A Review Paper on Signature Recognition
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 6
Abstract
There are two types of signature verification system are present offline (static) and online (dynamic). When a person has done a signature on a paper or on a document then it is called offline or static signature. The offline signatures images are obtained by scanner or captured by a camera. It is used in governmental documents, and many different official purposes. Hand written signature is mostly biometric used in transaction as a general authentication like bank cheques, and credit cheques. Mainly biometric identification has two types of phase 1) recognition and 2) verification. Online signature captured by pen based tablet and also depending on the pressure of the pen, ups and downs of the pen and time stamping. Online signature is more trustworthy and accurate but offline handwritten signature is more user friendly than online signature.
Authors and Affiliations
Vineeta Malik, Anil Arora
Quantitative Distribution of Road Side Weeds in Bilha Block of Bilaspur District
Bilha block is located in Bilaspur district of Chhattisgarh state. The geographical situation of the district is 21˚37’- 23˚7 North latitude and 81˚12’-81˚40’ East longitude. Phytosociological survey done in the month o...
Review of Automatic Detection and control of Disease for Grape Field
This project gives the idea about Detection of various disease on grape field. Also provide the information about how to control this disease. India exported so many tons of grape every year. So, Grape played vital role...
Designing A Low Pass Fir Digital Filter By Using Rectangular Window and Blackman Window Technique
digital filter plays an important role in today’s field of communication. Without digital filter we cannot think about proper communication because noise occurs in channel. For removing of noise we use various type of d...
slugPerformance of Multiplicative Data Perturbation for Privacy Preserving Data Mining
Data mining is a well-known technique for automatically and intelligently extracting information or knowledge from a large amount of data, however, it can also disclosure sensitive information about individuals compromi...
Efficient Route Query Processing with Arbitrary Order Constraints Providing Optimal Solution
The optimal route query finds the shortest path starting from the query point from a given set of spatial points DS. These points are associated with some categorical information e.g., restaurant, pub, etc.,. This cover...