SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 5 (June 2014) http://ijirae.com
___________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 109
RELATIVE STUDY ON SIGNATURE VERIFICATION
AND RECOGNITION SYSTEM
Harpreet Anand 1
Prof. D.L Bhombe2
1
PG Scholar, Department of Electronics and Telecommunication Engineering, SSGM College of Engg, shegaon
2
Professor, Department of Electronics and Telecommunication Engineering, SSGM College of Engg, Shegaon
Abstract -- Signature verification is amongst the first few biometrics to be used for verification and one of the natural
ways of authenticating a person’s identity. The user introduces into the computer the scanned images of the signature,
then after image enhancement and reduction of noise of the image. Followed by feature extraction and neural network
training images of signature are verified. Yet now thousands of financial and business transactions are being
authorized via signatures. Therefore an automatic signature verification system is needed. This paper represents a brief
review on various approaches based on different datasets, features and training techniques used for verification.
Keywords: feature extraction, neural network, Signature verification and recognition
I. INTRODUCTION
Biometrics can be broadly classified into two categories:
1. Behavioral
2. Physiological.
Handwriting, speech etc. come under behavioral biometrics. Iris pattern, fingerprint etc. are part of physiological
biometrics.
Handwritten signature, verification represents a process of authenticating the identity of an user using the
handwritten signature of the user as a form of behavioral biometrics. The most important benefit of signature verification
is that it is already the most widely accepted biometric for identity verification in our society for years .The long narration
of trust of signature verification means that people are very willing to accept a signature based biometric authentication
system.
The verification of signer from scanned signs of documents that has received still much more importance in day to
day life. Because still various transactions are done with the faith of signs as signature is most natural way to confirm an
identity.
Signature verification can be alienated into two main areas depending on the process of data acquisition method used:
1. Offline signature verification
2. Online signature verification
Forgeries can be classifies into three types: 1. Random
2. Simple
3. Skilled
Random forgeries are not based on any Knowledge of the original signature
Simple forgeries are produced knowing the name of the signer but without having an example of signer’s signature. Skilled
forgeries are produced by people looking at an original instance of the signature, attempting to imitate as closely as
possible.
The systems are mainly divided into two major parts: (i) Training signatures, (ii) Verification or recognition of
given signature
II. DATA ACQUISITION
There are different datasets which are available consisting of different signers including some forgeries. Some available
datasets are given below:
Real DB1: MCYT-75 Signature DB. This dataset includes 75 signers collected at four different Spanish universities. The
corpus includes 15 genuine signatures acquired in two sessions. All the signatures were acquired with the same inking pen
and the same paper templates, over the WACOM Intuos A6 pen tablet. The paper templates were scanned at 600 dpi with
256 grey levels. The database is distributed by the Biometric Recognition Group-ATVS from UAM1.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 5 (June 2014) http://ijirae.com
___________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 110
Real DB2: GPDS-960 Signature DB. This dataset contains 24 genuine signatures from 881 individuals acquired in one site
in just one session. For the current work, only the first 350 users of the database were considered in the experiments. The
repetitions of each genuine signature were collected allowing each donor to use his own pen on sheets of white A4 paper
.Each sheet provided two different box sizes for the signature. The sheets were scanned at 600 dpi with 256 grey levels.
The database is distributed by the Grupo Procesado Digital de Se˜nales (GPDS) of the ULPGC2.
Synthetic DB1: SSig-DB 1-Ink. This dataset was produced following the proposed synthetic off-line signature generation
method, and comprises 30 samples of 350 synthetic signers. All samples were generated with the _spot = 0:35mm:
ballpoint and the viscous ink. The database may be obtained from the Biometric Recognition Group-ATVS website.
Synthetic DB2: SSig-DB Multiple Inks. As the SSig- DB 1-Ink this dataset comprises 30 samples of 350 synthetic signers.
However, in this case, samples were generated using the 6 standard ballpoint sizes and three different types of inks. For
each signature, both the ballpoint and the ink were randomly selected. The database may also be obtained from the
Biometric Recognition Group-ATVS website.
II. Image Pre-Processing
Image pre-processing represents a wide range of techniques that exist for the manipulation and modification of images. It is
the first step in signature verification and recognition. A successful implementation of this step produces improved results
and higher accuracy rates.
III. Feature Extraction
Feature Extraction Feature extraction Operating upon two-dimensional image arrays, feature extraction seeks to
identify features, or characteristics, of objects contained within an image. These characteristics can be used to describe the
object, or attributes of the object, such as shape or color. A descriptive list of the object is produced, known as a feature
vector, which is then used in the subsequent task of pattern classification.
Features extracted for signature verification can be broadly divided into three main types:
 Global features
 Local features
 Geometric features
 Mask features
 Grid features
Global features describe or identify the signature as a whole. They are extracted from every pixel that lies within a
rectangle circumscribing the signature. These features do not reflect any local, geometrical, or topological properties of the
signature, but include transformations, series expansions, image gradient analysis etc. Although global features are easily
extractable and insensitive to noise, they are dependent upon the position alignment and highly sensitive to distortion and
style variations.
Some common global features discussed below:
Aspect Ratio: The ratio of signature pure height to signature pure width.
Signature height: It is the height of the signature image, after width normalization.
Image area: It is the number of black pixels in the image. In skeleton zed signature images, image area represents a
measure of the density of the signature traces
Pure width: The width of the image with horizontal blank spaces removed.
Pure height: The height of the signature image after vertical blank spaces removed.
2) Statistical features that are derived from the distribution of pixels of a signature, e.g. statistics of high gray-level pixels
to identify pseudo-dynamic characteristics of signatures. This technique includes the extraction of high pressure factors
with respect to vertically segmented zones (for example, upper, middle and lower zones) and the ratio of signature width to
short- or long-stroke height. The statistical features take some topological and dynamic information into account and
consequently can tolerate minor distortions and style variations.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 5 (June 2014) http://ijirae.com
___________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 111
3) Geometrical and topological features that describe the characteristic geometry and topology of a signature and thereby
preserve the signatures global and local properties, e.g. local correspondence of stroke segments to trace signature.
Geometrical and topological features have a high tolerance to distortion and style variations, and they can also tolerate a
certain degree of translation and rotation variations Mask features provide information about directions of the lines of the
signatures.
Grid features provide overall signature appearance information. The choice of a powerful set of features is crucial in
signature verification. Systems. For grid information features, the image is segmented into appropriate number of
rectangular region. Grid segmentation procedures have been used extensively in the off-line signature verification
approach. The skeletonized image is divided into 120 rectangular segments (15x8), and for each segment, the area (the sum
of foreground pixels) is calculated.
The features used must be suitable for the application and for the applied classifier. In various systems, above
mentioned features are used.
IV. PATTERN CLASSIFICATION.
The ‘final’ task of image processing is that of pattern classification. This problem consists of taking an object within an
image before attempting to classify it by deciding which specific group of objects it belongs to. As there are a number of
possible choices of groups, the problem of which to select arises. Awcock and Thomas (1995) state that “there are three
main approaches to group classification;
(a) Statistical based classification relies on defining a set of decision rules based on standard statistical theory. (b)
Syntactic pattern classification utilises the underlying structure of the patterns themselves. (c) Alternative approaches use
architectures such as neural nets which can be trained to correctly associate input patterns. Some other pattern classification
approaches are Template Matching Approach, Hidden Markov models approach, Wavelet- based approach
Activation Functions: Sigmoidal activation functions were used in each of the NN nodes as they are generally more
appropriate for HSV applications.
Training performance for network are shown in fig.1:
Fig.1
Classification accuracy of these three implemented network training algorithm
Fig.2
V. PERFORMANCE EVALUATION PARAMETERS (ERROR RATE)
False Acceptance Rate
False Rejection Rate
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 5 (June 2014) http://ijirae.com
___________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 112
While dealing with any signature verification system, we consider False Rejection Rate and False Acceptance
Rate as its performance evaluation parameters. The Efficiency of signature verification systems can be represented by these
two types of error rates i.e. the percentage of genuine signatures rejected as forgery which is called False Rejection Rate
(FRR) and the percentage of forgery signatures accepted as genuine which is called False Acceptance Rate (FAR).
Generally signature verification system shall have an acceptable trade-off between a low FAR and a low FRR.
V. COMPARISON:
Each type of forgery requires a different verification approach. Hence it becomes mandatory to compare these approaches
with respect to various levels of forgeries.
V. REFERENCES:
1. Meenakshi S Arya and Vandana S Inamdar “A Preliminary Study on Various Off-line Hand Written Signature Verification
Approaches” ©2010 International Journal of Computer Applications (0975 – 8887)Volume 1 – No. 9
2. Alan McCabe, Jarrod Trevathan and Wayne Read “Neural Network-based Handwritten Signature Verification” JOURNAL OF
COMPUTERS, VOL. 3, NO. 8, AUGUST 2008
3. Sachin A. Murab, Vaishali. M.Deshmukh “An Empirical Study of Signature Recognition &Verification System Using Various
Approaches” International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-2, Issue-2,
December 2012
4. K. Han, and I.K. Sethi, “Handwritten Signature Retrieval and Identification”, Pattern Recognition 17, 1996, pp. 83-90.
5. Priya Metri, Ashwinder Kaur “Handwritten Signature Verification using Instance Based Learning” International Journal of
Computer Trends and Technology- March to April Issue 2011
6. Meenu Bhatia ”Off-Line Hand Written Signature Verification using Neural Network” International Journal of Application
or Innovation in Engineering & Management (IJAIEM) Volume 2, Issue 5, May 2013
7. Pradeep Kumar, Shekhar Singh Ashwani Garg Nishant Prabhat “Hand Written Signature Recognition & Verification using
Neural Network” International Journal of Advanced Research in Computer Science and Software Engineering Volume 3,
Issue 3, March 2013
8. Kritika Raghuwanshi Niketa Dubey, Riju Nema Rishabh Sharma “Signature Verification through MATLAB Using Image
Processing” International Journal of Emerging Trends in Electronics and Computers (IJETECS) Volume 2, Issue 4,April 2013
9. Dr. Umesh. Bhadade Mrs. Rupal Patil, Nilesh Y. Choudhary Prof. Bhupendra M Chaudhari “Signature Recognition &
Verification System Using Back Propagation Neural Network” International Journal of IT, Engineering and Applied Sciences
Research (IJIEASR) ISSN: 2319-4413Volume 2, No. 1, January 2013
10. Ankit Chadha, Neha Satam, and Vibha Wali “Biometric Signature Processing & Recognition Using Radial Basis Function
Network” CiiT International Journal of Digital Image Processing, ISSN 0974 – 9675 (Print) & ISSN 0974 – 956X (Online)
September 2013
11. Debasish Jena, Banshidhar Majhi and Sanjay Kumar Jena “Improved Offline Signature Verification Scheme Using Feature
Point Extraction Method” Journal of Computer Science 4 (2): 111-116, 2008
12. D.Bertolinia, L.S.Oliveirab, E.Justinoa, R.Sabourinc “Reducing forgeries in writer-independent off-line signature verification
through ensemble of classifiers” Volume 43, Issue 1, January 2010,
13. Arti Agrahari, Abhishek Verma, Arti dubey. Garima Singh“Signature Verification System Using MATLAB” 2nd International
Conference on Role of Technology in Nation Building (ICRTNB-2013)
14. M. Blumenstein and B. Verma”Neural-based Solutions for the Segmentation and Recognition of Difficult Handwritten Words
from a Benchmark Database”
15. Madhavi D. Malekar, Prof. Sachin Patel “Offline Signature Verification Using
Artificial Neural Network” International Journal of Emerging Technology and Advanced Engineering Website:
www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 9, September 2013)

Más contenido relacionado

La actualidad más candente

A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...ijcsa
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint RecognitionEECJOURNAL
 
Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Dr. Vinayak Bharadi
 
Correlation based Fingerprint Recognition
Correlation based Fingerprint RecognitionCorrelation based Fingerprint Recognition
Correlation based Fingerprint Recognitionmahesamrin
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification systemeSAT Journals
 
Various Mathematical and Geometrical Models for Fingerprints: A Survey
Various Mathematical and Geometrical Models for Fingerprints: A SurveyVarious Mathematical and Geometrical Models for Fingerprints: A Survey
Various Mathematical and Geometrical Models for Fingerprints: A Surveyidescitation
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsSalam Shah
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION ijcsity
 
Crack Detection in Ceramic Tiles using Zoning and Edge Detection Methods
Crack Detection in Ceramic Tiles using Zoning and Edge Detection MethodsCrack Detection in Ceramic Tiles using Zoning and Edge Detection Methods
Crack Detection in Ceramic Tiles using Zoning and Edge Detection Methodsijtsrd
 
An interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’sAn interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’seSAT Publishing House
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal ConferenceHemanth Kumar
 
Improving of Fingerprint Segmentation Images Based on K-MEANS and DBSCAN Clus...
Improving of Fingerprint Segmentation Images Based on K-MEANS and DBSCAN Clus...Improving of Fingerprint Segmentation Images Based on K-MEANS and DBSCAN Clus...
Improving of Fingerprint Segmentation Images Based on K-MEANS and DBSCAN Clus...IJECEIAES
 
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET Journal
 
Fingerprint Feature Extraction, Identification and Authentication: A Review
Fingerprint Feature Extraction, Identification and Authentication: A ReviewFingerprint Feature Extraction, Identification and Authentication: A Review
Fingerprint Feature Extraction, Identification and Authentication: A Reviewpaperpublications3
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 

La actualidad más candente (18)

A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
 
Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris
 
Correlation based Fingerprint Recognition
Correlation based Fingerprint RecognitionCorrelation based Fingerprint Recognition
Correlation based Fingerprint Recognition
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
 
Various Mathematical and Geometrical Models for Fingerprints: A Survey
Various Mathematical and Geometrical Models for Fingerprints: A SurveyVarious Mathematical and Geometrical Models for Fingerprints: A Survey
Various Mathematical and Geometrical Models for Fingerprints: A Survey
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
An optimal face recoginition tool
An optimal face recoginition toolAn optimal face recoginition tool
An optimal face recoginition tool
 
H03201039049
H03201039049H03201039049
H03201039049
 
Crack Detection in Ceramic Tiles using Zoning and Edge Detection Methods
Crack Detection in Ceramic Tiles using Zoning and Edge Detection MethodsCrack Detection in Ceramic Tiles using Zoning and Edge Detection Methods
Crack Detection in Ceramic Tiles using Zoning and Edge Detection Methods
 
An interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’sAn interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’s
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 
Improving of Fingerprint Segmentation Images Based on K-MEANS and DBSCAN Clus...
Improving of Fingerprint Segmentation Images Based on K-MEANS and DBSCAN Clus...Improving of Fingerprint Segmentation Images Based on K-MEANS and DBSCAN Clus...
Improving of Fingerprint Segmentation Images Based on K-MEANS and DBSCAN Clus...
 
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris Recognition
 
Fingerprint Feature Extraction, Identification and Authentication: A Review
Fingerprint Feature Extraction, Identification and Authentication: A ReviewFingerprint Feature Extraction, Identification and Authentication: A Review
Fingerprint Feature Extraction, Identification and Authentication: A Review
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 

Destacado

SEDIMENT QUALITY ASSESSMENT OF AVARAGERE LAKE, DAVANAGERE CITY - A CASE STUDY
SEDIMENT QUALITY ASSESSMENT OF AVARAGERE LAKE, DAVANAGERE CITY - A CASE STUDYSEDIMENT QUALITY ASSESSMENT OF AVARAGERE LAKE, DAVANAGERE CITY - A CASE STUDY
SEDIMENT QUALITY ASSESSMENT OF AVARAGERE LAKE, DAVANAGERE CITY - A CASE STUDYAM Publications
 
CASEMMW Scalable Video Solutions by Mitch Powers
CASEMMW Scalable Video Solutions by Mitch PowersCASEMMW Scalable Video Solutions by Mitch Powers
CASEMMW Scalable Video Solutions by Mitch Powersmitchellpowers
 
Mreža zemalja sa niskom prevalencijom hiv a u centralnoj i jugoistočnoj evrop...
Mreža zemalja sa niskom prevalencijom hiv a u centralnoj i jugoistočnoj evrop...Mreža zemalja sa niskom prevalencijom hiv a u centralnoj i jugoistočnoj evrop...
Mreža zemalja sa niskom prevalencijom hiv a u centralnoj i jugoistočnoj evrop...PinHealth
 
Top 5 web administrator cover letter samples
Top 5 web administrator cover letter samplesTop 5 web administrator cover letter samples
Top 5 web administrator cover letter samplesrestzonst
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
 
Cosmic Adventure - Episode 001
Cosmic Adventure - Episode 001Cosmic Adventure - Episode 001
Cosmic Adventure - Episode 001Stephen Kwong
 
Fases de un proyecto de desarrollo de Softwareo Orientado a la Web-Charles Fr...
Fases de un proyecto de desarrollo de Softwareo Orientado a la Web-Charles Fr...Fases de un proyecto de desarrollo de Softwareo Orientado a la Web-Charles Fr...
Fases de un proyecto de desarrollo de Softwareo Orientado a la Web-Charles Fr...Charles Aldahir Franco Verdezoto
 
TVET DWA 2012-3-7_KKedits FINAL to DWA
TVET DWA 2012-3-7_KKedits FINAL to DWATVET DWA 2012-3-7_KKedits FINAL to DWA
TVET DWA 2012-3-7_KKedits FINAL to DWAToyin Oshaniwa
 

Destacado (13)

SEDIMENT QUALITY ASSESSMENT OF AVARAGERE LAKE, DAVANAGERE CITY - A CASE STUDY
SEDIMENT QUALITY ASSESSMENT OF AVARAGERE LAKE, DAVANAGERE CITY - A CASE STUDYSEDIMENT QUALITY ASSESSMENT OF AVARAGERE LAKE, DAVANAGERE CITY - A CASE STUDY
SEDIMENT QUALITY ASSESSMENT OF AVARAGERE LAKE, DAVANAGERE CITY - A CASE STUDY
 
Instructable
InstructableInstructable
Instructable
 
CASEMMW Scalable Video Solutions by Mitch Powers
CASEMMW Scalable Video Solutions by Mitch PowersCASEMMW Scalable Video Solutions by Mitch Powers
CASEMMW Scalable Video Solutions by Mitch Powers
 
Mreža zemalja sa niskom prevalencijom hiv a u centralnoj i jugoistočnoj evrop...
Mreža zemalja sa niskom prevalencijom hiv a u centralnoj i jugoistočnoj evrop...Mreža zemalja sa niskom prevalencijom hiv a u centralnoj i jugoistočnoj evrop...
Mreža zemalja sa niskom prevalencijom hiv a u centralnoj i jugoistočnoj evrop...
 
Как влюбить в себя покупателей?
Как влюбить в себя покупателей? Как влюбить в себя покупателей?
Как влюбить в себя покупателей?
 
Top 5 web administrator cover letter samples
Top 5 web administrator cover letter samplesTop 5 web administrator cover letter samples
Top 5 web administrator cover letter samples
 
Webapp on AWS
Webapp on AWSWebapp on AWS
Webapp on AWS
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
Cosmic Adventure - Episode 001
Cosmic Adventure - Episode 001Cosmic Adventure - Episode 001
Cosmic Adventure - Episode 001
 
Fases de un proyecto de desarrollo de Softwareo Orientado a la Web-Charles Fr...
Fases de un proyecto de desarrollo de Softwareo Orientado a la Web-Charles Fr...Fases de un proyecto de desarrollo de Softwareo Orientado a la Web-Charles Fr...
Fases de un proyecto de desarrollo de Softwareo Orientado a la Web-Charles Fr...
 
TVET DWA 2012-3-7_KKedits FINAL to DWA
TVET DWA 2012-3-7_KKedits FINAL to DWATVET DWA 2012-3-7_KKedits FINAL to DWA
TVET DWA 2012-3-7_KKedits FINAL to DWA
 
Web2.0
Web2.0Web2.0
Web2.0
 
Web2.0
Web2.0Web2.0
Web2.0
 

Similar a RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM

A Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personA Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personEditor IJMTER
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET Journal
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature RecognizationFaimin Khan
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesIOSR Journals
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkeSAT Journals
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkEditor IJMTER
 
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABAM Publications
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodeSAT Publishing House
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Networkijiert bestjournal
 
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Editor IJARCET
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Editor IJARCET
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signatureMazin Alwaaly
 

Similar a RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM (20)

A Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personA Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a person
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
 
B017150823
B017150823B017150823
B017150823
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
 
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
 
Ijetcas14 337
Ijetcas14 337Ijetcas14 337
Ijetcas14 337
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Network
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signature
 

Más de AM Publications

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNAM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESAM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONAM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNAM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTAM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTAM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY AM Publications
 

Más de AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 

Último

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 

Último (20)

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 

RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 5 (June 2014) http://ijirae.com ___________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 109 RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM Harpreet Anand 1 Prof. D.L Bhombe2 1 PG Scholar, Department of Electronics and Telecommunication Engineering, SSGM College of Engg, shegaon 2 Professor, Department of Electronics and Telecommunication Engineering, SSGM College of Engg, Shegaon Abstract -- Signature verification is amongst the first few biometrics to be used for verification and one of the natural ways of authenticating a person’s identity. The user introduces into the computer the scanned images of the signature, then after image enhancement and reduction of noise of the image. Followed by feature extraction and neural network training images of signature are verified. Yet now thousands of financial and business transactions are being authorized via signatures. Therefore an automatic signature verification system is needed. This paper represents a brief review on various approaches based on different datasets, features and training techniques used for verification. Keywords: feature extraction, neural network, Signature verification and recognition I. INTRODUCTION Biometrics can be broadly classified into two categories: 1. Behavioral 2. Physiological. Handwriting, speech etc. come under behavioral biometrics. Iris pattern, fingerprint etc. are part of physiological biometrics. Handwritten signature, verification represents a process of authenticating the identity of an user using the handwritten signature of the user as a form of behavioral biometrics. The most important benefit of signature verification is that it is already the most widely accepted biometric for identity verification in our society for years .The long narration of trust of signature verification means that people are very willing to accept a signature based biometric authentication system. The verification of signer from scanned signs of documents that has received still much more importance in day to day life. Because still various transactions are done with the faith of signs as signature is most natural way to confirm an identity. Signature verification can be alienated into two main areas depending on the process of data acquisition method used: 1. Offline signature verification 2. Online signature verification Forgeries can be classifies into three types: 1. Random 2. Simple 3. Skilled Random forgeries are not based on any Knowledge of the original signature Simple forgeries are produced knowing the name of the signer but without having an example of signer’s signature. Skilled forgeries are produced by people looking at an original instance of the signature, attempting to imitate as closely as possible. The systems are mainly divided into two major parts: (i) Training signatures, (ii) Verification or recognition of given signature II. DATA ACQUISITION There are different datasets which are available consisting of different signers including some forgeries. Some available datasets are given below: Real DB1: MCYT-75 Signature DB. This dataset includes 75 signers collected at four different Spanish universities. The corpus includes 15 genuine signatures acquired in two sessions. All the signatures were acquired with the same inking pen and the same paper templates, over the WACOM Intuos A6 pen tablet. The paper templates were scanned at 600 dpi with 256 grey levels. The database is distributed by the Biometric Recognition Group-ATVS from UAM1.
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 5 (June 2014) http://ijirae.com ___________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 110 Real DB2: GPDS-960 Signature DB. This dataset contains 24 genuine signatures from 881 individuals acquired in one site in just one session. For the current work, only the first 350 users of the database were considered in the experiments. The repetitions of each genuine signature were collected allowing each donor to use his own pen on sheets of white A4 paper .Each sheet provided two different box sizes for the signature. The sheets were scanned at 600 dpi with 256 grey levels. The database is distributed by the Grupo Procesado Digital de Se˜nales (GPDS) of the ULPGC2. Synthetic DB1: SSig-DB 1-Ink. This dataset was produced following the proposed synthetic off-line signature generation method, and comprises 30 samples of 350 synthetic signers. All samples were generated with the _spot = 0:35mm: ballpoint and the viscous ink. The database may be obtained from the Biometric Recognition Group-ATVS website. Synthetic DB2: SSig-DB Multiple Inks. As the SSig- DB 1-Ink this dataset comprises 30 samples of 350 synthetic signers. However, in this case, samples were generated using the 6 standard ballpoint sizes and three different types of inks. For each signature, both the ballpoint and the ink were randomly selected. The database may also be obtained from the Biometric Recognition Group-ATVS website. II. Image Pre-Processing Image pre-processing represents a wide range of techniques that exist for the manipulation and modification of images. It is the first step in signature verification and recognition. A successful implementation of this step produces improved results and higher accuracy rates. III. Feature Extraction Feature Extraction Feature extraction Operating upon two-dimensional image arrays, feature extraction seeks to identify features, or characteristics, of objects contained within an image. These characteristics can be used to describe the object, or attributes of the object, such as shape or color. A descriptive list of the object is produced, known as a feature vector, which is then used in the subsequent task of pattern classification. Features extracted for signature verification can be broadly divided into three main types:  Global features  Local features  Geometric features  Mask features  Grid features Global features describe or identify the signature as a whole. They are extracted from every pixel that lies within a rectangle circumscribing the signature. These features do not reflect any local, geometrical, or topological properties of the signature, but include transformations, series expansions, image gradient analysis etc. Although global features are easily extractable and insensitive to noise, they are dependent upon the position alignment and highly sensitive to distortion and style variations. Some common global features discussed below: Aspect Ratio: The ratio of signature pure height to signature pure width. Signature height: It is the height of the signature image, after width normalization. Image area: It is the number of black pixels in the image. In skeleton zed signature images, image area represents a measure of the density of the signature traces Pure width: The width of the image with horizontal blank spaces removed. Pure height: The height of the signature image after vertical blank spaces removed. 2) Statistical features that are derived from the distribution of pixels of a signature, e.g. statistics of high gray-level pixels to identify pseudo-dynamic characteristics of signatures. This technique includes the extraction of high pressure factors with respect to vertically segmented zones (for example, upper, middle and lower zones) and the ratio of signature width to short- or long-stroke height. The statistical features take some topological and dynamic information into account and consequently can tolerate minor distortions and style variations.
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 5 (June 2014) http://ijirae.com ___________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 111 3) Geometrical and topological features that describe the characteristic geometry and topology of a signature and thereby preserve the signatures global and local properties, e.g. local correspondence of stroke segments to trace signature. Geometrical and topological features have a high tolerance to distortion and style variations, and they can also tolerate a certain degree of translation and rotation variations Mask features provide information about directions of the lines of the signatures. Grid features provide overall signature appearance information. The choice of a powerful set of features is crucial in signature verification. Systems. For grid information features, the image is segmented into appropriate number of rectangular region. Grid segmentation procedures have been used extensively in the off-line signature verification approach. The skeletonized image is divided into 120 rectangular segments (15x8), and for each segment, the area (the sum of foreground pixels) is calculated. The features used must be suitable for the application and for the applied classifier. In various systems, above mentioned features are used. IV. PATTERN CLASSIFICATION. The ‘final’ task of image processing is that of pattern classification. This problem consists of taking an object within an image before attempting to classify it by deciding which specific group of objects it belongs to. As there are a number of possible choices of groups, the problem of which to select arises. Awcock and Thomas (1995) state that “there are three main approaches to group classification; (a) Statistical based classification relies on defining a set of decision rules based on standard statistical theory. (b) Syntactic pattern classification utilises the underlying structure of the patterns themselves. (c) Alternative approaches use architectures such as neural nets which can be trained to correctly associate input patterns. Some other pattern classification approaches are Template Matching Approach, Hidden Markov models approach, Wavelet- based approach Activation Functions: Sigmoidal activation functions were used in each of the NN nodes as they are generally more appropriate for HSV applications. Training performance for network are shown in fig.1: Fig.1 Classification accuracy of these three implemented network training algorithm Fig.2 V. PERFORMANCE EVALUATION PARAMETERS (ERROR RATE) False Acceptance Rate False Rejection Rate
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 5 (June 2014) http://ijirae.com ___________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 112 While dealing with any signature verification system, we consider False Rejection Rate and False Acceptance Rate as its performance evaluation parameters. The Efficiency of signature verification systems can be represented by these two types of error rates i.e. the percentage of genuine signatures rejected as forgery which is called False Rejection Rate (FRR) and the percentage of forgery signatures accepted as genuine which is called False Acceptance Rate (FAR). Generally signature verification system shall have an acceptable trade-off between a low FAR and a low FRR. V. COMPARISON: Each type of forgery requires a different verification approach. Hence it becomes mandatory to compare these approaches with respect to various levels of forgeries. V. REFERENCES: 1. Meenakshi S Arya and Vandana S Inamdar “A Preliminary Study on Various Off-line Hand Written Signature Verification Approaches” ©2010 International Journal of Computer Applications (0975 – 8887)Volume 1 – No. 9 2. Alan McCabe, Jarrod Trevathan and Wayne Read “Neural Network-based Handwritten Signature Verification” JOURNAL OF COMPUTERS, VOL. 3, NO. 8, AUGUST 2008 3. Sachin A. Murab, Vaishali. M.Deshmukh “An Empirical Study of Signature Recognition &Verification System Using Various Approaches” International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-2, Issue-2, December 2012 4. K. Han, and I.K. Sethi, “Handwritten Signature Retrieval and Identification”, Pattern Recognition 17, 1996, pp. 83-90. 5. Priya Metri, Ashwinder Kaur “Handwritten Signature Verification using Instance Based Learning” International Journal of Computer Trends and Technology- March to April Issue 2011 6. Meenu Bhatia ”Off-Line Hand Written Signature Verification using Neural Network” International Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume 2, Issue 5, May 2013 7. Pradeep Kumar, Shekhar Singh Ashwani Garg Nishant Prabhat “Hand Written Signature Recognition & Verification using Neural Network” International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 2013 8. Kritika Raghuwanshi Niketa Dubey, Riju Nema Rishabh Sharma “Signature Verification through MATLAB Using Image Processing” International Journal of Emerging Trends in Electronics and Computers (IJETECS) Volume 2, Issue 4,April 2013 9. Dr. Umesh. Bhadade Mrs. Rupal Patil, Nilesh Y. Choudhary Prof. Bhupendra M Chaudhari “Signature Recognition & Verification System Using Back Propagation Neural Network” International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 2319-4413Volume 2, No. 1, January 2013 10. Ankit Chadha, Neha Satam, and Vibha Wali “Biometric Signature Processing & Recognition Using Radial Basis Function Network” CiiT International Journal of Digital Image Processing, ISSN 0974 – 9675 (Print) & ISSN 0974 – 956X (Online) September 2013 11. Debasish Jena, Banshidhar Majhi and Sanjay Kumar Jena “Improved Offline Signature Verification Scheme Using Feature Point Extraction Method” Journal of Computer Science 4 (2): 111-116, 2008 12. D.Bertolinia, L.S.Oliveirab, E.Justinoa, R.Sabourinc “Reducing forgeries in writer-independent off-line signature verification through ensemble of classifiers” Volume 43, Issue 1, January 2010, 13. Arti Agrahari, Abhishek Verma, Arti dubey. Garima Singh“Signature Verification System Using MATLAB” 2nd International Conference on Role of Technology in Nation Building (ICRTNB-2013) 14. M. Blumenstein and B. Verma”Neural-based Solutions for the Segmentation and Recognition of Difficult Handwritten Words from a Benchmark Database” 15. Madhavi D. Malekar, Prof. Sachin Patel “Offline Signature Verification Using Artificial Neural Network” International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 9, September 2013)