Dynamic Signature Verification System Using Statistics Analysis
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 7
Abstract
In this paper, a new technique for dynamic signature modeling and classification framework is proposed. Raw dynamic data obtained from a digitizer are analyzed using statistic tools. The variation within the same person signatures is obtained for effective signature training and accurate classification of genuine signature against all kind of forgeries. The proposed system is robust enough to prevent forgery of dynamic ignatures. It has False Rejection Rate (FRR) of 0.2% for genuine signatures and False Acceptance Rate (FAR) of 0.25%, 0% and 0% for skilled, simple and random forgeries respectively. These results are better in comparison with the results obtained from previous systems.
Authors and Affiliations
Dr. S. A Daramola. , Prof. T. S Ibiyemi
Adaptive Enhancement of routing protocol under CBR and TCP traffic source
The main objective of this article is to study and enhance on demand routing protocol under different traffic consideration so that our proposed routing protocol give an better result then other reactive and proactive ro...
Concealing the Level-3 features of Fingerprint in a Facial Image
Biometrics is the science of establishing the identity of an individual based on their physical, chemical and behavioral characteristics of the person. Biometrics is increasingly being used for authentication and protect...
An Efficient Method for Digital Image Watermarking Based on PN Sequences
In the recent times, the rapid and extensive growth in Internet technology is creating a pressing need to develop several newer techniques to protect copyright, ownership, authentication and content integrity of digital...
Study and Constructing RDF model for a well formatted Valid XML document
In recent years semantic web is one of the technologies to make the WWW as machineunderstandable. The Resource Description Framework (RDF) proposed by W3C is used for describing metadata about (Web) resources. The RDF da...
Encryption using XOR based Extended Key for Information Security – A Novel Approach
The explosive growth of information, places a high demand for Information Security. Information Security deals with securing the information from unauthorized access or misuse of information either intentionally or accid...