In this project, a support vector machine is developed for identity verification of offline signature based on the matrices derived through Euclidean distance. A set of signature samples are collected from 35 different people. Each person gives his 15 different copies of signature and then these signature samples are scanned to have softcopy of them to train SVM. These scanned signature images are then subjected to a number of image enhancement operations like binarization, complementation, filtering, thinning, edge detection and rotation. On the basis of 15 original signature copies from each individual, Euclidean distance is calculated. And every tested image is compared with the range of Euclidean distance. The values from the ED are fed to the support vector machine which draws a hyper plane and classifies the signature into original or forged based on a particular feature value.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This paper presents the maneuver of mouse pointer and performs various mouse operations such as left
click, right click, double click, drag etc using gestures recognition technique. Recognizing gestures is a
complex task which involves many aspects such as motion modeling, motion analysis, pattern recognition
and machine learning.
Keeping all the essential factors in mind a system has been created which recognizes the movement of
fingers and various patterns formed by them. Color caps have been used for fingers to distinguish it from
the background color such as skin color. Thus recognizing the gestures various mouse events have been
performed. The application has been created on MATLAB environment with operating system as windows
7.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This paper presents the maneuver of mouse pointer and performs various mouse operations such as left
click, right click, double click, drag etc using gestures recognition technique. Recognizing gestures is a
complex task which involves many aspects such as motion modeling, motion analysis, pattern recognition
and machine learning.
Keeping all the essential factors in mind a system has been created which recognizes the movement of
fingers and various patterns formed by them. Color caps have been used for fingers to distinguish it from
the background color such as skin color. Thus recognizing the gestures various mouse events have been
performed. The application has been created on MATLAB environment with operating system as windows
7.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Retrieving Of Color Images Using SDS TechniqueEditor IJMTER
How data can be shared from one part of the world to the other in near real time came with
the arrival of internet. Along with this they have introduced new challenges like maintaining the
confidentiality of transmitting the data. This gave a boost to the research area related to cryptography.
Firstly, Encryption of images with the accepted encryption algorithms had significant downside as key
management was complicated and limited. Secondly, introduction to new area for encrypting images
was splitting the image at its pixel level in to multiple shares. But the major drawback of this approach
was that the recovered image had a poor quality. To overcome these mentioned drawbacks we have
proposed a new approach which does not attempt to use any type of keys for encryption.
Fingerprint image enhancement is the key process in IAFIS systems. In order to reduce false identification ratio and to supply good fingerprint images to IAFIS systems for exact identification, fingerprint images are generally enhanced. A filtering process tries to filter out the noise from the input image, and emphasize on low, high and directional spatial frequency components of an image. This paper presents an experimental summary of enhancing fingerprint images using Gabor filters. Frequency, width and window domain filter ranges are fixed. The orientation angle alone is modified by 0 radians, π/2, π/4 and 3π/4 radians. The experimental results show that Gabor filter enhances the fingerprint image in a better way than other filtering methods and extracts features.
Hand gesture recognition using support vector machinetheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Fpga implementation of image segmentation by using edge detection based on so...eSAT Journals
Abstract In this paper, we present the method of “FPGA implementation of image segmentation by using edge detection based on the sobel edge operator” .due to advancement in computer vision it can be implemented in fpga based architecture. image segmentation separates an image into component regions and object. Segmentation needs to segment the object from the background to read image properly and identify the image carefully. Edge detection is fundamental tool for image segmentation. Sobel edge operator, which is very popular edge detection algorithms, is considered in this work. Sobel method uses the derivative approximation to find edge and perform 2-D spatial gradient measurement for images uses horizontal and vertical gradient matrices .The fpga device providing good performance of integrated circuit platform for research and development. The compact structure of image segmentation into edge detection can be implemented in MAT LAB using VHDL code and the waveform is shown in the model sim.. Keywords: VLSI, FPGA, image segmentation, sobel edge operators, edge detection pixel, mat lab.
Fpga implementation of image segmentation by using edge detection based on so...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
AN EMERGING TREND OF FEATURE EXTRACTION METHOD IN VIDEO PROCESSINGcscpconf
Recently the progress in technology and flourishing applications open up new forecast and defy
for the image and video processing community. Compared to still images, video sequences
afford more information about how objects and scenarios change over time. Quality of video is
very significant before applying it to any kind of processing techniques. This paper deals with
two major problems in video processing they are noise reduction and object segmentation on
video frames. The segmentation of objects is performed using foreground segmentation based
and fuzzy c-means clustering segmentation is compared with the proposed method Improvised
fuzzy c – means segmentation based on color. This was applied in the video frame to segment
various objects in the current frame. The proposed technique is a powerful method for image
segmentation and it works for both single and multiple feature data with spatial information.
The experimental result was conducted using various noises and filtering methods to show which is best suited among others and the proposed segmentation approach generates good quality segmented frames.
Feature Extraction and Feature Selection using Textual Analysisvivatechijri
After pre-processing the images in character recognition systems, the images are segmented based on
certain characteristics known as “features”. The feature space identified for character recognition is however
ranging across a huge dimensionality. To solve this problem of dimensionality, the feature selection and feature
extraction methods are used. Hereby in this paper, we are going to discuss, the different techniques for feature
extraction and feature selection and how these techniques are used to reduce the dimensionality of feature space
to improve the performance of text categorization.
Adaptive Image Contrast with Binarization Technique for Degraded Document Imagetheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
In this paper, we propose an efficient method to provide personal identification using fingerprint to get better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding minutia pairings, has been in use for a long time, which is not very efficient for recognizing the low quality fingerprints. To overcome this problem, correlation technique is used. The correlation-based fingerprint verification system is capable of dealing with low quality images from which no minutiae can be extracted reliably and with fingerprints that suffer from non-uniform shape distortions, also in case of damaged and partial images. Orientation Field Methodology (OFM) has been used as a preprocessing module, and it converts the images into a field pattern based on the direction of the ridges, loops and bifurcations in the image of a fingerprint. The input image is then Cross Correlated (CC) with all the images in the cluster and the highest correlated image is taken as the output. The result gives a good recognition rate, as the proposed scheme uses Cross Correlation of Field Orientation (CCFO = OFM + CC) for fingerprint identification.
A Review of Optical Character Recognition System for Recognition of Printed Textiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...idescitation
Ongoing Microarray is an increasingly playing a crucial role applied in the field
of medical and biological operations. The initiator of Microarray technology is M. Schena et
al. [1] and from past few years microarrays have begun to be used in many fields such as
biomedicine, mostly on cancer and Diabetic, and medical diagnoses. A Deoxyribonucleic
Acid (DNA) microarray is a collection of microscopic DNA spots attached to a solid surface,
such as glass, plastic or silicon chip forming an array. Processing of DNA microarray image
analysis includes three tasks: gridding, segmentation and intensity extraction and at the
stage of processing, the irregularities of shape and spot position which leads to generate
significant errors. This article presents a new spot edge detection method using Window
based Bi-dimensional Empirical Mode Decomposition. On separating spots form the
background area and to decreases the probability of errors and gives more accurate
information about the states of spots we are proposing a spot edge detection via WBEMD.
By using this method we can identify the spots with low density, which leads to increasing
the performance of cDNA microarray images.
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An offline signature recognition and verification system based on neural networkeSAT Journals
Abstract Various techniques are already introduced for personal identification and verification based on different types of biometrics which can be physiological or behavioral. Signatures lies in the category of behavioral biometric which can distort or changed with course of time. Signatures are considered to be most promising authentication method in all legal and financial documents. It is necessary to verify signers and their respective signatures. This paper presents an Offline Signature recognition and verification system(SRVS). In this system signature database of signature images is created, followed by image preprocessing, feature extraction, neural network design and training, and classification of signature as genuine or counterfeit. Keywords: biometrics, neural network design, feature extraction, classification etc.
Retrieving Of Color Images Using SDS TechniqueEditor IJMTER
How data can be shared from one part of the world to the other in near real time came with
the arrival of internet. Along with this they have introduced new challenges like maintaining the
confidentiality of transmitting the data. This gave a boost to the research area related to cryptography.
Firstly, Encryption of images with the accepted encryption algorithms had significant downside as key
management was complicated and limited. Secondly, introduction to new area for encrypting images
was splitting the image at its pixel level in to multiple shares. But the major drawback of this approach
was that the recovered image had a poor quality. To overcome these mentioned drawbacks we have
proposed a new approach which does not attempt to use any type of keys for encryption.
Fingerprint image enhancement is the key process in IAFIS systems. In order to reduce false identification ratio and to supply good fingerprint images to IAFIS systems for exact identification, fingerprint images are generally enhanced. A filtering process tries to filter out the noise from the input image, and emphasize on low, high and directional spatial frequency components of an image. This paper presents an experimental summary of enhancing fingerprint images using Gabor filters. Frequency, width and window domain filter ranges are fixed. The orientation angle alone is modified by 0 radians, π/2, π/4 and 3π/4 radians. The experimental results show that Gabor filter enhances the fingerprint image in a better way than other filtering methods and extracts features.
Hand gesture recognition using support vector machinetheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Fpga implementation of image segmentation by using edge detection based on so...eSAT Journals
Abstract In this paper, we present the method of “FPGA implementation of image segmentation by using edge detection based on the sobel edge operator” .due to advancement in computer vision it can be implemented in fpga based architecture. image segmentation separates an image into component regions and object. Segmentation needs to segment the object from the background to read image properly and identify the image carefully. Edge detection is fundamental tool for image segmentation. Sobel edge operator, which is very popular edge detection algorithms, is considered in this work. Sobel method uses the derivative approximation to find edge and perform 2-D spatial gradient measurement for images uses horizontal and vertical gradient matrices .The fpga device providing good performance of integrated circuit platform for research and development. The compact structure of image segmentation into edge detection can be implemented in MAT LAB using VHDL code and the waveform is shown in the model sim.. Keywords: VLSI, FPGA, image segmentation, sobel edge operators, edge detection pixel, mat lab.
Fpga implementation of image segmentation by using edge detection based on so...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
AN EMERGING TREND OF FEATURE EXTRACTION METHOD IN VIDEO PROCESSINGcscpconf
Recently the progress in technology and flourishing applications open up new forecast and defy
for the image and video processing community. Compared to still images, video sequences
afford more information about how objects and scenarios change over time. Quality of video is
very significant before applying it to any kind of processing techniques. This paper deals with
two major problems in video processing they are noise reduction and object segmentation on
video frames. The segmentation of objects is performed using foreground segmentation based
and fuzzy c-means clustering segmentation is compared with the proposed method Improvised
fuzzy c – means segmentation based on color. This was applied in the video frame to segment
various objects in the current frame. The proposed technique is a powerful method for image
segmentation and it works for both single and multiple feature data with spatial information.
The experimental result was conducted using various noises and filtering methods to show which is best suited among others and the proposed segmentation approach generates good quality segmented frames.
Feature Extraction and Feature Selection using Textual Analysisvivatechijri
After pre-processing the images in character recognition systems, the images are segmented based on
certain characteristics known as “features”. The feature space identified for character recognition is however
ranging across a huge dimensionality. To solve this problem of dimensionality, the feature selection and feature
extraction methods are used. Hereby in this paper, we are going to discuss, the different techniques for feature
extraction and feature selection and how these techniques are used to reduce the dimensionality of feature space
to improve the performance of text categorization.
Adaptive Image Contrast with Binarization Technique for Degraded Document Imagetheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
In this paper, we propose an efficient method to provide personal identification using fingerprint to get better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding minutia pairings, has been in use for a long time, which is not very efficient for recognizing the low quality fingerprints. To overcome this problem, correlation technique is used. The correlation-based fingerprint verification system is capable of dealing with low quality images from which no minutiae can be extracted reliably and with fingerprints that suffer from non-uniform shape distortions, also in case of damaged and partial images. Orientation Field Methodology (OFM) has been used as a preprocessing module, and it converts the images into a field pattern based on the direction of the ridges, loops and bifurcations in the image of a fingerprint. The input image is then Cross Correlated (CC) with all the images in the cluster and the highest correlated image is taken as the output. The result gives a good recognition rate, as the proposed scheme uses Cross Correlation of Field Orientation (CCFO = OFM + CC) for fingerprint identification.
A Review of Optical Character Recognition System for Recognition of Printed Textiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...idescitation
Ongoing Microarray is an increasingly playing a crucial role applied in the field
of medical and biological operations. The initiator of Microarray technology is M. Schena et
al. [1] and from past few years microarrays have begun to be used in many fields such as
biomedicine, mostly on cancer and Diabetic, and medical diagnoses. A Deoxyribonucleic
Acid (DNA) microarray is a collection of microscopic DNA spots attached to a solid surface,
such as glass, plastic or silicon chip forming an array. Processing of DNA microarray image
analysis includes three tasks: gridding, segmentation and intensity extraction and at the
stage of processing, the irregularities of shape and spot position which leads to generate
significant errors. This article presents a new spot edge detection method using Window
based Bi-dimensional Empirical Mode Decomposition. On separating spots form the
background area and to decreases the probability of errors and gives more accurate
information about the states of spots we are proposing a spot edge detection via WBEMD.
By using this method we can identify the spots with low density, which leads to increasing
the performance of cDNA microarray images.
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An offline signature recognition and verification system based on neural networkeSAT Journals
Abstract Various techniques are already introduced for personal identification and verification based on different types of biometrics which can be physiological or behavioral. Signatures lies in the category of behavioral biometric which can distort or changed with course of time. Signatures are considered to be most promising authentication method in all legal and financial documents. It is necessary to verify signers and their respective signatures. This paper presents an Offline Signature recognition and verification system(SRVS). In this system signature database of signature images is created, followed by image preprocessing, feature extraction, neural network design and training, and classification of signature as genuine or counterfeit. Keywords: biometrics, neural network design, feature extraction, classification etc.
An appraisal of offline signature verification techniquesSalam Shah
Biometrics is being commonly used nowadays for the identification and verification of humans everywhere in the world. In biometrics humans unique characteristics like palm, fingerprints, iris etc. are being used. Pattern Recognition and image processing are the major areas where research on signature verification is carried out. Hand written Signature of an individual is also unique and for identification of humans are being used and accepted specially in the banking and other financial transactions. The hand written signatures due to its importance are at target of fraudulence. In this paper we have surveyed different papers on techniques that are currently used for the identification and verification of Offline signatures.
This slide proposed a method to authenticate a signature in off-line. Our proposed method uses "Harris Corner Detector", "Orientation Assignment" , "KNN Classifier", "Hungarian Algorithm".
Proposed Method for Off-line Signature Recognition and Verification using Neu...Editor IJMTER
Computers have become common and are used in almost every field including financial
transactions, thus providing additional security measures is necessary. According to consumer’s
expectations, these security measures must be cheap, reliable and un-intrusive to the authorized
person. The technique which meets these requirements is handwritten signature verification.
Signature verification technique has advantage over other biometric techniques: including voice, iris,
fingerprint, palm etc. as it is mostly used for daily routine procedures link banking operations,
document analysis, electronic funds transfer, access control and many other. Most importantly, it’s
easy and people are less likely to object it. Proposed technique involves using a new approach that
depends on a neural network which enables the user to recognize whether a signature is original or a
fraud. Scanned images are introduced into the computer, their quality is modified with the help of
image enhancement and noise reduction techniques, specific features are extracted and neural
network is trained, The different stages of the process includes: image pre-processing, feature
extraction and pattern recognition through neural networks.
IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of mechanical and civil engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mechanical and civil engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...journalBEEI
Sharing information through images is a trend nowadays. Advancements in the technology and user-friendly image editing tool make easy to edit the image and spread fake news through different social networking platforms. Forged image has been generated through an advanced image editing tool, so it is very challenging for image forensics to detect the micro discrepancy which distorted the micro pattern. This paper proposes an image forensic detection technique, which implies multi-level discrete wavelet transform to implement digital image filtering. Canny edge detection technique is implemented to detect the edge of the image to implement Otsu’s based enhanced local ternary pattern (OELTP), which can detect forgery-related artifact. DWT is implemented over Cb and Cr components of the image and using edge texture to improve the Otsu global threshold, which is used to extract features using ELTP technique. Support vector machine (SVM) is used for classification to find the image is forged or not. The performance of the work evaluated on three different open available data sets CASIA v1, CASIA v2, and Columbia. Our proposed work gives better results with some of the previous states of the work in terms of detection accuracy.
Authentication of a person is the major concern in this era for security purposes. In biometric systems Signature is one of the behavioural features used for the authentication purpose. In this paper we work on the offline signature collected through different persons. Morphological operations are applied on these signature images with Hough transform to determine regular shape which assists in authentication process. The values extracted from this Hough space is used in the feed forward neural network which is trained using back-propagation algorithm. After the different training stages efficiency found above more than 95%. Application of this system will be in the security concerned fields, in the defence security, biometric authentication, as biometric computer protection or as method of the analysis of person’s behaviour changes.
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
In this paper, the use of Multi-Layer Perceptron (MLP) Neural Network model is proposed for recognizing
unconstrained offline handwritten Numeral strings. The Numeral strings are segmented and isolated
numerals are obtained using a connected component labeling (CCL) algorithm approach. The structural
part of the models has been modeled using a Multilayer Perceptron Neural Network. This paper also
presents a new technique to remove slope and slant from handwritten numeral string and to normalize the
size of text images and classify with supervised learning methods. Experimental results on a database of
102 numeral string patterns written by 3 different people show that a recognition rate of 99.7% is obtained
on independent digits contained in the numeral string of digits includes both the skewed and slant data.
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
Biometrics is one of the most used technologies in the field of security due to its reliability and
performance. It is based on several physical human characteristics but the most used technology is the
fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in
each fingerprint we propose in this article an image preprocessing procedure in order to improve its
quality before extracting the necessary information for the comparison phase
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
Biometrics is one of the most used technologies in the field of security due to its reliability and performance. It is based on several physical human characteristics but the most used technology is the fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in each fingerprint we propose in this article an image preprocessing procedure in order to improve its quality before extracting the necessary information for the comparison phase.
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION ijcsity
Biometrics is one of the most used technologies in the field of security due to its reliability and
performance. It is based on several physical human characteristics but the most used technology is the
fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in
each fingerprint we propose in this article an image preprocessing procedure in order to improve its
quality before extracting the necessary information for the comparison phase.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
block diagram and signal flow graph representation
14 offline signature verification based on euclidean distance using support vector machine
1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-8, Aug- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 1262
Offline Signature Verification based on Euclidean
distance using Support Vector Machine
Isha1
, Pooja2
, Varsha3
1
Research Scholar, Department of CSE/IT, CTIEMT Campus, Shahpur, Punjab, India
2,3
Assistant Professor, Department of CSE/IT, CTIEMT Campus, Shahpur, Punjab, India
Abstract— In this project, a support vector machine is
developed for identity verification of offline signature
based on the matrices derived through Euclidean distance.
A set of signature samples are collected from 35 different
people. Each person gives his 15 different copies of
signature and then these signature samples are scanned to
have softcopy of them to train SVM. These scanned
signature images are then subjected to a number of image
enhancement operations like binarization,
complementation, filtering, thinning, edge detection and
rotation. On the basis of 15 original signature copies from
each individual, Euclidean distance is calculated. And
every tested image is compared with the range of
Euclidean distance. The values from the ED are fed to the
support vector machine which draws a hyper plane and
classifies the signature into original or forged based on a
particular feature value.
Keywords— Offline signature verification, Support
Vectors, SVM, Euclidean Distance, SMO, EDH, Kernel
Perceptron, Large-Margin-Hyper plane.
I. INTRODUCTION
BIOMETRICS plays important role in personal
identification and authentication systems. Several traits
developed in this area are based on fingerprints, face, iris,
palm, voice, the handwritten signature, hand, etc.
Handwritten signatures have a very special place in this
wide set of biometric technologies. The main reason is
tradition: handwritten signatures have long been
established as the most common means of personal
verification. Signatures are generally accepted everywhere,
by governments and financial institutions as a legal means
of verifying identity. Moreover, verification by signature
analysis requires no extra measurements and people are
used to this thing in their day to day activities. Automatic
signature recognition has many real time applications like
credit card validation, security systems, cheques, contracts,
property papers etc. There are two types of systems:
signature identification systems and signature verification
systems. A signature verification system only decides
whether a given signature belongs to an authorized person
or not. A signature identification system, on the contrary,
has to decide a given signature belongs to which one of a
certain number of persons. There can be two modes of
signature acquisition: online and offline. Online signature
records the motion of the pen while the signature is written,
and it includes velocity, location, acceleration, and pen
pressure, as functions of time. Online systems use this
information captured during acquisition. These dynamic
characteristics are specific to every individual and
sufficiently stable and repetitive. Off-line data is 2-D image
of the signature therefore processing Off-line signature is
complex due to the absence of stable dynamic
characteristics. It is hard to segment signature strokes due
to highly unconventional and stylish writing variations. In
signature verification systems, generally two common
classes of forgeries are considered: skilled and casual. A
casual forgery is produced by only knowing the name of
the person, and without experience of the genuine
signature. When forger uses his own signature or try
genuine signature of another person as a casual forgery, it
is called a substitution forgery. So, style differences are
common in casual forgeries. In skilled forgeries, the forger
has experience of genuine signature. Since skilled forgeries
are very similar to genuine signatures, some appropriate
features for detection of casual forgeries are ineffective in
detection of skilled forgeries.
The system proposed can be divided into two major parts:
training phase and testing phase. The block diagram of the
proposed system is as shown in the figure 1.
The proposed system can be measured by applying
following metrices:
1. PSNR (Peak signal- to- noise ratio) - PSNR is the
peak signal-to-noise ratio measured in decibels
(dB). The PSNR is only useful for data encoded in
terms of bits per pixel, or bits per sample. For
example, an image with 8 bits per pixel contains
integer value from 0 to 255.
2. MSE: The mean square error (MSE) is the squared
norm of the difference between the data and the
approximation divided by the number of elements.
3. MAXERR: Maximum squared error- MAXERR is
the maximum absolute squared deviation of the
data, from the approximation.
4. L2RAT: Ratio of squared norms- L2RAT is the
ratio of the squared norm of the image or signal
2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-8, Aug- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 1263
approximation, to the input signal or image.
Fig.1: Block diagram of the proposed system.
II. SIGNATURE ACQUISITION
Signatures of an individual are obtained by using ball, gel
or sketch pens on plane sheet. These sheets are then
scanned using a scanner and the image is saved in jpg
format. Each signature was then tight cropped manually
using Microsoft Office Picture Manager.
III. PREPROCESSING
The scanned images might contain certain kind of noise, or
might be subjected to damage because it‟s an old signature
or the signatures under consideration may vary in thickness
and size. Hence some kinds of image enhancement
operations are performed to remove noise and to make
signature fit for further operations to be applied.
A. Preprocessing stages of a signature sample
Fig.2: Preprocessing Steps
B. Grayscale Conversion
As the scanned images are stored in database as a color
image, a three dimensional image (MXNX3) is not suitable
for further processing, so it must be converted into a
grayscale image to represent each pixel in the range from 0
to 255.
C. Binarization
It is done by extracting lightness (brightness, density), each
pixel in an image is converted into one bit either '1' or '0'
depending upon the mean value of all the pixel. If greater
than mean value then its '1' otherwise its '0'.
D. Complementation
Complementation is done as the natural tendency to have
data in form of 1s. In the complement of a binary image, 0
is changed to 1 and 1 ischanged to 0; white and black are
reversed. In the output image, dark areas become light and
light areas become dark.
E. Filtering
Filtering is done in order to remove the noise that might be
introduced during the scanning process. The median filter
is nonlinear and is normally used to remove noise. It
considers each pixel in the image and then looks at its
nearby neighbors to decide whether or not it is
representative of its surroundings and then replaces it with
the median of neighbor pixels.
F. Edge thinning
Edge thinning is used to remove the outcast extra points on
the edge of the signature image. The edge operator has
been applied (like sobel, canny) to detect the edges and the
edges are smoothed using an appropriate threshold.
G. Canny Edge detection
Edge is a boundary between two homogenous surfaces.
Applying an edge detection algorithm (either using
laplacian or gradient method) to an image which shows
acute variation in brightness or, which has layoffs,
significantly reduces the amount of data that is to be
processed and thus filters out the non structural, less
relevant information of the image and preserves only the
important structural properties.
The figure 2 shows the preprocessing stages of a signature
sample
IV. FEATURE EXTRACTION
The feature extraction method is most important step in any
recognition system, because the recognition accuracy
totally depends on the features extracted. The main
objective of a feature extraction technique is to accurately
retrieve the features. The extracted features such as angle
3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-8, Aug- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 1263
approximation, to the input signal or image.
Fig.1: Block diagram of the proposed system.
II. SIGNATURE ACQUISITION
Signatures of an individual are obtained by using ball, gel
or sketch pens on plane sheet. These sheets are then
scanned using a scanner and the image is saved in jpg
format. Each signature was then tight cropped manually
using Microsoft Office Picture Manager.
III. PREPROCESSING
The scanned images might contain certain kind of noise, or
might be subjected to damage because it‟s an old signature
or the signatures under consideration may vary in thickness
and size. Hence some kinds of image enhancement
operations are performed to remove noise and to make
signature fit for further operations to be applied.
A. Preprocessing stages of a signature sample
Fig.2: Preprocessing Steps
B. Grayscale Conversion
As the scanned images are stored in database as a color
image, a three dimensional image (MXNX3) is not suitable
for further processing, so it must be converted into a
grayscale image to represent each pixel in the range from 0
to 255.
C. Binarization
It is done by extracting lightness (brightness, density), each
pixel in an image is converted into one bit either '1' or '0'
depending upon the mean value of all the pixel. If greater
than mean value then its '1' otherwise its '0'.
D. Complementation
Complementation is done as the natural tendency to have
data in form of 1s. In the complement of a binary image, 0
is changed to 1 and 1 ischanged to 0; white and black are
reversed. In the output image, dark areas become light and
light areas become dark.
E. Filtering
Filtering is done in order to remove the noise that might be
introduced during the scanning process. The median filter
is nonlinear and is normally used to remove noise. It
considers each pixel in the image and then looks at its
nearby neighbors to decide whether or not it is
representative of its surroundings and then replaces it with
the median of neighbor pixels.
F. Edge thinning
Edge thinning is used to remove the outcast extra points on
the edge of the signature image. The edge operator has
been applied (like sobel, canny) to detect the edges and the
edges are smoothed using an appropriate threshold.
G. Canny Edge detection
Edge is a boundary between two homogenous surfaces.
Applying an edge detection algorithm (either using
laplacian or gradient method) to an image which shows
acute variation in brightness or, which has layoffs,
significantly reduces the amount of data that is to be
processed and thus filters out the non structural, less
relevant information of the image and preserves only the
important structural properties.
The figure 2 shows the preprocessing stages of a signature
sample
IV. FEATURE EXTRACTION
The feature extraction method is most important step in any
recognition system, because the recognition accuracy
totally depends on the features extracted. The main
objective of a feature extraction technique is to accurately
retrieve the features. The extracted features such as angle
4. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-8, Aug- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 1265
TABLE 2: Time Taken by Process using SMO algorithm.
In the above table training time, testing time and
computation time by SVM using SMO algorithm is
tabulated.
VI. CONCLUSION AND FUTURE WORK
In this project we are trying to verify whether a signature
sample is forged or not using support vector machine. We
have acquired the signature samples of different persons,
pre-processed them using techniques like gray scale
conversion, binarization, complementation, thinning,
filtering and edge detection using canny edge detector.
Further from these pre-processed signatures features such
as Euclidean distance, angle of rotation and time of
operation are extracted. These feature set are separately
passed through the support vector machine developed using
SMO algorithm which are tested against both linear and
polynomial kernel. This project actually differentiate that
signature is forged or original.
In future work it would be extended to verify a signature on
the basis of false acceptance rate (FAR) and false rejection
rate (FRR). A new feature extraction algorithm will be
imposed which tell at what difference the signature is said
to be forged. This is done so, as there may be variation in
two original signatures in this case we are to calculate the
percentage to accept the signature or reject it.
REFERENCES
[1] Kruthi.C, Deepika.C.Shet, “Offline Signature
Verification Using Support Vector Machine” Fifth
International Conference on Signals and Image
Processing, IEEE (2014) DOI10.1109/ICSIP.2014.5,
pp. 1-7
[2] S. A. Angadi, Smita Gour, Gayatri Bajantri “Offline
Signature Recognition System Using Radon
Transform”, Fifth International Conference on Signals
and Image Processing, IEEE (2014) DOI
10.1109/ICSIP.2014.13, pp. 56-61
[3] S. A. Angadi, Smita Gour “Euclidean Distance
Based Offline Signature Recognition System Using
Global and Local WaveletFeatures” Fifth
International Conference on Signals and Image
Processing, IEEE(2014), DOI 10.1109/ICSIP.2014.19
pp. 87-91
[4] Ibrahim S. I. ABUHAIBA “Offline Signature
Verification Using Graph Matching”, Turk J Elec
Engin, VOL.15, NO.1 2007, c TU¨BI˙TAK, pp. 89-
104
[5] Prof. Sachin Patel (et.al) “Comparative Analysis of
Different Approaches for Offline Signature
Verification “International Journal Of Advanced
Electronics & Communication Systems Approved by
CSIR NISCAIR ISSN NO: 2277-7318, ISSUE 1 VOL
3, JAN-FEB, 2014 PAPER ID SM-1134.
[6] Vahid Kiani, Reza Pourreza & Hamid Reza Pourreza
“OfflineSignature Verification Using Local Radon
Transform and Support Vector Machines”,
International Journal of Image Processing (IJIP)
Volume(3), Issue(5) pp. 184-194