SlideShare a Scribd company logo
VERIFICATION OF SIGNATURE
Project Members 1) Sakshi Jadhav
2) Nikita Jadhav
3) Vaishnavi Sonawane
4) Neha Pagariya
Guided By: A. A. Pawar Sir
Hod: Prof . P. G. Sali sir
Project Co-Ordinator: Ms . S. S. Shinde Mam
AIM :-
• The aim of signature verification is to classify the input
signature as genuine or forgery by matching it against the
database signature image using some distance measure.
• Forgery means that an individual is trying to make false
signatures of any other individual to become authenticated.
OBJECTIVES :-
• Information about the way the human hand creates the
signature such as hand speed and pressure measurements,
acquired from special peripheral units, is needed.
• A signature recognition and verification is a system capable of
efficiently addressing two individual but strongly related tasks
identification of the signature owner, and , decision whether the
signature is genuine or forger.
ABSTRACT:-
Signatures are widely used as a means of personal
identification and verification. Many documents like bank cheques
and legal transactions require signature verification. Signature-
based verification of a large number of documents is a very difficult
and time consuming task . Consequently an explosive growth has
been observed in biometric personal verification and authentication
systems that are connected with quantifiable physical unique
characteristics (finger prints, hand geometry, face, ear, iris scan
Verifying a signature will tell you if the signed data has changed or
not. When a digital signature is verified, the signature is decrypted
to produce the original value.
INTRODUCTION:-
The authenticity of many legal, financial, and other documents is
done by the presence or absence of an authorized handwritten
signature. “Digital Signature” is the best solution for authenticity
in various fields. A digital signature is nothing but an attachment
to any piece of Python Based information, which represents the
content of the document for that document. Now days , many
fraud things happens if any unknown person wants to imitate
person’s identity. If a person sign name of the checking account
holder to check without account holder’s permission, then this is
considered signature forgery
LITERATURE SURVEY:-
Sr No Paper Name
Year of
Publication
1) A New Approach of Digital
Signature Verification based on
BioGamal Algorithm
2019
2) Signature verification &
Recognization Case Study
2019
SYSTEM ARCHITECTURE:-
METHODOLOGY:-
• In this project, Before training all signatures image are passed through the
preprocessing stage. In preprocessing stage images are captured which are mostly
horizontally there can be variations in size , diversion , thickness of line
,background paper color etc. Preprocessing signature images are fed to the. In this
project, Before training all signatures image are passed through the Preprocess ing
stage. In preprocessing stage images are captured which are mostly horizontally
there can be variations in size , diversion , thickness of line ,background paper
color etc.
• The offline image and online data of the signature are simultaneously obtained
through the smart pen, and then the quality of the signature data is improved
through preprocessing and feature extraction to ensure the accuracy of the
verification result. Each signaturehas a corresponding offline image and online
data. The online curve in the table is obtained based on the X coordinate of the
signature data. The abscissa of the graph represents time, and the ordinate
represents the change of the X coordinate or Y coordinate of the online signature
over time during the writing processAfter applying the feature extraction process
the test
Er Diagram:-
DFD Diagram Level 0 :-
DFD Level 1 Diagram :-
HARDWARE REQUIREMENT:-
• Laptop or PC
 Windows 7 or higher
 I5 processor system or higher
 8 GB RAM or higher
 100 GB ROM or higher
 50 GB SSD
Software Requirement:-
i. Laptop or PC
• Python :
1. PyCharm 64
ADVANTAGE:-
• Signature is a man-made biometric system where forgery has
been studied extensively.
• Forgery is detected even when the forger has managed to get a copy
of the authentic signature.
• The signature verification system is independent of the native
language user.
• Cheap hardware.
• Little storage requirements.
DISADVANTAGE:-
• The private key must be kept in a secured manner.
• The process of generation and verification of digital signature
requires considerable amount of time.
CONCLUSION:-
In this project, simple and effective Signature Matching-
based language-independent signature verification architecture
has been purposed. The purposed model is quite simple of
signature matching using python using PyCharm 64So far we
have figured out several problems of existing methods of
signature detection through implementation. Still we did not
implemented our proposed method but from the implementation
and analysis of existing method we can say that it will give us
better performance.
REFERENCES:-
• Devnath , L. & Islam, Md. R. (2016). Off-line human signature recognition system
based on histogram analysis using MATLAB.
• Kumar, D. A. & Dhandapani, S. (2016). A novel bank check signature verification
model using concentric circle masking features and its performance analysis over
various neural network training functions.
• Salama, M. A. & Hussein, W, (2016). Invariant directional feature extraction and
matching approach for robust offLine signature verification.

More Related Content

Similar to finalsignverification.pptx

Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a Service
PT Datacomm Diangraha
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
ZTech Proje
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
Editor IJMTER
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
Mitesh Katira
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
Felipe Prado
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
IRJET Journal
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
Ambuj Kumar
 
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEMsynopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
Nitesh Dubey
 
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Techsylvania
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33
IJSRED
 
Muhammad's Presentation.pptx
Muhammad's Presentation.pptxMuhammad's Presentation.pptx
Muhammad's Presentation.pptx
MunirAli6
 
E signing application
E signing applicationE signing application
E signing application
chayapathi sarath
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Mohamed Talaat
 
Anomaly Detection and You
Anomaly Detection and YouAnomaly Detection and You
Anomaly Detection and You
Mary Kelly Rich
 
E lock digital signatures
E lock digital signaturesE lock digital signatures
E lock digital signatures
E-Lock digital signatures
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...
Priyanka Pradhan
 
FPTS
FPTSFPTS
Digital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFDigital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDF
iText Group nv
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakaleAakash Takale
 
How will we prove our idnetities in the future 2050?_Contego
How will we prove our idnetities in the future 2050?_ContegoHow will we prove our idnetities in the future 2050?_Contego
How will we prove our idnetities in the future 2050?_Contego
Contego
 

Similar to finalsignverification.pptx (20)

Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a Service
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEMsynopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
 
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33
 
Muhammad's Presentation.pptx
Muhammad's Presentation.pptxMuhammad's Presentation.pptx
Muhammad's Presentation.pptx
 
E signing application
E signing applicationE signing application
E signing application
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Anomaly Detection and You
Anomaly Detection and YouAnomaly Detection and You
Anomaly Detection and You
 
E lock digital signatures
E lock digital signaturesE lock digital signatures
E lock digital signatures
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...
 
FPTS
FPTSFPTS
FPTS
 
Digital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFDigital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDF
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
How will we prove our idnetities in the future 2050?_Contego
How will we prove our idnetities in the future 2050?_ContegoHow will we prove our idnetities in the future 2050?_Contego
How will we prove our idnetities in the future 2050?_Contego
 

More from 40NehaPagariya

Chapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptxChapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptx
40NehaPagariya
 
operating system hive1.pptx
operating system hive1.pptxoperating system hive1.pptx
operating system hive1.pptx
40NehaPagariya
 
Management_part-4.pptx
Management_part-4.pptxManagement_part-4.pptx
Management_part-4.pptx
40NehaPagariya
 
Chapter 1- Artficial Intelligence.pptx
Chapter 1- Artficial Intelligence.pptxChapter 1- Artficial Intelligence.pptx
Chapter 1- Artficial Intelligence.pptx
40NehaPagariya
 
Chapter 2 wbp.pptx
Chapter 2 wbp.pptxChapter 2 wbp.pptx
Chapter 2 wbp.pptx
40NehaPagariya
 
Industrial_Training_PPT%20of%20Neha.pptx
Industrial_Training_PPT%20of%20Neha.pptxIndustrial_Training_PPT%20of%20Neha.pptx
Industrial_Training_PPT%20of%20Neha.pptx
40NehaPagariya
 
software testing micro projectnnnn(1)22.pptx
software testing micro projectnnnn(1)22.pptxsoftware testing micro projectnnnn(1)22.pptx
software testing micro projectnnnn(1)22.pptx
40NehaPagariya
 
327923326-Ppt-of-Airline-Reservation-System-Project-Report.ppt
327923326-Ppt-of-Airline-Reservation-System-Project-Report.ppt327923326-Ppt-of-Airline-Reservation-System-Project-Report.ppt
327923326-Ppt-of-Airline-Reservation-System-Project-Report.ppt
40NehaPagariya
 
14573760.ppt
14573760.ppt14573760.ppt
14573760.ppt
40NehaPagariya
 
DOC-20220426-WA0049..pptx
DOC-20220426-WA0049..pptxDOC-20220426-WA0049..pptx
DOC-20220426-WA0049..pptx
40NehaPagariya
 
CPP Presentation 2.pdf
CPP Presentation 2.pdfCPP Presentation 2.pdf
CPP Presentation 2.pdf
40NehaPagariya
 
DOC-20220426-WA0049..pptx
DOC-20220426-WA0049..pptxDOC-20220426-WA0049..pptx
DOC-20220426-WA0049..pptx
40NehaPagariya
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
40NehaPagariya
 
SEMINAR.pdf
SEMINAR.pdfSEMINAR.pdf
SEMINAR.pdf
40NehaPagariya
 
kasodhan2019.pdf
kasodhan2019.pdfkasodhan2019.pdf
kasodhan2019.pdf
40NehaPagariya
 

More from 40NehaPagariya (15)

Chapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptxChapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptx
 
operating system hive1.pptx
operating system hive1.pptxoperating system hive1.pptx
operating system hive1.pptx
 
Management_part-4.pptx
Management_part-4.pptxManagement_part-4.pptx
Management_part-4.pptx
 
Chapter 1- Artficial Intelligence.pptx
Chapter 1- Artficial Intelligence.pptxChapter 1- Artficial Intelligence.pptx
Chapter 1- Artficial Intelligence.pptx
 
Chapter 2 wbp.pptx
Chapter 2 wbp.pptxChapter 2 wbp.pptx
Chapter 2 wbp.pptx
 
Industrial_Training_PPT%20of%20Neha.pptx
Industrial_Training_PPT%20of%20Neha.pptxIndustrial_Training_PPT%20of%20Neha.pptx
Industrial_Training_PPT%20of%20Neha.pptx
 
software testing micro projectnnnn(1)22.pptx
software testing micro projectnnnn(1)22.pptxsoftware testing micro projectnnnn(1)22.pptx
software testing micro projectnnnn(1)22.pptx
 
327923326-Ppt-of-Airline-Reservation-System-Project-Report.ppt
327923326-Ppt-of-Airline-Reservation-System-Project-Report.ppt327923326-Ppt-of-Airline-Reservation-System-Project-Report.ppt
327923326-Ppt-of-Airline-Reservation-System-Project-Report.ppt
 
14573760.ppt
14573760.ppt14573760.ppt
14573760.ppt
 
DOC-20220426-WA0049..pptx
DOC-20220426-WA0049..pptxDOC-20220426-WA0049..pptx
DOC-20220426-WA0049..pptx
 
CPP Presentation 2.pdf
CPP Presentation 2.pdfCPP Presentation 2.pdf
CPP Presentation 2.pdf
 
DOC-20220426-WA0049..pptx
DOC-20220426-WA0049..pptxDOC-20220426-WA0049..pptx
DOC-20220426-WA0049..pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
SEMINAR.pdf
SEMINAR.pdfSEMINAR.pdf
SEMINAR.pdf
 
kasodhan2019.pdf
kasodhan2019.pdfkasodhan2019.pdf
kasodhan2019.pdf
 

Recently uploaded

How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
vencislavkaaa
 
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
foismail170
 
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdfRECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
AlessandroMartins454470
 
Operating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdfOperating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdf
harikrishnahari6276
 
Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
Sheldon Byron
 
一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理
yuhofha
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
alexthomas971
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
pxyhy
 
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
foismail170
 
DIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptxDIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptx
FarzanaRbcomcs
 
han han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi samahan han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi sama
IrlanMalik
 
134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science
Manu Mitra
 
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
foismail170
 
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
yuhofha
 
Brand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio IBrand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio I
thomasaolson2000
 
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring ChapterHow Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
Hector Del Castillo, CPM, CPMM
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
larisashrestha558
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
mmorales2173
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
foismail170
 
How to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and BusinessHow to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and Business
ideatoipo
 

Recently uploaded (20)

How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
 
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
 
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdfRECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
 
Operating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdfOperating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdf
 
Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
 
一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
 
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
 
DIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptxDIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptx
 
han han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi samahan han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi sama
 
134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science
 
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
 
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
 
Brand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio IBrand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio I
 
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring ChapterHow Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
 
How to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and BusinessHow to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and Business
 

finalsignverification.pptx

  • 1. VERIFICATION OF SIGNATURE Project Members 1) Sakshi Jadhav 2) Nikita Jadhav 3) Vaishnavi Sonawane 4) Neha Pagariya Guided By: A. A. Pawar Sir Hod: Prof . P. G. Sali sir Project Co-Ordinator: Ms . S. S. Shinde Mam
  • 2. AIM :- • The aim of signature verification is to classify the input signature as genuine or forgery by matching it against the database signature image using some distance measure. • Forgery means that an individual is trying to make false signatures of any other individual to become authenticated.
  • 3. OBJECTIVES :- • Information about the way the human hand creates the signature such as hand speed and pressure measurements, acquired from special peripheral units, is needed. • A signature recognition and verification is a system capable of efficiently addressing two individual but strongly related tasks identification of the signature owner, and , decision whether the signature is genuine or forger.
  • 4. ABSTRACT:- Signatures are widely used as a means of personal identification and verification. Many documents like bank cheques and legal transactions require signature verification. Signature- based verification of a large number of documents is a very difficult and time consuming task . Consequently an explosive growth has been observed in biometric personal verification and authentication systems that are connected with quantifiable physical unique characteristics (finger prints, hand geometry, face, ear, iris scan Verifying a signature will tell you if the signed data has changed or not. When a digital signature is verified, the signature is decrypted to produce the original value.
  • 5. INTRODUCTION:- The authenticity of many legal, financial, and other documents is done by the presence or absence of an authorized handwritten signature. “Digital Signature” is the best solution for authenticity in various fields. A digital signature is nothing but an attachment to any piece of Python Based information, which represents the content of the document for that document. Now days , many fraud things happens if any unknown person wants to imitate person’s identity. If a person sign name of the checking account holder to check without account holder’s permission, then this is considered signature forgery
  • 6. LITERATURE SURVEY:- Sr No Paper Name Year of Publication 1) A New Approach of Digital Signature Verification based on BioGamal Algorithm 2019 2) Signature verification & Recognization Case Study 2019
  • 8. METHODOLOGY:- • In this project, Before training all signatures image are passed through the preprocessing stage. In preprocessing stage images are captured which are mostly horizontally there can be variations in size , diversion , thickness of line ,background paper color etc. Preprocessing signature images are fed to the. In this project, Before training all signatures image are passed through the Preprocess ing stage. In preprocessing stage images are captured which are mostly horizontally there can be variations in size , diversion , thickness of line ,background paper color etc. • The offline image and online data of the signature are simultaneously obtained through the smart pen, and then the quality of the signature data is improved through preprocessing and feature extraction to ensure the accuracy of the verification result. Each signaturehas a corresponding offline image and online data. The online curve in the table is obtained based on the X coordinate of the signature data. The abscissa of the graph represents time, and the ordinate represents the change of the X coordinate or Y coordinate of the online signature over time during the writing processAfter applying the feature extraction process the test
  • 11. DFD Level 1 Diagram :-
  • 12. HARDWARE REQUIREMENT:- • Laptop or PC  Windows 7 or higher  I5 processor system or higher  8 GB RAM or higher  100 GB ROM or higher  50 GB SSD
  • 13. Software Requirement:- i. Laptop or PC • Python : 1. PyCharm 64
  • 14. ADVANTAGE:- • Signature is a man-made biometric system where forgery has been studied extensively. • Forgery is detected even when the forger has managed to get a copy of the authentic signature. • The signature verification system is independent of the native language user. • Cheap hardware. • Little storage requirements.
  • 15. DISADVANTAGE:- • The private key must be kept in a secured manner. • The process of generation and verification of digital signature requires considerable amount of time.
  • 16. CONCLUSION:- In this project, simple and effective Signature Matching- based language-independent signature verification architecture has been purposed. The purposed model is quite simple of signature matching using python using PyCharm 64So far we have figured out several problems of existing methods of signature detection through implementation. Still we did not implemented our proposed method but from the implementation and analysis of existing method we can say that it will give us better performance.
  • 17. REFERENCES:- • Devnath , L. & Islam, Md. R. (2016). Off-line human signature recognition system based on histogram analysis using MATLAB. • Kumar, D. A. & Dhandapani, S. (2016). A novel bank check signature verification model using concentric circle masking features and its performance analysis over various neural network training functions. • Salama, M. A. & Hussein, W, (2016). Invariant directional feature extraction and matching approach for robust offLine signature verification.