Image Processing for Signature Verification
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2015, Vol 3, Issue 3
Abstract
As signature is the primary mechanism both for authentication and authorization in legal transactions, the need for efficient auto-mated solutions for signature verification has increased [3]. Unlike a password, PIN, PKI or key cards – identification data that can be forgotten, lost, stolen or shared – the captured values of the handwritten signature are unique to an individual and virtually impossible to duplicate. The primary advantage that signature verification systems have over other type’s technologies is that signatures are already accepted as the common method of identity verification [4]. A signature verification system and the techniques used to solve this problem can be divided into two classes Online and Off-line [5].On-line approach uses an electronic tablet and a stylus connected to a computer to extract information about a signature and takes dynamic information like pressure, velocity, speed of writing etc. for verification purpose. Whereas Off- line signature verification involves less electronic control and uses signature images captured by scanner or camera. An offline signature verification system uses features extracted from scanned signature image. In this only the pixel image needs to be evaluated.
Authors and Affiliations
Pallavi V. Hatkar, Zareen J Tamboli
Enhancing Vehicle Navigation and Safety through Integration of Pre-Recorded Maps with Vehicle Control Unit
Powerful navigation and safety systems are vital to ensuring autonomous (DV) or semi-autonomous vehicles continue well in varied environmental conditions. However, in such a world those who depend on that internet connec...
A Critical Review of Lignocellulosic Waste Pretreatment for Biofuel Production
Environmental protection is a top priority, and this can only be accomplished by minimizing Chemicals are used in the manufacturing of fuel. As a biofuel source, bioethanol production waste has become more and more attra...
Swimmer Safety Alert System for Encounters with Unidentified Marine Aquatic Animals
The perilous encounters between swimmers and marine animals pose a significant risk to both human safety and the well-being of aquatic creatures. Every year, a distressing number of swimmers succumb to attacks by marine...
Design And Development of Sketch Based Image Retrieval Using Deep Learning
In this cutting edge, the common wrong doing rate is expanding day-by-day and to manage up with this the criminal divisions as well ought to discover ways in which would speed up the by and large preparation and offer as...
A Password and Least Significant Bit Substitution Based Steganography Technique for Image Hiding
The proposed work introduces an image steganography technique using text-based password that acts as the symmetric key of encryption and decryption. It contains two components, an encoder, and a decoder. An encoder takes...