Computational Method for Forensic Verification of offline Signatures
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 2
Abstract
Signature verification models based on personal model have been reported by many researchers in past but the method proposed here is a forensic document examination approach using computational methods, unlike other models which require a considerable number of genuine signatures of the same writer to correctly train the model. This paper proposes a forensic signature verification approach making a robust verificationsystem even when few samples per writer are available. The efficiency of the proposed method is based on results of 150 writers with 10 signatures of each writer.
Authors and Affiliations
Vaibhav Saran
Modeling and Simulation of Solar Photovoltaic module using Matlab/Simulink
This paper presents the circuit model of photovoltaic (PV) module. Simulation and modeling is done using MATLAB/ Simulink software package. The proposed model is user friendly and can be used as a common pl...
A Novel approach for Graphical User Interface development and real time Object and Face Tracking using Image Processing and Computer Vision Techniques implemented in MATLAB
Image Processing is an advancement in the Signal processing domain where the input is an image or video and output can be image, video or in any other forms. With daily advances in Human-Computer interaction, I...
An Adjunct Quick Mining in Closed Persistent Patterns (AQCPP)
Closed persistent patterns in data mining is biggest challenge in these days. The existing models find these patterns from traditional and transactional databases. This paper approach a novel model to mine close...
A Study of Image Compression Methods
Image compression is now essential for applications such as transmission and storage in data bases. In this paper we review and discuss about the image compression, need of compression, its principles, and types...
Visual Cryptography Implementation with Key Sharing For Effective Phishing Detection Process
The advent of the internet, various online attacks has been increased and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal, confidential information such...