SlideShare a Scribd company logo
Signature Verification
Using CNN
Submitted By:
Rachana Kulkarni (3747)
Sayali Kawale(3753)
Rifa Shazmeen(3755)
Introduction
 Computers are largely used in almost each and every field including financial
transactions, thus providing additional security measures for computer system is
necessary.
 The security measures to be used must be cheap, reliable and un-intrusive to the
authorized person. The technique which meets these requirements is handwritten
signature verification.
Why Handwritten Signature only ?
 Everyday transaction
 Individuals less likely to object
 Individual’s signature is unique
 Less controversial
Importance of Signature
 Transaction
 Individuals less likely to object
 Biometric
Types of Signature Identification
 Offline Signature Verification
 Deals with shape only
 Online Signature Verification
 Deals with dynamic features like speed, pen pressure, directions, stroke length, and
when the pen is lifted from the paper
Challenging tasks
 The main challenge with online Signature Identification technology is
differentiating between the consistent parts of the signature and the behavioural
parts of the signature that vary with each signing.
 A person’s signature is never entirely the same. Allowing for these variations while
providing protection against forgers is a challenging task.
 Differentiating between the parts of the signature that vary with each signing.
 The signature can vary substantially over an individual’s lifetime.
Proposed Work
 Signature Acquisition
 Signature Pre-processing
 Feature Extraction
 Signature Verification
Signature Acquisition
 Signature is acquired from the user
Signature Pre-processing
 Function of the pre-processor
• Image resizing
• Image binarizing
• Image thinning
• Image normalizing
Feature Extraction
Signature Identification
Applications
 Banking
 Passport office
 And any other places which require identification !
Advantages
 Low error rate
 Forgery is detected even when the forger has managed to get a copy of the
authentic signature
 Fast and simple training
 Cheap hardware
 Little storage requirements
Activity Diagram
Requirements & Technologies
 The hardware component we are using here is a scanning device(WEBCAM), high
RAM for better results and good processor.
 Operating System : Windows XP or Higher
 NetBeans IDE 7.0
 SDK – J2SE
 Intel core 2 duo processor
 2.1 GHZ, 1 GB RAM
Signature Verification.pptx

More Related Content

What's hot

Design of animation sequence
Design of animation sequenceDesign of animation sequence
Design of animation sequence
Azhar Nayeem
 
Lecture 3 threads
Lecture 3   threadsLecture 3   threads
Lecture 3 threads
Kumbirai Junior Muzavazi
 
Multiprocessor structures
Multiprocessor structuresMultiprocessor structures
Multiprocessor structures
Shareb Ismaeel
 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognitionPiyush Mittal
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
IJNSA Journal
 
Frame buffer
Frame bufferFrame buffer
Frame buffer
Aparna Joshi
 
Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer Version
Naiyan Noor
 
Mob Programming - or why it is a good idea to have only one Computer per Team...
Mob Programming - or why it is a good idea to have only one Computer per Team...Mob Programming - or why it is a good idea to have only one Computer per Team...
Mob Programming - or why it is a good idea to have only one Computer per Team...
Lars Haßler
 
Polygraphic Substitution Cipher -Part 1
Polygraphic Substitution Cipher  -Part 1Polygraphic Substitution Cipher  -Part 1
Polygraphic Substitution Cipher -Part 1
SHUBHA CHATURVEDI
 
mean_filter
mean_filtermean_filter
mean_filter
Satyajit Nag Mithu
 
Chapter 8 image compression
Chapter 8 image compressionChapter 8 image compression
Chapter 8 image compression
asodariyabhavesh
 
Edge linking in image processing
Edge linking in image processingEdge linking in image processing
Edge linking in image processing
VARUN KUMAR
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
babak danyal
 
CS 354 Transformation, Clipping, and Culling
CS 354 Transformation, Clipping, and CullingCS 354 Transformation, Clipping, and Culling
CS 354 Transformation, Clipping, and Culling
Mark Kilgard
 
Image Stitching for Panorama View
Image Stitching for Panorama ViewImage Stitching for Panorama View
Image Stitching for Panorama View
Nimai Chand Das Adhikari
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
Ruchi Maurya
 
Image stitching
Image stitchingImage stitching
Image stitching
Manohar Mukku
 
Computer Vision: Correlation, Convolution, and Gradient
Computer Vision: Correlation, Convolution, and GradientComputer Vision: Correlation, Convolution, and Gradient
Computer Vision: Correlation, Convolution, and Gradient
Ahmed Gad
 

What's hot (20)

Design of animation sequence
Design of animation sequenceDesign of animation sequence
Design of animation sequence
 
Lecture 3 threads
Lecture 3   threadsLecture 3   threads
Lecture 3 threads
 
Multiprocessor structures
Multiprocessor structuresMultiprocessor structures
Multiprocessor structures
 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognition
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
 
Frame buffer
Frame bufferFrame buffer
Frame buffer
 
Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer Version
 
Mob Programming - or why it is a good idea to have only one Computer per Team...
Mob Programming - or why it is a good idea to have only one Computer per Team...Mob Programming - or why it is a good idea to have only one Computer per Team...
Mob Programming - or why it is a good idea to have only one Computer per Team...
 
Polygraphic Substitution Cipher -Part 1
Polygraphic Substitution Cipher  -Part 1Polygraphic Substitution Cipher  -Part 1
Polygraphic Substitution Cipher -Part 1
 
mean_filter
mean_filtermean_filter
mean_filter
 
Chapter 8 image compression
Chapter 8 image compressionChapter 8 image compression
Chapter 8 image compression
 
Edge linking in image processing
Edge linking in image processingEdge linking in image processing
Edge linking in image processing
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
CS 354 Transformation, Clipping, and Culling
CS 354 Transformation, Clipping, and CullingCS 354 Transformation, Clipping, and Culling
CS 354 Transformation, Clipping, and Culling
 
Image Stitching for Panorama View
Image Stitching for Panorama ViewImage Stitching for Panorama View
Image Stitching for Panorama View
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
 
Image stitching
Image stitchingImage stitching
Image stitching
 
Computer Vision: Correlation, Convolution, and Gradient
Computer Vision: Correlation, Convolution, and GradientComputer Vision: Correlation, Convolution, and Gradient
Computer Vision: Correlation, Convolution, and Gradient
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 

Similar to Signature Verification.pptx

Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
ZTech Proje
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
ZTech Proje
 
Significant Biometric Server
Significant Biometric ServerSignificant Biometric Server
Significant Biometric ServerNamirial GmbH
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
IRJET Journal
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
Paras Garg
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
Inttelix
 
FPTS
FPTSFPTS
finalsignverification.pptx
finalsignverification.pptxfinalsignverification.pptx
finalsignverification.pptx
40NehaPagariya
 
xyzmo 4 Pharmaceutical Solutions
xyzmo 4 Pharmaceutical Solutionsxyzmo 4 Pharmaceutical Solutions
xyzmo 4 Pharmaceutical SolutionsNamirial GmbH
 
xyzmo 4 Pharmaceutical White Paper
xyzmo 4 Pharmaceutical White Paperxyzmo 4 Pharmaceutical White Paper
xyzmo 4 Pharmaceutical White PaperNamirial GmbH
 
Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...
ZTech Proje
 
xyzmo Significant Company
xyzmo Significant Companyxyzmo Significant Company
xyzmo Significant CompanyNamirial GmbH
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Micro Focus
 
Digital signature
Digital signatureDigital signature
Digital signature
Evion Technologies
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Evion Technologies
 
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
CSCJournals
 
38
3838
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
frontone
 

Similar to Signature Verification.pptx (20)

Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Significant Biometric Server
Significant Biometric ServerSignificant Biometric Server
Significant Biometric Server
 
Artificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification SystemArtificial Intelligence Based Bank Cheque Signature Verification System
Artificial Intelligence Based Bank Cheque Signature Verification System
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
 
FPTS
FPTSFPTS
FPTS
 
Eezi sign WEB
Eezi sign WEBEezi sign WEB
Eezi sign WEB
 
finalsignverification.pptx
finalsignverification.pptxfinalsignverification.pptx
finalsignverification.pptx
 
xyzmo 4 Pharmaceutical Solutions
xyzmo 4 Pharmaceutical Solutionsxyzmo 4 Pharmaceutical Solutions
xyzmo 4 Pharmaceutical Solutions
 
xyzmo 4 Pharmaceutical White Paper
xyzmo 4 Pharmaceutical White Paperxyzmo 4 Pharmaceutical White Paper
xyzmo 4 Pharmaceutical White Paper
 
Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...
 
xyzmo Significant Company
xyzmo Significant Companyxyzmo Significant Company
xyzmo Significant Company
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Bg24375379
Bg24375379Bg24375379
Bg24375379
 
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
Freeman Chain Code (FCC) Representation in Signature Fraud Detection Based On...
 
38
3838
38
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 

Recently uploaded

DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx
benykoy2024
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 

Recently uploaded (20)

DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 

Signature Verification.pptx

  • 1. Signature Verification Using CNN Submitted By: Rachana Kulkarni (3747) Sayali Kawale(3753) Rifa Shazmeen(3755)
  • 2. Introduction  Computers are largely used in almost each and every field including financial transactions, thus providing additional security measures for computer system is necessary.  The security measures to be used must be cheap, reliable and un-intrusive to the authorized person. The technique which meets these requirements is handwritten signature verification.
  • 3. Why Handwritten Signature only ?  Everyday transaction  Individuals less likely to object  Individual’s signature is unique  Less controversial
  • 4. Importance of Signature  Transaction  Individuals less likely to object  Biometric
  • 5. Types of Signature Identification  Offline Signature Verification  Deals with shape only  Online Signature Verification  Deals with dynamic features like speed, pen pressure, directions, stroke length, and when the pen is lifted from the paper
  • 6. Challenging tasks  The main challenge with online Signature Identification technology is differentiating between the consistent parts of the signature and the behavioural parts of the signature that vary with each signing.  A person’s signature is never entirely the same. Allowing for these variations while providing protection against forgers is a challenging task.  Differentiating between the parts of the signature that vary with each signing.  The signature can vary substantially over an individual’s lifetime.
  • 7. Proposed Work  Signature Acquisition  Signature Pre-processing  Feature Extraction  Signature Verification
  • 8. Signature Acquisition  Signature is acquired from the user
  • 9. Signature Pre-processing  Function of the pre-processor • Image resizing • Image binarizing • Image thinning • Image normalizing
  • 12. Applications  Banking  Passport office  And any other places which require identification !
  • 13. Advantages  Low error rate  Forgery is detected even when the forger has managed to get a copy of the authentic signature  Fast and simple training  Cheap hardware  Little storage requirements
  • 15. Requirements & Technologies  The hardware component we are using here is a scanning device(WEBCAM), high RAM for better results and good processor.  Operating System : Windows XP or Higher  NetBeans IDE 7.0  SDK – J2SE  Intel core 2 duo processor  2.1 GHZ, 1 GB RAM