynamic Time Warping,
Support Vector Machines, Structural Techniques and
Bayesian Networks.
2.3.1 Template Matching Approach
It is a process of pattern comparison so it is called “template
matching”. A test signature is matched with templates of
genuine signatures stored in a knowledge base; the most
common approaches use Dynamic Time Wrapping (DTW)
for signature matching.
2.3.2 Neural Networks Approach
The main reasons for the widespread usage of neural
networks (NNs) in pattern recognition are their power (the
sophisticated techniques used in NNs allow a capability of
modeling quite complex functions) and ease of use (as NNs
learn by example it is only necessary for a user to gather a
highly representative data set and then invoke training
algorithms to learn the underlying structureofthedata).The
signature verification process parallels this learning
mechanism. There are many ways to structure the NN
training, but a very simple approach is to firstly extract a
feature set representing the signature
2.3.2 Neural Networks Approach
The main reasons for the widespread usage of neural
networks (NNs) in pattern recognition are their power (the
sophisticated techniques used in NNs allow a capability of
modeling quite complex functions) and ease of use (as NNs
learn by example it is only necessary for a user to gather a
highly representative data set and then invoke training
algorithms to learn the underlying structureofthedata).The
signature Verification process parallels this learning
mechanism. There are many ways to structure the NN
training, but a very simple approach is to firstly extract a
feature set representing the signature
3. PROPOSED SYSTEM.
We proposed a scheme for signature verification using
signature length features and Statistical based features. The
proposed system is organized into following sections.
Section 3.1 describes database management, Section 3.2
describes preprocessingstepsusedinthesystem,Section3.3
introduces feature extraction technique,Section3.4explains
training and Section 3.5 describes signature verification.
3.1 DATABASE MANAGEMENT
This modules handles the various aspect of database
management like creation, modification, deletion and
training for signature instance. Data acquisition of static
features is carried out using high resolutionscanners.Figure
3.1 shows modular structure of an integrated signature
verification system.
3.2 PREPROCESSING
The signature image cannot be directly used for any feature
extraction method. The image might containcertain noise or
might be subjected to damage because it’s an old signature
or the signature or signature under consideration may vary
in size and thickness. Here some kind of enhancement
operation need to be performed and they are carried out in
this phase. The pre-processing step is applied both in
training and testing phases. The pre-processing phases
normally includes many techniques appliedfor binarization,
noise removal, skew detection, slant correction,
normalization, contour making and skeleton like processes
to make character image easy to extract relevant features.
The purpose of this phase is to make signature standard and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1781
ready for feature extraction. The pre-processing stage
improves quality of the image and makes it suitable for
feature extraction.
3.3 FEATURE EXTRACTION
Feature extraction stage is one of the crucial stages of an off-
line signature verificationsystem.Featurescansbeclassified
as global or local, where global features represents
signature’s properties a whole and local ones correspond to
properties specific to a samplingpoint.Twotypesoffeatures
are used in the proposed work:
1.Signature length
2.Statistical Distance
3.4 TRAINING
Recent research in the field of machine learning focuses on
the design of efficient classifier. The main characteristics of
any classifier to correctly classify unseen data which were
not present in the train set. Support vectormachine(SVM)is
used as the classifier for this research. The goal of SVM is to
produce a model based on training set which predicts the
target class of test data
3.4.1 Support Vector Machines
In general there are two approaches to develop classifiers: a
parametric approach where a priori knowledge of data
distributions is assumed, and a non-parametric approach
where no a priori knowledge is assumed. Support Vector
Machine (SVM) is a non-parametric binary linear classifier
and supervised learning model used for classification and
regression analysis
3.4.2 SIGNATURE VERIFICATION
In signature verification stage a signature to be tested is
preprocessed and feature are extracted from the image as
explained in the preprocessing and feature extraction
section. Then it is fed into the trained support vector
machine (SVM) which will classify it as genuine or forged
signature
4. Experimental setup and results
4.1 LIBSVM
LIBSVM is an open source machine learning library
developed at National Taiwan University. LIBSVM
implements theSMOalgorithmforkernelizedsupportvector
machines (SVMs), supporting classification and regression
[42]. It is an integrated software for support
vectorclassification, (C-SVC,nu-SVC),regression(epsilon-
SVR, nu-SVR)anddistributionestimation(one-classSVM).
It supports multi-class classification. LIBSVM provides a
simple interface where users can easilylink itwiththeirown
programs.
4.2 EXPERIMENTATION ON CEDAR DATASET
The experimental setups are performed four times onentire
data set. In the first experimental set up, say ES1, The
experiment process is carried out on each CEDAR signature
set by randomly choosing 4 genuine and 4 forgery signature
for training, while the remaining 20 genuine and 20 forgery
signatures will be used for testing from each writer’s
signature. After the SVM is trained with signaturelengthand
statistical distance. The SVM is trained with labels ‘1’ and‘2’,
respectively denoting forgery and genuine signature. The
trained network is tested against with remaining20genuine
samples along with 20 forgery samples of the respective
class. After intra class testing signatures some class of the
signatures giving 60, 62.5, 65, 72.5, 75, 77.5, 80, 82.5, 90,
92.5, and 97.5
5. CONCLUSIONS
we proposed a novel approach for offline signature
verification, in this we presented an automatic offline
signature verification based on statistical distance and
signature length. Statistical distance (mean and standard
deviation) and signature length feature are used in different
combination to construct feature vector. If statistical
distance and signature length is used separately the
performance of proposed system reduces significantly
individually, statistical distance feature give better result
than signature length this is a multi-algorithm system, and
such system combines the advantage of individual feature
sets and improve the accuracy rate. The algorithm can
distinguish both random and skilled forgery with less error.
SVM is a powerful classifier whichoutflanksnumerousother
existing classifier. The purpose of the SVM is to correctly
classify test data using model trained from the reference
data. The SVM is trained with the genuine and forged
reference signatures.
REFERENCES
[1] Kai Huang, Hong Yan,” Off-Line Signature Verification
Based On Geometric Feature ExtractionandNeural Network
Classification”, Proceedings of International Conference on
Pattern Recognition (ICPR), Vol.30, Elsevier, pp. 9-17, 1997.
[2]M. C. Fairhurst, “Signature verification revisited:
promoting practical exploitationof biometrictechnology”,in
Electronics & Communication Engineering journal,273-280
,1997.
[3]Peter Shao, Hua Deng, “Wavelet-based off-line
handwritten signature verification”, Proceedings of
Computer Vision and Image Understanding (CVIU), Vol.76,
Issue 3,173-190, 1999.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1782
[4]Edson J. R. Justino, Abdenaimel Yacoubi,FlaviobOrtolozzi
and Roberts Abourin, “An Off-Line Signature Verification
System Using Hidden Markov Model and Cross-Validation” ,
ProceedingsofInternational ConferenceonNeural Networks
for Signal Processing (ICNNSP), IEEE, pp. 859–868, 2000.
[5]Katsuhiko Ueda, “Investigation of Off-Line Japanese
Signature Verification Using a Pattern Matching”,
Proceedings of International Conference on document
analysis and recognition (ICDAR), IEEE, pp. 951-955, 2003.
[6]Z. Lin. W. Liang. And R. C. Zhao, “Offline signature
verification Incorporating prior model,” Proceedings of
International Conference on Machine Learning and
Cybernetics (ICMLC), IEEE, vol. 3, pp. 1602–1606, 2003.
[7]J. Coetzer, B. M. Herbst, J. A. du Preez, “Offline Signature
Verification Using DiscreteRadon Transform and a Hidden
Markov Model”, in EURASIP Journal on Applied Signal
Processing, vol. 4, pp. 559–571, 2004.
[8]Hou Weiping, Xiufen Ye, and Keiun Wang,“Asurveyof off-
line signature verification,” Proceedings of International
Conference on Intelligent Mechatronics and Automation
(ICIMA), pp. 536-541, 2004.

More Related Content

What's hot

IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management SystemIRJET Journal
 
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemIJERA Editor
 
Offline and online signature verification systems a survey
Offline and online signature verification systems a surveyOffline and online signature verification systems a survey
Offline and online signature verification systems a surveyeSAT Publishing House
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
 
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET- Tracking and Recognition of Multiple Human and Non-Human ActivitesIRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET- Tracking and Recognition of Multiple Human and Non-Human ActivitesIRJET Journal
 
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...IJECEIAES
 
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic AlgorithmIRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic AlgorithmIRJET Journal
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesIOSR Journals
 
IRJET- A Review on Automated Systems for Deformation Detection in Glasses
IRJET- A Review on Automated Systems for Deformation Detection in GlassesIRJET- A Review on Automated Systems for Deformation Detection in Glasses
IRJET- A Review on Automated Systems for Deformation Detection in GlassesIRJET Journal
 
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET Journal
 
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection SystemIRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection SystemIRJET Journal
 
A Review on Fabric Defect Detection Techniques
A Review on Fabric Defect Detection TechniquesA Review on Fabric Defect Detection Techniques
A Review on Fabric Defect Detection TechniquesIRJET Journal
 
Survey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chainSurvey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chainijcseit
 

What's hot (15)

Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
 
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
 
Offline and online signature verification systems a survey
Offline and online signature verification systems a surveyOffline and online signature verification systems a survey
Offline and online signature verification systems a survey
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologies
 
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET- Tracking and Recognition of Multiple Human and Non-Human ActivitesIRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
 
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
 
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic AlgorithmIRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic Algorithm
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
 
IRJET- A Review on Automated Systems for Deformation Detection in Glasses
IRJET- A Review on Automated Systems for Deformation Detection in GlassesIRJET- A Review on Automated Systems for Deformation Detection in Glasses
IRJET- A Review on Automated Systems for Deformation Detection in Glasses
 
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris Recognition
 
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection SystemIRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection System
 
A Review on Fabric Defect Detection Techniques
A Review on Fabric Defect Detection TechniquesA Review on Fabric Defect Detection Techniques
A Review on Fabric Defect Detection Techniques
 
1725 1731
1725 17311725 1731
1725 1731
 
Survey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chainSurvey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chain
 

Similar to A Fusion of Statistical Distance and Signature Length Based Approach for Offline Signature Verification

Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemDistance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemIRJET Journal
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...IRJET Journal
 
Signature Verification System using CNN & SNN
Signature Verification System using CNN & SNNSignature Verification System using CNN & SNN
Signature Verification System using CNN & SNNIRJET Journal
 
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...IRJET Journal
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesIRJET Journal
 
Privacy Preservation using Partition Technique
Privacy Preservation using Partition TechniquePrivacy Preservation using Partition Technique
Privacy Preservation using Partition TechniqueIRJET Journal
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemIRJET Journal
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNNIRJET Journal
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTIRJET Journal
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET Journal
 
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...Application of Advance Encryption Algorithm to Implement Access to Sensitive ...
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...IRJET Journal
 
Cryptography and error correction code for iris biometric recognition system
Cryptography and error correction code for iris biometric recognition systemCryptography and error correction code for iris biometric recognition system
Cryptography and error correction code for iris biometric recognition systemIRJET Journal
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition SystemIRJET Journal
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET Journal
 
Introduction To Palmprint Recognition
Introduction To Palmprint RecognitionIntroduction To Palmprint Recognition
Introduction To Palmprint RecognitionIRJET Journal
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET Journal
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET Journal
 

Similar to A Fusion of Statistical Distance and Signature Length Based Approach for Offline Signature Verification (20)

Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemDistance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature System
 
Choudhary2015
Choudhary2015Choudhary2015
Choudhary2015
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
 
Signature Verification System using CNN & SNN
Signature Verification System using CNN & SNNSignature Verification System using CNN & SNN
Signature Verification System using CNN & SNN
 
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection Techniques
 
Privacy Preservation using Partition Technique
Privacy Preservation using Partition TechniquePrivacy Preservation using Partition Technique
Privacy Preservation using Partition Technique
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
 
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...Application of Advance Encryption Algorithm to Implement Access to Sensitive ...
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...
 
Ijetcas14 337
Ijetcas14 337Ijetcas14 337
Ijetcas14 337
 
Cryptography and error correction code for iris biometric recognition system
Cryptography and error correction code for iris biometric recognition systemCryptography and error correction code for iris biometric recognition system
Cryptography and error correction code for iris biometric recognition system
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition System
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
 
Introduction To Palmprint Recognition
Introduction To Palmprint RecognitionIntroduction To Palmprint Recognition
Introduction To Palmprint Recognition
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 

Recently uploaded (20)

Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 

A Fusion of Statistical Distance and Signature Length Based Approach for Offline Signature Verification

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1779 A Fusion of Statistical Distance and Signature Length Based Approach for Offline Signature Verification Yashpal jitarwal1, Pawan mangal2, Tabrej ahamad khan3 1Govt. polytechnic college , sheopur 2,3 DR. B.R. Ambedkar NIT Jalandhar ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In today’s society signatures are the most accepted form of identity verification. However, they have the unfortunate side-effect of being easily abused by those who would feign the identification or intent of an individual. A great deal of work has been done in the area of off-line signature verification over the past two decades. Off-line systems are of interest in scenarios where only hard copies of signatures are available, especially where a large number of documents need to be authenticated Key Words: Thining,Smoothing, Binarization , Gravity, Statistical distance. 1.INTRODUCTION Humans usually recognize each other based on theirvarious characteristics for ages. We recognize others by their face when we meet them and by their voice as we speak to them. These characteristics are their identity. To achieve more reliable verification or identification we should use something that really recognizes the given person. 1.1 BIOMETRICS The term "Biometrics" is gotten from the Greek words bio (life) and metric (to measure). Biometrics implies the automatic identification of a person based on his/her physiological or behavioral characteristics. This method of verification is preferred over traditional methods involving passwords and PIN numbers for its accuracy and case sensitiveness. A biometric system is essentially a pattern recognition system which makes a personal identificationby determining the authenticity of a specific physiological or behavioral characteristic possessed by the user 1.2 SIGNATURE VERIFICATION Signature verification is a common behavioral biometric to identify human beings for purposes of verifying their identity. Signatures are particularly useful for identification of a particular person because each person’s signature is highly unique, especially if the dynamic properties of the signature are considered in addition to the static features of the signature. Even if skilled forgers can accurately reproduce the shape of signatures, but it isunlikelythatthey can simultaneously reproduce the dynamic properties as well. 2. Literature survey Literature survey regarding the previous work and related approach about offline signature verification is presented. Signature from a special classofhandwritinginwhichlegible letters or words may not be exhibited. They provide secure means for authentication attestation and authorization in legal, banking or other high security environments. Signature verification problem pertains to determining where a particular signature is verily written by a person so that forgeries can be detected. Based on the hardware front- end, a signature verification can be classified aseitheroffline or online. 2 FEATURE EXTRACTIONS AND SELECTION Feature extraction is the process of extracting the characteristics of a preprocessed signature image. This process must be supported by feature selection that will highly influence the results in the evaluation of the comparison method. It is paramount to choose and extract feature that are  computationally feasible.  Lead to good classification rate sample system with low false rejection rate and low false acceptance rate.  Reduce the problem data intoa manageableamount of information without affecting the signature structure  2.1 Global Feature Extraction kai et al. [1] also proposed a method with the help NN architecture. Here various static features e.g. slant or height etc. and dynamic features e.g. pressure or velocity etc. are extracted and then used for training the Neural Network. Many Network topologies are also tested and then accuracy of all of them is compared. This system performed very well and has an error rate of 3.3% (Best case).
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1780 2.2.2 Grid Based Feature Peter et al. [6] proposed Feature point extraction method in which Vertical and horizontal splittingofthesignatureimage was done to extract a total of 60 featurepoints (30each).The features are based upon the 2 sets of points in two dimensional plane. The vertical splitting of the signature image produces 30 feature points (v1, v2, v3, v30) and horizontal splitting produces 30 feature points (h1, h2, h3 ,, h30). Central geometric point of the signature image is used to obtain these 60 feature points 3. WORK RELATED TO VERIFICATION STRATGIES This section categorizes some research in offline signature verification according to the technique used to perform verification, that is, Distance Classifiers, Artificial Neural Networks, Hidden Markov Models, Dynamic Time Warping, Support Vector Machines, Structural Techniques and Bayesian Networks. 2.3.1 Template Matching Approach It is a process of pattern comparison so it is called “template matching”. A test signature is matched with templates of genuine signatures stored in a knowledge base; the most common approaches use Dynamic Time Wrapping (DTW) for signature matching. 2.3.2 Neural Networks Approach The main reasons for the widespread usage of neural networks (NNs) in pattern recognition are their power (the sophisticated techniques used in NNs allow a capability of modeling quite complex functions) and ease of use (as NNs learn by example it is only necessary for a user to gather a highly representative data set and then invoke training algorithms to learn the underlying structureofthedata).The signature verification process parallels this learning mechanism. There are many ways to structure the NN training, but a very simple approach is to firstly extract a feature set representing the signature 2.3.2 Neural Networks Approach The main reasons for the widespread usage of neural networks (NNs) in pattern recognition are their power (the sophisticated techniques used in NNs allow a capability of modeling quite complex functions) and ease of use (as NNs learn by example it is only necessary for a user to gather a highly representative data set and then invoke training algorithms to learn the underlying structureofthedata).The signature Verification process parallels this learning mechanism. There are many ways to structure the NN training, but a very simple approach is to firstly extract a feature set representing the signature 3. PROPOSED SYSTEM. We proposed a scheme for signature verification using signature length features and Statistical based features. The proposed system is organized into following sections. Section 3.1 describes database management, Section 3.2 describes preprocessingstepsusedinthesystem,Section3.3 introduces feature extraction technique,Section3.4explains training and Section 3.5 describes signature verification. 3.1 DATABASE MANAGEMENT This modules handles the various aspect of database management like creation, modification, deletion and training for signature instance. Data acquisition of static features is carried out using high resolutionscanners.Figure 3.1 shows modular structure of an integrated signature verification system. 3.2 PREPROCESSING The signature image cannot be directly used for any feature extraction method. The image might containcertain noise or might be subjected to damage because it’s an old signature or the signature or signature under consideration may vary in size and thickness. Here some kind of enhancement operation need to be performed and they are carried out in this phase. The pre-processing step is applied both in training and testing phases. The pre-processing phases normally includes many techniques appliedfor binarization, noise removal, skew detection, slant correction, normalization, contour making and skeleton like processes to make character image easy to extract relevant features. The purpose of this phase is to make signature standard and
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1781 ready for feature extraction. The pre-processing stage improves quality of the image and makes it suitable for feature extraction. 3.3 FEATURE EXTRACTION Feature extraction stage is one of the crucial stages of an off- line signature verificationsystem.Featurescansbeclassified as global or local, where global features represents signature’s properties a whole and local ones correspond to properties specific to a samplingpoint.Twotypesoffeatures are used in the proposed work: 1.Signature length 2.Statistical Distance 3.4 TRAINING Recent research in the field of machine learning focuses on the design of efficient classifier. The main characteristics of any classifier to correctly classify unseen data which were not present in the train set. Support vectormachine(SVM)is used as the classifier for this research. The goal of SVM is to produce a model based on training set which predicts the target class of test data 3.4.1 Support Vector Machines In general there are two approaches to develop classifiers: a parametric approach where a priori knowledge of data distributions is assumed, and a non-parametric approach where no a priori knowledge is assumed. Support Vector Machine (SVM) is a non-parametric binary linear classifier and supervised learning model used for classification and regression analysis 3.4.2 SIGNATURE VERIFICATION In signature verification stage a signature to be tested is preprocessed and feature are extracted from the image as explained in the preprocessing and feature extraction section. Then it is fed into the trained support vector machine (SVM) which will classify it as genuine or forged signature 4. Experimental setup and results 4.1 LIBSVM LIBSVM is an open source machine learning library developed at National Taiwan University. LIBSVM implements theSMOalgorithmforkernelizedsupportvector machines (SVMs), supporting classification and regression [42]. It is an integrated software for support vectorclassification, (C-SVC,nu-SVC),regression(epsilon- SVR, nu-SVR)anddistributionestimation(one-classSVM). It supports multi-class classification. LIBSVM provides a simple interface where users can easilylink itwiththeirown programs. 4.2 EXPERIMENTATION ON CEDAR DATASET The experimental setups are performed four times onentire data set. In the first experimental set up, say ES1, The experiment process is carried out on each CEDAR signature set by randomly choosing 4 genuine and 4 forgery signature for training, while the remaining 20 genuine and 20 forgery signatures will be used for testing from each writer’s signature. After the SVM is trained with signaturelengthand statistical distance. The SVM is trained with labels ‘1’ and‘2’, respectively denoting forgery and genuine signature. The trained network is tested against with remaining20genuine samples along with 20 forgery samples of the respective class. After intra class testing signatures some class of the signatures giving 60, 62.5, 65, 72.5, 75, 77.5, 80, 82.5, 90, 92.5, and 97.5 5. CONCLUSIONS we proposed a novel approach for offline signature verification, in this we presented an automatic offline signature verification based on statistical distance and signature length. Statistical distance (mean and standard deviation) and signature length feature are used in different combination to construct feature vector. If statistical distance and signature length is used separately the performance of proposed system reduces significantly individually, statistical distance feature give better result than signature length this is a multi-algorithm system, and such system combines the advantage of individual feature sets and improve the accuracy rate. The algorithm can distinguish both random and skilled forgery with less error. SVM is a powerful classifier whichoutflanksnumerousother existing classifier. The purpose of the SVM is to correctly classify test data using model trained from the reference data. The SVM is trained with the genuine and forged reference signatures. REFERENCES [1] Kai Huang, Hong Yan,” Off-Line Signature Verification Based On Geometric Feature ExtractionandNeural Network Classification”, Proceedings of International Conference on Pattern Recognition (ICPR), Vol.30, Elsevier, pp. 9-17, 1997. [2]M. C. Fairhurst, “Signature verification revisited: promoting practical exploitationof biometrictechnology”,in Electronics & Communication Engineering journal,273-280 ,1997. [3]Peter Shao, Hua Deng, “Wavelet-based off-line handwritten signature verification”, Proceedings of Computer Vision and Image Understanding (CVIU), Vol.76, Issue 3,173-190, 1999.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1782 [4]Edson J. R. Justino, Abdenaimel Yacoubi,FlaviobOrtolozzi and Roberts Abourin, “An Off-Line Signature Verification System Using Hidden Markov Model and Cross-Validation” , ProceedingsofInternational ConferenceonNeural Networks for Signal Processing (ICNNSP), IEEE, pp. 859–868, 2000. [5]Katsuhiko Ueda, “Investigation of Off-Line Japanese Signature Verification Using a Pattern Matching”, Proceedings of International Conference on document analysis and recognition (ICDAR), IEEE, pp. 951-955, 2003. [6]Z. Lin. W. Liang. And R. C. Zhao, “Offline signature verification Incorporating prior model,” Proceedings of International Conference on Machine Learning and Cybernetics (ICMLC), IEEE, vol. 3, pp. 1602–1606, 2003. [7]J. Coetzer, B. M. Herbst, J. A. du Preez, “Offline Signature Verification Using DiscreteRadon Transform and a Hidden Markov Model”, in EURASIP Journal on Applied Signal Processing, vol. 4, pp. 559–571, 2004. [8]Hou Weiping, Xiufen Ye, and Keiun Wang,“Asurveyof off- line signature verification,” Proceedings of International Conference on Intelligent Mechatronics and Automation (ICIMA), pp. 536-541, 2004.