SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1437
SIGNATURE VERIFICATION USING DCT
Prathiba M K1, Sushmitha H L2, Chandan B3, Karthik B K4 and Manohar H P 5
1Professor , Dept. of Electronics and Communication Engineering, ATMECE Mysore, Karnataka, India
2,3,4,5UG Students Dept. of Electronics and Communication Engineering, ATMECE Mysore, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Signatures have been considered a typical form
of authentication in our society for hundreds of years.
Signature is a simple, concrete expression of the unique
variations in human hand geometry. The way a person signs
his or her name is known to be characteristic of that
individual. A signature verification system must be able to
detect forgeries, and, at the same time, reduce rejection of
genuine signatures. Signatures are subject to intra-personal
variations. Hence, a signature verification system is feasible
only if the system is insensitive to intra-personal variability,
but sensitive to interpersonal variability. Even when
insensitive to intra-personal variations, the system must
possess the discriminating power to foil skillful forgers.
Key Words: (Size 10 & Bold) signature verification,
interpersonal variability, intra-personal variability,
Discrete Cosine Transform, Feature extraction etc
(Minimum 5 to 8 key words)…
1. INTRODUCTION
Human signature is a biometric measure of person's
identification. In many sectorslikebanks,official documents,
receipts etc. handwrittensignatureareverifiedtosecure and
identify the concerned person. Each individual has his own
signature different with others but in most of the time it is
not possible to produce the replica of the signature. The
signature verification problem aims to minimize the
intrapersonal differences. Signature verification can be
categorized into following two parts: online and offline
.Online handwritten signature verification deals with
automatic conversion of characters which are written on a
special digitizer, tablet PC or PDA, Whereina sensorpicksup
the pen -tip movements as well as pen -up/pen-down
switching.
An on-line signature verification system based on local
information and a one-class classifier, i.e. the Linear
Programming Descriptor classifier (LPD), was presented by
Nanni and Lumini [1]. The authors investigated and
described how the information was extracted as time
functions of various dynamic properties of the signatures,
and then the discrete 1-D Wavelet Transform (WT) was
performed on these features. The DCT was used to reduce
the approximation coefficients vector obtained by WT to a
feature vector of a given dimension. Fabregas and Faundez-
Zanuy [2]: have presented a new system for on-line
signature verification based on DCT feature extraction with
discriminability feature selection. They performed a
complete set of simulations with the largest available online
signature database, MCYT, whichconsistsof330peoplewith
genuine and skilled forgeries performed by five other
different users.
Dimauro et.al.[3] in their study of local features stability
have introduced a warping functionthatallowsmtonpoints
to be matched. However, such an approach may not be
practical in cases of extreme values of features.
Lei and Govindaraju[4] analyzed the consistency and
discriminative power of on-line features using a distance-
based measure that is optimized for each feature of study.
They view signature verification as a one category
classification problem, and use the distances between
features to distinguish them rather than the feature values
themselves.
1.1 Motivation
Online handwrittensignatureverificationsystemisbased
on the extracting the featuresof signaturefromthesignature
pad and consider as interpersonal features that are not
statistically stable. These are used for comparison and
verifications between different signaturesandenhancingthe
interpersonal variations and classifier is used to verify
signatureand provide resultasgenuineorforgeryandalsoto
present a simple and effective approach for an online
signature verification system. Finally, complete content and
organizational editing before formatting. Please take note of
the following items when proofreading spelling and
grammar:
1.2 Discrete Cosine Transform (DCT)
Online signature verification has proved to be more
accurate than the offline signature verification. The DCT has
the ability to compactly represent an online signature
verification using a fixed number of coefficients which leads
to fast matching algorithm.
A DCT coefficient is the compression of feature data,
which reduces the elapsed time and storage space for
training and verification processes. The time for DTW and
HMM methods is very long. From these advantagesofDCT,it
motivated us to do online signature verification based on
DCT.
2. SIGNATURE VERIFICATION SYSTEM
The proposed online handwritten signature verification
system consists the following blocks as show in Fig. 1
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1438
Fig -1: Block diagram of signature verification system
During signature acquisition phase signatures are acquired
by using Wacom tablet the 125 signatures are taken from 25
signers at least 5 samples each user. The features are
extracted from these signatures and stored in the database.
Testing phase is carried out same as training phase but in
testing phase we do feature extraction is only for specified
sample of specified user. If, the tested signature features
matches with the features of the training phase of the
respective user then the tested signature will treated as
genuine signature.
During the training and verification phase, test signature to
be compared against the claimed user’s reference set
signature. In order to match two signatures, the following
stages are applied:
A basis feature matrix is calculated from the reference
signatures of each signer.Forthis,wecalculatetheminimum,
mean, maximum and sum values for each DCT Coefficient in
the reference set. The distance between the featurematrixof
reference and test signatures computes. The matrix of the
featuredistance isalso normalizedtomaptoavaluebetween
0 and1. Genetic algorithm is used for verification process.
3. RESULTS
The signature is acquired using tablet is as shown in Fig.2
Fig -2: User signature
The user signature is varying with respect to horizontal
direction i.e. X-coordinate and the DCT of X is shown in Fig.
3.
Fig -3: Plotting of theta and its DCT of signature
The user signature is varying with respect to vertical
direction i.e. Y-coordinate and the DCT of Y is shown in Fig.
4.
Fig -4: Plotting of theta and its DCT of signature
The value of theta represents the movement of pen with
respect to X-axis and its corresponding DCT is plotted as
shown in Fig.5.
Fig -5: Plotting of theta and its DCT of signature
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1439
Genetic algorithm is used for classification of signatures,
which makes the verification performancemoreaccurate. To
evaluate the experiments, False Acceptance Rate (FAR) and
False Rejection Rate (FRR) are determined. FAR represents
the probability that a false match occurs, while FRR
represents the probability that a false rejection occurs.
Genuine and forged signatures of each user are fed to
database for comparison which provides two possible
results and are as follows.
When genuine signatureiscomparedwithgenuinesignature
of users and the result obtained is “Genuine signature” as
shown in Fig. 6.
Fig -6: output of genuine signature
Genuine signature is compared with forged signature of
users and the result obtained is “forged signature” asshown
in Fig.7.
Fig -7: output of genuine signature
3. CONCULSION
Although signature verification is not one of the safest
biometric solutions, the use of it in business practices is still
justified. Moreover, signature verification has a very
promising future. One major drawback is that humans are
not consistent when signing their signatures. In this paper, a
robust signature verification system has been proposed,
based on DCT coefficients and the Genetic Algorithm. Our
proposed method can extract basic dynamic features from
signature time signals, and compress signature data, while
keeping the rough form and basic information of signatures.
Especially in the context of skilled forgery, where inter-
personal variability in the number of features becomes
negligible, an effective analysis of features based on time
signals is essential for attainment of a suitable performance.
Ideally we need features that are stable, i.e. do not change
very much between different genuine signatures, and which
are hard to forge. For attaining this purpose, capturing
signals via a tablet digitizer and using the extracted
dynamics information has been considered, mainly in the
form of simple parameters of DCT coefficients. These
features are efficient and experimental results confirm that
the proposed method is promising. The summation
condition in the verification process guides the system
towards an accurate decision.
REFERENCES
[1] Nanni, L. and Lumini, A., “A novel local on-line signature
verification system,” Pattern Recognition Letters, 2008.,pp.
559–568.
[2] Fabregas, J. and Faundez-Zanuy,., “On-line signature
verification system with failure to enroll management,”
Pattern Recognition Letters, 2009., pp. 2117–2126.
[3] Dimauro, G., Modugno, R., Pirlo, G. and Sarcinella, L.,
“Analysis of stability in hand-written dynamic signatures,”
Proceedings of the 8th International Workshop onFrontiers
in Handwriting Recognition, IWFHR,2002, pp. 259–263
[4] H. Lei, V. Govindaraju “A comparative study on the
consistency of features in on-line signature verification”
Pattern Recognition Letters, 26 (15) (2005),pp.2483– 2489

More Related Content

What's hot

Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
IJERA Editor
 
IRJET - A Survey on Recognition of Handwritten ZIP Codes in a Postal Sorting ...
IRJET - A Survey on Recognition of Handwritten ZIP Codes in a Postal Sorting ...IRJET - A Survey on Recognition of Handwritten ZIP Codes in a Postal Sorting ...
IRJET - A Survey on Recognition of Handwritten ZIP Codes in a Postal Sorting ...
IRJET Journal
 
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
IRJET Journal
 
Paper id 2520141232
Paper id 2520141232Paper id 2520141232
Paper id 2520141232
IJRAT
 
B0210714
B0210714B0210714
B0210714
IOSR Journals
 
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Editor IJMTER
 
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSMAn Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
Associate Professor in VSB Coimbatore
 

What's hot (7)

Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
 
IRJET - A Survey on Recognition of Handwritten ZIP Codes in a Postal Sorting ...
IRJET - A Survey on Recognition of Handwritten ZIP Codes in a Postal Sorting ...IRJET - A Survey on Recognition of Handwritten ZIP Codes in a Postal Sorting ...
IRJET - A Survey on Recognition of Handwritten ZIP Codes in a Postal Sorting ...
 
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
 
Paper id 2520141232
Paper id 2520141232Paper id 2520141232
Paper id 2520141232
 
B0210714
B0210714B0210714
B0210714
 
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
 
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSMAn Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
 

Similar to Signature Verification using DCT

Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemDistance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature System
IRJET Journal
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
IRJET Journal
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
IRJET Journal
 
Offline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbandsOffline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbands
TELKOMNIKA JOURNAL
 
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
IRJET Journal
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
eSAT Publishing House
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
IRJET- Decentralized E-Voting System
IRJET-  	  Decentralized E-Voting SystemIRJET-  	  Decentralized E-Voting System
IRJET- Decentralized E-Voting System
IRJET Journal
 
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
IRJET Journal
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
IRJET Journal
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET Journal
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33
IJSRED
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTING
IRJET Journal
 
A Review Paper on Personal Identification with An Efficient Method Of Combina...
A Review Paper on Personal Identification with An Efficient Method Of Combina...A Review Paper on Personal Identification with An Efficient Method Of Combina...
A Review Paper on Personal Identification with An Efficient Method Of Combina...
IRJET Journal
 
Choudhary2015
Choudhary2015Choudhary2015
Choudhary2015
Amit Kabra
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET Journal
 
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET Journal
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
IRJET Journal
 
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure VanetIRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET Journal
 
Traffic Sign Recognition using CNNs
Traffic Sign Recognition using CNNsTraffic Sign Recognition using CNNs
Traffic Sign Recognition using CNNs
IRJET Journal
 

Similar to Signature Verification using DCT (20)

Distance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature SystemDistance Based Verification Technique for Online Signature System
Distance Based Verification Technique for Online Signature System
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
Offline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbandsOffline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbands
 
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Decentralized E-Voting System
IRJET-  	  Decentralized E-Voting SystemIRJET-  	  Decentralized E-Voting System
IRJET- Decentralized E-Voting System
 
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTING
 
A Review Paper on Personal Identification with An Efficient Method Of Combina...
A Review Paper on Personal Identification with An Efficient Method Of Combina...A Review Paper on Personal Identification with An Efficient Method Of Combina...
A Review Paper on Personal Identification with An Efficient Method Of Combina...
 
Choudhary2015
Choudhary2015Choudhary2015
Choudhary2015
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
 
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure VanetIRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
 
Traffic Sign Recognition using CNNs
Traffic Sign Recognition using CNNsTraffic Sign Recognition using CNNs
Traffic Sign Recognition using CNNs
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 

Recently uploaded (20)

Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 

Signature Verification using DCT

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1437 SIGNATURE VERIFICATION USING DCT Prathiba M K1, Sushmitha H L2, Chandan B3, Karthik B K4 and Manohar H P 5 1Professor , Dept. of Electronics and Communication Engineering, ATMECE Mysore, Karnataka, India 2,3,4,5UG Students Dept. of Electronics and Communication Engineering, ATMECE Mysore, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Signatures have been considered a typical form of authentication in our society for hundreds of years. Signature is a simple, concrete expression of the unique variations in human hand geometry. The way a person signs his or her name is known to be characteristic of that individual. A signature verification system must be able to detect forgeries, and, at the same time, reduce rejection of genuine signatures. Signatures are subject to intra-personal variations. Hence, a signature verification system is feasible only if the system is insensitive to intra-personal variability, but sensitive to interpersonal variability. Even when insensitive to intra-personal variations, the system must possess the discriminating power to foil skillful forgers. Key Words: (Size 10 & Bold) signature verification, interpersonal variability, intra-personal variability, Discrete Cosine Transform, Feature extraction etc (Minimum 5 to 8 key words)… 1. INTRODUCTION Human signature is a biometric measure of person's identification. In many sectorslikebanks,official documents, receipts etc. handwrittensignatureareverifiedtosecure and identify the concerned person. Each individual has his own signature different with others but in most of the time it is not possible to produce the replica of the signature. The signature verification problem aims to minimize the intrapersonal differences. Signature verification can be categorized into following two parts: online and offline .Online handwritten signature verification deals with automatic conversion of characters which are written on a special digitizer, tablet PC or PDA, Whereina sensorpicksup the pen -tip movements as well as pen -up/pen-down switching. An on-line signature verification system based on local information and a one-class classifier, i.e. the Linear Programming Descriptor classifier (LPD), was presented by Nanni and Lumini [1]. The authors investigated and described how the information was extracted as time functions of various dynamic properties of the signatures, and then the discrete 1-D Wavelet Transform (WT) was performed on these features. The DCT was used to reduce the approximation coefficients vector obtained by WT to a feature vector of a given dimension. Fabregas and Faundez- Zanuy [2]: have presented a new system for on-line signature verification based on DCT feature extraction with discriminability feature selection. They performed a complete set of simulations with the largest available online signature database, MCYT, whichconsistsof330peoplewith genuine and skilled forgeries performed by five other different users. Dimauro et.al.[3] in their study of local features stability have introduced a warping functionthatallowsmtonpoints to be matched. However, such an approach may not be practical in cases of extreme values of features. Lei and Govindaraju[4] analyzed the consistency and discriminative power of on-line features using a distance- based measure that is optimized for each feature of study. They view signature verification as a one category classification problem, and use the distances between features to distinguish them rather than the feature values themselves. 1.1 Motivation Online handwrittensignatureverificationsystemisbased on the extracting the featuresof signaturefromthesignature pad and consider as interpersonal features that are not statistically stable. These are used for comparison and verifications between different signaturesandenhancingthe interpersonal variations and classifier is used to verify signatureand provide resultasgenuineorforgeryandalsoto present a simple and effective approach for an online signature verification system. Finally, complete content and organizational editing before formatting. Please take note of the following items when proofreading spelling and grammar: 1.2 Discrete Cosine Transform (DCT) Online signature verification has proved to be more accurate than the offline signature verification. The DCT has the ability to compactly represent an online signature verification using a fixed number of coefficients which leads to fast matching algorithm. A DCT coefficient is the compression of feature data, which reduces the elapsed time and storage space for training and verification processes. The time for DTW and HMM methods is very long. From these advantagesofDCT,it motivated us to do online signature verification based on DCT. 2. SIGNATURE VERIFICATION SYSTEM The proposed online handwritten signature verification system consists the following blocks as show in Fig. 1
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1438 Fig -1: Block diagram of signature verification system During signature acquisition phase signatures are acquired by using Wacom tablet the 125 signatures are taken from 25 signers at least 5 samples each user. The features are extracted from these signatures and stored in the database. Testing phase is carried out same as training phase but in testing phase we do feature extraction is only for specified sample of specified user. If, the tested signature features matches with the features of the training phase of the respective user then the tested signature will treated as genuine signature. During the training and verification phase, test signature to be compared against the claimed user’s reference set signature. In order to match two signatures, the following stages are applied: A basis feature matrix is calculated from the reference signatures of each signer.Forthis,wecalculatetheminimum, mean, maximum and sum values for each DCT Coefficient in the reference set. The distance between the featurematrixof reference and test signatures computes. The matrix of the featuredistance isalso normalizedtomaptoavaluebetween 0 and1. Genetic algorithm is used for verification process. 3. RESULTS The signature is acquired using tablet is as shown in Fig.2 Fig -2: User signature The user signature is varying with respect to horizontal direction i.e. X-coordinate and the DCT of X is shown in Fig. 3. Fig -3: Plotting of theta and its DCT of signature The user signature is varying with respect to vertical direction i.e. Y-coordinate and the DCT of Y is shown in Fig. 4. Fig -4: Plotting of theta and its DCT of signature The value of theta represents the movement of pen with respect to X-axis and its corresponding DCT is plotted as shown in Fig.5. Fig -5: Plotting of theta and its DCT of signature
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1439 Genetic algorithm is used for classification of signatures, which makes the verification performancemoreaccurate. To evaluate the experiments, False Acceptance Rate (FAR) and False Rejection Rate (FRR) are determined. FAR represents the probability that a false match occurs, while FRR represents the probability that a false rejection occurs. Genuine and forged signatures of each user are fed to database for comparison which provides two possible results and are as follows. When genuine signatureiscomparedwithgenuinesignature of users and the result obtained is “Genuine signature” as shown in Fig. 6. Fig -6: output of genuine signature Genuine signature is compared with forged signature of users and the result obtained is “forged signature” asshown in Fig.7. Fig -7: output of genuine signature 3. CONCULSION Although signature verification is not one of the safest biometric solutions, the use of it in business practices is still justified. Moreover, signature verification has a very promising future. One major drawback is that humans are not consistent when signing their signatures. In this paper, a robust signature verification system has been proposed, based on DCT coefficients and the Genetic Algorithm. Our proposed method can extract basic dynamic features from signature time signals, and compress signature data, while keeping the rough form and basic information of signatures. Especially in the context of skilled forgery, where inter- personal variability in the number of features becomes negligible, an effective analysis of features based on time signals is essential for attainment of a suitable performance. Ideally we need features that are stable, i.e. do not change very much between different genuine signatures, and which are hard to forge. For attaining this purpose, capturing signals via a tablet digitizer and using the extracted dynamics information has been considered, mainly in the form of simple parameters of DCT coefficients. These features are efficient and experimental results confirm that the proposed method is promising. The summation condition in the verification process guides the system towards an accurate decision. REFERENCES [1] Nanni, L. and Lumini, A., “A novel local on-line signature verification system,” Pattern Recognition Letters, 2008.,pp. 559–568. [2] Fabregas, J. and Faundez-Zanuy,., “On-line signature verification system with failure to enroll management,” Pattern Recognition Letters, 2009., pp. 2117–2126. [3] Dimauro, G., Modugno, R., Pirlo, G. and Sarcinella, L., “Analysis of stability in hand-written dynamic signatures,” Proceedings of the 8th International Workshop onFrontiers in Handwriting Recognition, IWFHR,2002, pp. 259–263 [4] H. Lei, V. Govindaraju “A comparative study on the consistency of features in on-line signature verification” Pattern Recognition Letters, 26 (15) (2005),pp.2483– 2489